WO2008144550A1 - System and method for remote surveillance - Google Patents

System and method for remote surveillance Download PDF

Info

Publication number
WO2008144550A1
WO2008144550A1 PCT/US2008/063960 US2008063960W WO2008144550A1 WO 2008144550 A1 WO2008144550 A1 WO 2008144550A1 US 2008063960 W US2008063960 W US 2008063960W WO 2008144550 A1 WO2008144550 A1 WO 2008144550A1
Authority
WO
WIPO (PCT)
Prior art keywords
video
camera
sentinel
space
cellular
Prior art date
Application number
PCT/US2008/063960
Other languages
French (fr)
Inventor
Mark Knutson
Robert Holliday
James Masten
Original Assignee
Law Enforcement Support Agency
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US12/108,414 external-priority patent/US20090322874A1/en
Application filed by Law Enforcement Support Agency filed Critical Law Enforcement Support Agency
Publication of WO2008144550A1 publication Critical patent/WO2008144550A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/20Adaptations for transmission via a GHz frequency band, e.g. via satellite

Definitions

  • This invention relates generally to systems and methods to conduct remote surveillance, more particularly to those surveillance operations concerned with public safety.
  • Predecessor surveillance systems are limited in their abilities to remotely record, store, and transmit images suitable for evidentiary purposes.
  • Available digital players for example the standard video viewing software, such as RealPlayerTM or Microsoft® Media PlayerTM, does not suitably lend itself to perform the required audit functions that are deemed necessary for law enforcement use.
  • vendors update their programs periodically and often lack backwards compatibility with no guarantee that a CD made for a court case will necessarily be playable on the court's computer.
  • a system and method to remotely acquire, store, and access still and full motion digitally stored images from a surveilled space include at least one remote camera equipped with electronics and microprocessors to acquire, store, encrypt, and wirelessly transmit full motion and still images having sufficient resolution to meet evidentiary standards.
  • the stored and encrypted digital images may be remotely accessed by a remote monitoring sub-system.
  • the remote monitoring system may wirelessly access the digital images from stationary, mobile, or hand-held portable displays.
  • FIGURE 1 pictographically depicts an embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with headquarters via cellular-based wireless, non-cellular wireless, and wired communication using the Internet under live and historic viewing scenarios;
  • FIGURE 2 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with headquarters via cellular-based wireless, non-cellular wireless and wired communication under live and historic viewing scenarios
  • FIGURE 3 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with mobile vehicles via cellular-based and non cellular-based wireless communication under live and historic viewing scenarios;
  • FIGURE 4 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with mobile vehicles via cellular-based and non cellular-based wireless communication, and separate non-cellular based communications, under live and historic viewing scenarios;
  • FIGURE 5 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with a mobile vehicles via non cellular-based wireless communication under a live viewing scenario, and cellular-based wireless, non cellular-based wireless, and wired communication with headquarters under an historic viewing scenario;
  • FIGURE 6 pictographically illustrates a plurality of evidentiary displays obtained from digital files of the 2:00 AM crime scene
  • FIGURE 7 depicts an embodiment of the remote surveillance system
  • FIGURE 8 depicts an embodiment of camera and hardware components of the remote surveillance system
  • FIGURE 9 depicts a sub-system flow chart of the wireless portion of the remove surveillance system
  • FIGURE 10 depicts screenshots relating to the camera position and viewable images obtained
  • FIGURE 11 depicts a screenshot activated to present a live view of a remotely surveilled space
  • FIGURE 12 presents a screenshot to view the content of an archived image file
  • FIGURE 13A present a flow chart overview of viewing an archived image file
  • FIGURE 13B present a flow chart overview of viewing the archived image file and conveyance of user commands to the surveilled space
  • FIGURE 13C present a flow chart overview of viewing a live image file and conveyance of user commands to the surveilled space
  • FIGURE 14 presents a listing of software programs configured to operate camera, communication, and support equipment of the remote surveillance system
  • FIGURE 15 presents screenshots for obtaining archived digital video and/or audio files by time and calendar date
  • FIGURE 16 presents a screenshot of a video play list categorized by officer, dates, and start and end times;
  • FIGURE 17 presents a screenshot of a user editor having hierarchal rights to grant or deny permission to a requestor to observe or listen to a digital image and/or audio file;
  • FIGURE 18 is a screenshot of a CarCam archive
  • FIGURE 19 depicts a screenshot for assigning a case number associated with a time block segment of a digital video file
  • FIGURE 20 depicts a screen shot aiding a user to retrieve case ID blocks by category
  • FIGURE 21 depicts a screen shot having a series of thumbnail images retrievable by category
  • FIGURE 22 illustrates more information regarding the tilt, pan, and zoom (TPZ) camera
  • FIGURE 23 illustrates a server screenshot and associated functions provided by the instructions contained within the software code residing in computer readable media.
  • DETAILED DESCRIPTION OF THE PARTICULAR EMBODIMENTS [0031]
  • the system hardware and software components are unique and designed specifically to support public safety surveillance applications in which a space is remotely observed by cameras and camera images obtained therein are digitally stored having sufficient resolution and under protocols to meet evidentiary standards.
  • Image storage protocols provide a chain-of-custody data management and a built-in audit trail history to image files remotely accessed and/or retrieved by authorized personnel for off site or on site viewing.
  • the system's remote image acquisition and evidentiary storage protocols provides a force multiplier effect in an effort to find a way to offset the sharply increasing workload of the field officer.
  • Remote accessing and/or retrieval for on site viewing (viewing within or closely nearby the surveilled space) or off site away from the surveilled space can utilize a cellular network configured with adequate data bandwidth. Images viewed by the authorized personnel can utilize microprocessor based devices equipped with the Intel® Core DuoTM processor or the AMD® 64 Athlon 1 " 1 64 processor that enable a continuous background video capture process while enabling full-speed, near-real-time control activities from the same processor.
  • Alternate embodiments for the cellular network can include WCDMA and EV-DO bandwidths.
  • the Wideband Code Division Multiple Access (WCDMA) cellular network delivers approximately 152.6Kb/s data rates and is roughly comparable to digital subscriber line DSL speeds.
  • the Evolution-Data Optimized (EV-DO) permits video acquisition and play back to the field officer at rates better than 500 Kb/s.
  • Other alternate embodiments for the cellular networks include revision upgrade to the EV-DO standard, specifically Revision A.
  • the alternate system embodiments provide to the local jurisdiction or region can be served by the Revision A EV-DO that can enable full-motion, full-featured, recorded and/or live video dissemination of the remotely surveilled space.
  • Embodiments of the remote surveillance system are adaptable for use by village, city, regional or other governmental or authorized private entities to provide a rapidly deployable, mobile, wireless video and audio communications network to increase drug interdiction and address other activities occurring in high crime areas.
  • Mobile video can work as a force multiplier, crime deterrent, and can significantly enhance our ability to respond to community requests for special focus crime prevention.
  • the emphasis can be on enabling patrol officers and special operations teams to quickly set up a surveillance system that can be observed remotely, as needed. These images can be viewable from designated monitoring stations and have the flexibility to support multiple agencies.
  • the system can enable law enforcement to connect into both public and private sector surveillance systems. This can aid in the detection, intervention, investigation, and prosecution of criminal activity. Officers can have mobile video equipment that can be placed on the dash of their car, carried with them, or left on location. These images can be transmitted to the officer's laptop and/or a command center, as well as shared by other officers involved in the event. Drug trafficking areas, domestic violence locations, construction sites, and many other areas of interest can be temporarily monitored, as requested. Video surveillance "kits" would also be available for use for search warrant and SWAT surveillance - before, during and post-event - and would be used in situations where event monitoring is necessary.
  • the video surveillance kits may include rapidly deployable cameras with wireless communication ability to convey and store digital images onto digital storage mediums.
  • Live and stored digital images enable remote monitoring of present time and historic viewing of surveilled or examined spaces from nearby structures or vehicles having viewing displays in wireless communication with the digital storage mediums or the rapidly deployable cameras.
  • monitoring could be done from a tactical van, via a handheld device or multiple handheld devices, and/or from a precinct, headquarters, or communication center, allowing for viewing from a distance in stationary environments or in moving environments of an approaching vehicle, thereby increasing officer safety.
  • Placing a mobile video camera at the work site can allow officers to respond immediately as thefts occur; 4. Domestic violence offenders often return to threaten victims, but leave before officers can respond. Having a mobile video unit available can give citizens an opportunity to allow surveillance of their location, if desired, and provide an immediate notification and timely intervention by law enforcement; 5. Major incident responses often tax the resources of emergency responders. For example, at 4:30 a.m. a container off-loaded from a ship explodes. The first units to respond are overcome by a chemical odor. Several individuals are reported dead near the site. A quick response video surveillance team installs four linked wireless cameras around the site at safe locations. Managers at the incident command post are quickly able to see all areas in and around the explosion site in a remote controlled live video environment.
  • the cameras begin in a low light setting supplemented by forward-looking infrared (FLIR) imagery until dawn allows for full color video.
  • FLIR forward-looking infrared
  • Other embodiments of the remote surveillance systems include the ability to capture video/audio from a wireless camera by police or designated personnel, the camera's focus and frame a field of view by lens zooming, and to control when to make their camera's images available to authorized personnel.
  • Image access includes the ability to store, pan through, and freeze frame video images and to extract audio information.
  • Image recording includes digital storage of image and associated audio files, and further includes the ability to capture tabular data associated with each video session, are described in the descriptions and figures below.
  • the remote surveillance system also includes the ability to capture tabular data associated with each video session and to display video/audio from any wireless laptop computer by police officers, command, or other authorized personnel.
  • the ability to search and select available video systems whether they are operating from a mobile or stationary environment is another embodiment functionality of the system.
  • Alternate embodiments for the remote surveillance system include MS SQL Server, a IIS, a 14TB NAS subsystem, XP and Windows 2000 Clients, a 100 MB Ethernet LAN and DS3 Internet connectivity, a Cisco PIX firewall, a MS Active Directory and Novell Directory Services.
  • the mobile component of the remote surveillance system can include XP and Windows 2000 Laptops, GPRS/G3 air cards, Cisco and NetMotion VPN.
  • FIGURE 1 pictographically depicts an embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with headquarters via cellular-based wireless, non-cellular wireless, and wired communication using the Internet under live and historic viewing scenarios.
  • the camera includes tilt, pan, and zoom (TPZ) functionality so that different viewing angles and fields of view may be obtained by the surveilled scene or space.
  • a remote control system 10 includes at least one tilt pan and zoom (TPZ) camera 12 with rotational view of a monitored space 14. Other TPZ cameras 12 can be positioned as needed to expand the viewing range or acquire additional details in depth of the surveilled or monitored space 14. If suspected criminal activity is exhibited or otherwise indicated, the monitored space may be referred to as a crime scene 14.
  • the surveillance scene or monitored space 14 depicted in this example illustrates an indicated crime in progress showing a robber with a sack of money fleeing from a house to a getaway car during a 2:00 AM timeframe designated by the crescent Moon.
  • the live view of the crime scene 14 is conveyed from the at least one TPZ camera 12 to a near-scene storage computer 16 for storage.
  • the near-scene computer 16 is equipped for subsequent wireless transmission.
  • Video image and/or any audio content stored within the near-scene computer 16 are relayed via wireless signal 24 to a cellular tower 26.
  • the cellular tower 26 sends the images and any audio content of the live crime scene 14 to a digital computer receiver 30 configured to send digital information content of the crime scene 14 by wired connection 32 to the Internet 36 in signal communication with a dispatch or communication center's computer 40.
  • Personnel controlling the dispatch computer 40 can view the surveillance scene or monitored space 14 under live or present time, in this case at 2:00 AM.
  • dispatch personnel controlling the computer 40 can retrieve stored images of the 2:00AM crime or surveillance scene 14 from the computer 16 via the wireless signals 24 and 28 to view the 2:00AM crime or surveillance scene 14 after the fact, or historically, depicted with a Sun on the right at 2:00 PM during the day.
  • FIGURE 2 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with headquarters via cellular-based wireless, non-cellular wireless and wired communication under live and historic viewing scenarios.
  • System 50 includes direct cellular tower communication with the dispatch computer 40 wireless signals 29 to permit either live or historic viewing of the 2:00 AM crime scene 14.
  • FIGURE 3 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with mobile vehicles via cellular-based and non cellular-based wireless communication under live and historic viewing scenarios.
  • System 100 includes two police vehicles 100 and 114, each having a laptop computer 120 capable of receiving wireless communication via wireless signal 102 transmitted by the digital computer receiver 30 to view either images of the live crime scene 14 or to view the crime scene historically.
  • the police vehicle 110 approaches the crime scene 14 while the crime is in progress, and police vehicle 114 approaches the crime scene to view the crime historically, or after-the-fact.
  • the laptop computer 120 can also be in the form of a personal digital assistant (PDA) or tablet PC.
  • PDA personal digital assistant
  • FIGURE 4 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with mobile vehicles via cellular-based and non cellular-based wireless communication, and separate non-cellular based communications, under live and historic viewing scenarios.
  • System 200 is substantially similar to system 100, but also provides for direct communication of the police vehicle 110 with the near-scene storage computer 16 to retrieve live, present time images, or historic recorded images directly and independent of the cellular tower 26 via wireless signal 202 from the near-scene computer 16.
  • FIGURE 5 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with mobile vehicles via non cellular-based wireless communication under a live viewing scenario, and cellular-based wireless, non cellular-based wireless, and wired communication with headquarters under an historic viewing scenario.
  • System 250 includes a combination of System 200 and system 10 in which the police vehicle 110 communicates with the near-scene storage computer 16 to retrieve live images directly and independent of the cellular tower 26 via wireless signal 202, and the dispatch computer 40 receives historic (as depicted) or live digital images via the cellular tower 26 of the digital images of the crime scene or survielled space 14 via the near-scene storage computer 16 via wireless signals 24 and 28.
  • FIGURE 6 pictographically illustrates a plurality of evidentiary displays obtained from digital files of the 2:00 AM crime scene.
  • the wide-angle presentation of the crime scene is shown with the suspected robber running from the house and approaching the getaway car on court computer display 260 as image 270.
  • a magnification of the wide-angle digital file illustrates the getaway car's license number having sufficient resolution to read the alphanumericai characters to permit the identification of the getaway vehicle in image 270A.
  • the right lower computer display is a magnification of the fleeing suspect having sufficient clarity and resolution to meet facial identification standards in image 270B.
  • Other embodiments of the remote surveillance system include the ability for an officer to easily deploy the video and/or audio portion of the system, to camouflage the video and supporting electronics as needed for discrete deployment so as to blend in with the area or space being surveilled, and to engage remote control of a cameras lens focus to impart manual control or resetting to auto-focus as desired.
  • the field of view by the camera can include acute, oblique, hemispherical, and depending on camera placement, spherical views of the surveilled space.
  • the deployed camera 12 and associated electronics can view any indoor, outdoor, or combination indoor and outdoor surveilled space. Set up is amenable to easy deployment and circuitry activated by an on-off switch.
  • Images obtained from the camera are digitized and can include visible, infrared, and ultraviolet light sources and can be presented in color or black and white.
  • the camera can be configured to operate under brightly lit circumstances and can include light amplification technology when ambient light is medium to low.
  • the camera in certain embodiments can be able to zoom and read an auto license plate that is approximately 500 feet away the camera, and associated electronics can include potential tracking device, for example a global positioning satellite (GPS) apparatus in case of theft or misplacement.
  • GPS unit can share the antenna that supports the Wide Band Code Division Multiplexing (WCDMA) connection.
  • WCDMA Wide Band Code Division Multiplexing
  • the quality of the video can be set to evidentiary standards by headquarters, or as allowed, at standards other than evidentiary by the deploying officer.
  • the video quality can also be set by remote control.
  • the TPZ camera 12 can be AC powered by 1 10 volts or other voltages available in local jurisdictions and can include a small DC powered battery to provide backup or supplemental support for AC power supplies.
  • the auxiliary DC battery can preferably meet power requirements for the camera, transmitter, and supporting electronics for approximately 4-12 hours.
  • the TPZ camera 12 and associated electronics and power supplies are constructed to operate within hazardous environmental conditions and not ignite flammable fuels during normal operation.
  • Digital storage media in communication with the TPZ camera 12 can be configured to store digital video and/or audio content of the surveilled space.
  • the length of the digital recording within the digital storage media in communication with the TPZ camera 12 can be configured to store at least 4 hours of digital video and/or audio content of the surveilled space.
  • Digital storage mechanisms within the TPZ camera 12 may be configured to store at least 8 hours of digital and/or audio content.
  • the near-scene storage computer 16 may be configured to store at least 8 hours of evidentiary quality digital video and/or audio files.
  • Variable recording rates are possible and may be selected to a desired frame per second (FPS).
  • the desired frame rate can be between about 15 and about 60 FPS.
  • Alternate embodiments of the remote surveillance systems include the TPZ camera 12 being capable of motion sensing activation. Camera activation can occur within approximately 1 minute of a sensed motion and to continue acquiring video and/or audio content approximately 5 minutes after motion sensing has ceased.
  • the system may be able to trigger a software alert based on motion detection and motion detection settings and thresholds of the camera may be adjustable.
  • the software may include motion detection alert notification protocols through an Application Program Interface (API) to support various alarm presets and thresholds.
  • API Application Program Interface
  • the camera may be configured with alarm presets that are communicated to headquarters' computer systems or to the laptops occupying the mobile vehicles.
  • the camera may also be configured to concentrate on regions of interest within the surveilled space by a center-on-click operation.
  • Preset tours of the monitored space may be programmed remotely by precinct headquarters, the communications center, or via instructions conveyed by the software operating from laptops engaged by designated officers granted rights to take preset tours or otherwise remotely modify the preset tours by modifying any of the tilt, pan, and zoom operations of the camera.
  • Depth of focus may also be remotely modified by headquarters or designated vehicle officers and varied with the regions of interest of the monitored space.
  • Alternate embodiments described above may be utilize Application-Specific Integrated Circuits (ASIC) programmable with selectable code-decode (CODECs) standards.
  • Encryption and security protocols may utilize at least 128 bit encryption (AES) with FIPS compliance to permit secure transmission from the TPZ camera 12 and/or near-scene storage computer 16 and precinct headquarters, the communication centers, and to those laptops 120 granted access rights occupying stationary or mobile vehicles 110/114.
  • AES 128 bit encryption
  • FIGURES 7-22 illustrate alternate embodiments of the particular embodiments illustrated in FIGURES 1-6.
  • the alternate embodiments include multiple cellular towers, alternate designs of the remote camera 12, alternate embodiments of the near surveilled space computer 16, alternate embodiments of the receiving computer 30, and descriptions and illustrations of screenshots of computer executable programs.
  • various components of the SecureEye Systems' Rapidly Deployable Video Monitory System can be used.
  • the system hardware and software components are unique and designed specifically to support public safety surveillance applications in which a space is remotely observed by cameras and camera images obtained therein are digitally stored having sufficient resolution and under protocols to meet evidentiary standards.
  • Image storage protocols provide a chain-of-custody data management and a built-in audit trail history to image files remotely accessed and/or retrieved by authorized personnel for off site or on site viewing.
  • the system's remote image acquisition and evidentiary storage protocols provides a force multiplier effect in an effort to find a way to offset the sharply increasing workload of the field officer.
  • Remote accessing and/or retrieval for on site viewing (viewing within or closely nearby the surveilled space) or off site away from the surveilled space may utilize a cellular network configured with adequate data bandwidth.
  • Images viewed by the authorized personnel may utilize microprocessor based devices equipped with the Intel® Core DuoTM processor or the AMD® 64 AthlonTM 64 processor that enable a continuous background video capture process while enabling full-speed, near-real-time control activities from the same processor.
  • Alternate embodiments for the cellular network may include WCDMA and EV-DO bandwidths.
  • the Wideband Code Division Multiple Access (WCDMA) cellular network delivers approximately 152.6Kb/s data rates and is roughly comparable to digital subscriber line DSL speeds.
  • the Evolution-Data Optimized (EV-DO) permits video acquisition and play back to the field officer at rates better than 500 Kb/s.
  • Other alternate embodiments for the cellular networks include revision upgrade to the EV-DO standard, specifically Revision A. Thus the alternate system embodiments provide to the local jurisdiction or region may be served by the Revision A EV-DO that can enable full-motion, full-featured, recorded and/or live video dissemination of the remotely surveilled space.
  • SecureEye Systems' Rapidly Deployable Video Monitory System enables individual officers, field teams and support personnel to dramatically extend the operational coverage area and increase effectiveness in almost all situations.
  • officers in the city, county, or regional jurisdictions can be able to call on an electronic partner to support observation of situations that, until now, required the commitment of an officer who was then lost to additional field service.
  • FIGURE 7 depicts an alternate embodiment of the remote surveillance system.
  • the remote surveillance system includes a Law Enforcement Support Agency information technology (LESA IT) archive server in signal communication with a Dispatch, a plurality of cellular towers (towers 1-4), at least one remote camera (Sentinels 1-3) having a view of a surveilled space, and an authorized network personal computer.
  • the Sentinel cameras are in wireless communication with the cellular towers and police or patrol vehicles. When inside the coverage of the cellular system, the Sentinel becomes instantly visible to the behind-the scenes administrative support personnel when removed from the trunk, and to distant and approach patrol vehicles. Prior to the removal from the trunk, the operability of the Sentinel system can be ascertained.
  • a functional check query can be sent via the Mobile Digital Computer (MDC) located in the patrol vehicle.
  • the laptop in the patrol vehicle may be connected via an Ethernet connection to the Pocket (discussed below) in the trunk of the patrol vehicle.
  • the Pocket contains an intelligent device that maintains communication with the Sentinel and then provides a bridge link between the MDC and the Sentinel.
  • the functional operability of the Sentinel including the status of the Sentinel battery, is available through this link to the officer in the patrol vehicle and the support personnel at LESA IT.
  • Dispatch includes a server equipped to run computer readable media having programmed software instruction (referred to as TYEE) to execute the functions described below in remotely monitoring, recording, accessing, and retrieving digitally stored images and/or audio files of the surveilled space in a manner suitable for evidentiary purposes.
  • TYEE programmed software instruction
  • the flexible management policy of the Sentinel system allows the Chief Administrator to set hierarchies for the various functions of control and viewing by both the support and field personnel.
  • the Chief Administrator can segment the corps of Sentinel systems to task groups; each assigned an Administrator that can manage the control and viewing rights of their assigned group of Sentinel systems.
  • the administrator can enable any vehicle or support personnel equipment with either wireless or wired access to the LESA servers.
  • An appropriate administrator can verify to the field officer that an image from the Sentinel system is visible and the unit is properly placed.
  • the administrator can enable both support and field personnel to the various levels of control and viewing available.
  • the deploying officer can also be so enabled and upon returning to the patrol vehicle, the officer can see the video image on his MDC screen.
  • the officer can use a hand-held pocket television to connect to the video signal and verify the video image.
  • the officer can use the same browser-based tools to see the Sentinel images as would be used when there is cellular coverage.
  • the Pocket intelligent device takes on the role of the Tyee server system at LESA, the main difference being that whereas the main-server-based Tyee is capable of providing management and archival services for many Sentinel systems, the Pocket as server may only manage its mated Sentinel.
  • the Sentinel and the Pocket are linked by a new technology: a wireless link that has dramatically improved range over previous devices. In a relatively urban setting, the range should exceed 1,000 feet; in clear line of sight, the range should exceed a mile.
  • the patrol officer When operating outside the coverage of the cellular system, the patrol officer has to take on the role of administrator. The officer can point, zoom and adjust the camera. The officer can also enable other patrol units (with Pockets or PocketLite capability) that arrive on the scene to see the Live View images from the deployed Sentinel unit.
  • the officer can point, zoom and adjust the camera.
  • the officer can also enable other patrol units (with Pockets or PocketLite capability) that arrive on the scene to see the Live View images from the deployed Sentinel unit.
  • the deployed Sentinel may view any indoor, outdoor, or combination indoor and outdoor surveilled space and can operate as a slave to its mated Pocket.
  • the Pocket units of the arriving patrol vehicles can operate as bridge units to enable their MDCs to contact the Pocket of the deploying vehicle as the managing Tyee server. Because access to the Live View is through a browser-based application, this procedure is relatively simple.
  • the arriving vehicles can have pre-configured "Favorites" in their browser set-ups. These "Favorites" can include the list of Sentinel-equipped vehicles. By just clicking on the appropriate "Favorite" selection, the browser can point to the URL of the web page controlling the deployed Sentinel, where it can pause, asking for the correct password.
  • the deploying officer can use his voice radio to provide passwords to enable arriving officers.
  • This scenario can be implemented for up to four Sentinels on a given scene. All four of the deploying vehicles can see the Live View from all four deployed Sentinels; any number of authorized Pocket- or PocketLite-equipped vehicles can see the Live View from each of the four deployed sentinels.
  • FIGUPvE 8 depicts an embodiment of camera and hardware components of the remote surveillance system.
  • the SecureEye Systems' Rapidly Deployable Video Monitoring System comprises three functional blocks: (1) a deployable camera device, known as Sentinel that includes a tilt, pan, and zoom (TPZ) functionality; (2) the interface in the trunk of the patrol car, known as the Pocket, and (3) the backend system known as the Tyee.
  • TPZ tilt, pan, and zoom
  • the Sentinel unit consists of four major component groups. These groups are: (1) the TPZ camera; (2) the main processor unit with the communications unit; (3) the power management unit; and (4) the power supply, which includes the battery and GPS.
  • the Sentinel TPZ camera device is a small box (approximately 10" x 10" x 16") with a plastic dome protecting the tilt, pan and zoom camera inside.
  • the Sentinel is small enough that several different disguises can be used to mask its real purpose.
  • To deploy the officer simply removes the unit from the Pocket by unplugging the power and data connectors and lifting the mechanical restraint bail, then positions it to monitor a situation where a remote observer is needed. For operational verification, the officer can either ask dispatch to confirm that the image they see is satisfactory; return to his car and examine the transmitted image directly, or make a wired connection to the unit and examine the video output directly on a hand-held pocket TV.
  • FIGURE 9 depicts a sub-system flow chart of the wireless portion of the remove surveillance system in signal communication with the TPZ camera device of FIGURE 20.
  • the TPZ unit (FIGURE 20 - Sl) includes a rugged tilt and pan unit that is made from quarter-inch 6061 aluminum plate. It is rugged, yet relatively lightweight and conforms to the small feature size of the Sentinel.
  • the camera is a high-quality Sony® 980 block camera with 26X optical zoom, image stabilizer and Infrared image capability. SES has augmented the Sony® core with interface electronics (S5) allowing remote operation and a bank of illuminating Infrared LEDs (S4) for application in total darkness.
  • the communications unit actually shares physical accommodations on the mini-ITX board where a mini-PCI and a mini-PCI Express socket provide support to a unique 802.1 lg/900MHz transceiver and a WCDMA EV-DO Rev A transceiver (S3, S6). Both of these devices are exceptional in their current systems performance but also in their opportunity for growth.
  • the 802.1 lg/900 MHz device provides all of the IP protocol optionally advantageous to support the full web-based back-end structures.
  • the power supplies (S7, S8) developed by SecureEye Systems deliver performance that is optionally advantageous to meet the operational demands of the Sentinel system. These high frequency switching power supplies deliver efficiency that is greater than 88% over the battery's entire operating range.
  • the Sentinel device is capable of using either of two batteries.
  • the larger battery is a 50-Amp-hour (600 Watt-hours) Lithium Ion device (S/P2a) that can power the Sentinel for more than eight hours.
  • a second alternative is a 27-Amp-hours (324 Watt-hours) sealed, glass mat lead-acid dry cell battery that can power the Sentinel unit for about six hours (S/P2b).
  • S/P2b The major difference between these batteries is price. Both batteries are non-gassing and certified safe in the trunk of a patrol car where the air is exchanged with the passenger compartment.
  • the Sentinel TPZ camera device unit draws about 60 Watts in full operation.
  • the power consumption breakdown allocates about 40 Watts to the process, memory and hard drive.
  • the tilt and pan mechanism draws a continuous 6 Watts of power.
  • This system is designed with direct drive stepper motors that dynamically manage the position of the camera. Because of the orientation of the camera relative to earth vertical is not known, one way to manage the tilt and pan positioning is dynamically, with the motors always engaged.
  • the GPS unit (S8) shares the antenna that supports the Wide Band Code Division Multiplexing (WCDMA) connection (S2) and delivers once per second position updates to both the evidentiary data that is captured in the remote archive and the live view data sent to the Tyee for distribution.
  • WCDMA Wide Band Code Division Multiplexing
  • Other embodiments of the TPZ Sentinel camera device include at least one of the characteristics in Table 1:
  • the Pocket in the trunk of the patrol car is a receiver for the Sentinel unit.
  • the Pocket securely locks the Sentinel in place in the trunk of the patrol car and provides power and data connections to the Sentinel device. ⁇ See FIGURES 7 and 8 above, and 22 below.)
  • the Pocket unit consists of four major component groups. These groups are: (1) the intelligent device — single board computer; (2) the vehicle interface unit; (3) the communications unit; and (4) the power supply, which includes the battery. [0074]
  • the intelligent device is a single-board computer and supporting hard drive (FIGURE 8 - P2) hosting an application that serves several main roles.
  • the Sentinel status information is available to the MDC and to the officer in the vehicle. If the vehicle is within cellular coverage, then the status information can be accessed by the support personnel at LESA. If the vehicle is outside of the cellular coverage the status information can still be accessed by the officer in the vehicle.
  • the intelligent device provides another role.
  • the officer can select the Sentinel system to operate on the local WAN (S6/P2) provided by the Pocket and the Sentinel.
  • the intelligent device in the Pocket takes on some of the character of the Tyee video network management system.
  • the officer in the car can have the same interface available as when the vehicle is under cellular coverage. Additionally, the officer can have the control interface available that the administrator has when under cellular coverage.
  • the vehicle interface unit monitors the status of the patrol vehicle. It knows when the vehicle is running. The vehicle interface unit also knows the status of the battery in the Sentinel unit and the status of its own battery in the trunk. When the patrol vehicle is parked and monitoring the Sentinel unit through the Pocket interface and local WAN link (S6/P2), the battery in the Pocket (S/P2a or S/P2b) protects the vehicle battery by powering the Pocket unit. All of these data points are monitored once a minute and the data is collected in the operational logs of the Sentinel system. The logs are off-loaded when the video data is off-loaded.
  • the communications unit in the Pocket provides three communications services. It supports the local WAN using 802.1 Ig protocols and operating at 900 MHz (S6/P2). This technology provides uncompromising range to support unobserved operations between the vehicle and the Sentinel. Since range is inversely proportional to the square of the frequency when all other parameters are the same, this system has more reach than a comparable system operating at 2.4 GHz.
  • the Pocket also serves as a bridge between the Sentinel and the MDC (E1/E2) to enable support and administrative personnel to verify the status of the Sentinel as ready for deployment.
  • the third communication service provided by the Pocket is a direct interface to archival storage when the vehicle is at the precinct or station.
  • the Pocket P2 makes contact with a 802.1 lg/900MHz access point at the station to provide a high speed path for the off-load of all the data collected during the deployment of the Sentinel. This is a hands-off, automated transfer that moves all of the recorded video data and operations logs from the Sentinel field assignment to the fully managed and audited archive services provided by Tyee.
  • the Pocket uses the same high-efficiency switching power supplies (P4) as the Sentinel.
  • the battery unit can be a larger, sealed glass mat type battery.
  • a larger battery can significantly shorten the recharge time for the Sentinel unit.
  • the internal resistance of the glass mat type batteries is very low. This low internal resistance means that there is no internal heating associated with rapid charging.
  • a fully charged 100 Amp-hour glass mat battery in the Pocket would recharge even a completely discharged battery in the Sentinel in less than 15 minutes.
  • FIGURE 10 depicts screenshots relating to the camera position and viewable images obtained.
  • Tyee Server In signal communication with the Tyee Server, a term designating the software application that provides both a server-based control interface and a video archive that uses Network Attached Storage (NAS) for the managed archival function.
  • NAS Network Attached Storage
  • the Tyee server sub-system is based on the video management and archival systems that [0082]
  • the Tyee provides an interface that allows password-enabled administrators, power users and users to: (1) make network- wide administrative decisions; (2) initialize groups of Sentinel units; (3) check the status and initialize an individual Sentinel; (4) control the camera parameters (e.g., TPZ, quality, motion detection) of an individual Sentinel; and (5) view the live or archived video produced by Sentinel units.
  • the Tyee provides an interface that allows password-enabled administrators, power users and users to: (1) make network- wide administrative decisions; (2) initialize groups of Sentinel units; (3) check the status and initialize an individual Sentinel; (4) control the camera parameters (e.g., TPZ, quality, motion detection) of an individual Sentinel; and (5) view the live or archived video produced by Sentinel units.
  • camera parameters e.g., TPZ, quality, motion detection
  • Sentinel While the Sentinel is within cellular coverage, an authorized user can control a deployed Sentinel's TPZ via the password-protected browser-based interface. Even with a password, Tyee still follows a hierarchy of enabled users to allow priority users to take control.
  • the camera can default to automatic exposure/focus, but the user interface allows going to manual control of camera image settings, such as brightness control, focus, gain, shutter speed. Additionally, the system allows an authorized user to pull a motion detection zone across any part of the image and to set the threshold levels of motion to cause a trigger.
  • the Tyee also enables a user at the precinct, station, or in a vehicle in the field (on the LESA cellular network) to view live images from a deployed Sentinel unit via the Live View capability.
  • An authorized user can select the size, speed or quality of the video being transmitted from the deployed Sentinel, and can choose to grab and store on NAS disk a Live View snapshot for later viewing. While the size, speed or quality setting affects the LiveView images seen, the deployed Sentinel continues to record high fidelity smooth motion video for later offload to the central server.
  • the recorded video is automatically offloaded wirelessly whenever the patrol unit returns to the precinct. Both the live and the recorded video either transmit or store associated data such as date and time and GPS coordinates.
  • FIGURE 11 depicts a screenshot activated to present a live view of a remotely surveilled space. Images Are Stored As Designated By The Officer Or Supervisor. All of the transmitted video files are archived on the NAS and entries made in the SecureEye Systems archive SQL-based database. For audit trail and evidentiary reasons, users are not allowed to delete video.
  • Users are allowed to view video and mark selected video segments with Case IDs to facilitate retrieval and playback. Also, during Live View, users may select an image to snapshot and store on the NAS, in addition to the regular archived video. Video can stay resident on the NAS disk until the expiration of the stated department policy retention period. Access to the video stored is facilitated by the "Pick" screens in the server- based user interface. For any video desired to be played back, the authorized user logs in, selects the appropriate camera from the list presented. He is then allowed to pick a date from a calendar (any day with video is underlined to show that it is selectable); then a screen showing an indicator for each segment of available video is used to click on the desired times. See FIGURE 18 below for examples of a date and time "Pick" screenshots.
  • FIGURE 12 presents a screenshot to view the content of an archived image file.
  • a report may be generated formatted for an archive access, camera updates, and be editable by camera ID number, view parameters, and viewing dates and times.
  • the reports may be associated by officer badge number and user number.
  • FIGURE 13A presents a flow chart overview of viewing an archived image file and illustrates the creation and flow of archived video.
  • Achievable video is shown flowing from the deployed Sentinel unit, through the Pocket device via its LAN, then up to the central server's NAS via the 802.1 lg/900 link described in previous sections. This operation is independent of the availability of the cellular network.
  • the video data is archived on the NAS, authorized users can access the video for playback via the SES browser-based application.
  • This application is part of the Tyee system as described above and records all accesses to the video.
  • a simple, graphical interface shows the user where video data is available, allowing selection to any one-minute boundary with a few clicks of the mouse.
  • This user interface also allows creation of a CD or DVD (on workstations with CD/DVD-writers), to disseminate video to other agencies or authorized parties.
  • the CD/DVD created can contain everything optionally advantageous to play the video back.
  • a log is kept of any CD/DVD's made.
  • FIGURE 13B present a flow chart overview of viewing the archived image file and conveyance of user commands to the surveilled space.
  • LiveView and Control is via Wireless Carrier Link and illustrates the flow of live video data and camera commands when the Sentinel is deployed within the cellular coverage area. Operators who have authorized access to LESA servers over any wired or wireless network can control the camera parameters via the interface described in FIGURE 22 above.
  • LiveView is available from the Sentinel to precincts/stations or vehicles, as well as to other vehicles that have authorized access to LESA servers over any wired or wireless network.
  • the Pocket in the vehicle is not needed to facilitate this flow of data and control. Once the Sentinel is deployed, the vehicle with its Pocket does not need to remain in its vicinity.
  • FIGURE 13C present a flow chart overview of viewing a live image file and conveyance of user commands to the surveilled space.
  • the LiveView and Control outside the Cellular Coverage Area When the Sentinel is deployed outside the cellular coverage area, LiveView and control of the camera is still enabled for Pocket- or PocketLite-equipped vehicles in the vicinity.
  • PocketLite refers to SES's option to provide an 802.1 lg/900 capability to vehicles without a full Pocket/Sentinel kit.
  • the deployed Sentinel's mated Pocket now acts as the server and access point for transmission of the LiveView data via the 802.1 lg/900 link.
  • Vehicles within the transmission range (which is a circle of at least 1000- foot radius) can be able to see live video from the Sentinel by linking to the mated Pocket. Up to four deployed Sentinels can function in proximity in this mode, delivering live video to any number of vehicles enabled on the 802.1 lg/900 network.
  • FIGURE 14 presents a listing of software programs configured to operate camera, communication, and support equipment of the remote surveillance system.
  • the software architecture and applications enabling the Sentinel system were developed for public safety.
  • the software is a complete, end-to-end system.
  • SecureEye Systems uses its own software CODEC because it is important to tie the data structures from video and audio capture through to the archive and validation function.
  • FIGURE 15 presents screenshots for obtaining archived digital video and/or audio files by time and calendar date.
  • Alternate embodiments employing the SecureEye Systems include a function specific video player in order to manage the video and associated data throughout its life cycle under evidentiary standards. In order to produce a complete audit trail, the logging function needs to be aware every time the data is played and by which user ID. The player is delivered with appropriate rights allowing the agency to control the distribution of the player any way it wants, except to put the player into the public domain. As private property, the city, county or other governmental authority can deliver a video CD/DVD with player to a defense lawyer with restrictions on its use.
  • FIGURE 16 presents a screenshot of a video play list categorized by officer, dates, and start and end times of a pick list for CDs.
  • a window showing a CD file play list may be identified by officer badge number to identify a chain of possession of an authorized and verifiable digital image and/or audio file duplicate.
  • a folder listing having a series start and end time pick lists is displayed.
  • the SecureEye Systems archive allows the agency to make a copy of the video data in an industry standard format. When this happens, a record is made of who made copies of which data and when.
  • the industry standard formatted material can be distributed without restriction to use an industry standard player.
  • the software components of the Sentinel system are all based on existing products from SecureEye Systems' library of applications developed specifically for public safety. Several of these products may be configured for alternate embodiments of the Sentinel remote surveillance systems.
  • the SES Live View client application may be configured in alternate embodiments designed to have first level of control at the capture end of the system, and optionally, control at the server end of the system.
  • This application may be restructured to shift control to the remote user end of the system (the administrator at the precinct/station).
  • the SES LiveView application gives the user at the server end of the system the ability to shift the live video stream from fewer larger images delivered every second to smaller images delivered every second.
  • the current cellular network can up-link at the rate of 152.6Kb/s. Since for LiveView it is optionally advantageous to deliver complete images, this system delivers jpegs. Full jpeg image of nominal quality can be 70Kb per image, while a reduced size image of nominal quality can be about 20Kb per image. Thus the user has the ability to trade from about two relatively high quality images per second to about eight lower quality images per second.
  • the up-link speed of the EV-DO Rev A cellular network enables up-linking at greater than lMb/s, providing enough margin the available bandwidth that the SES LiveView technology can switch to an mpeg-based compression scheme and deliver a full 30 fps video stream.
  • the video recording application at the Sentinel, SESystem receives control inputs from external applications.
  • the interface to this application can support inputs from the remote user.
  • This application currently supports "pre-event” recording in a configurable format from zero to 30 minutes of pre-event buffering.
  • An event can be defined as a motion alert, at which time it can begin archiving the video data (reaching backwards in time for the number of minutes configured in the pre-event recording setting).
  • This recording technology is unique in that it captures video and/or audio data in one-minute segments normalized to Greenwich Mean Time (GMT). Partial minutes are padded out and properly indexed. Time synchronization is by network or GPS reference.
  • GTT Greenwich Mean Time
  • This technology allows the synchronized playback of any video stream and any audio stream. It also enables the use of the SES Playlist which provides a graphical user interface that allows the user to start playback and end playback on any one-minute boundary, thus dramatically simplifying the user interface for the management of extremely large video archives involving many cameras and audio streams.
  • the TPZ and camera control applications can also accept inputs from the remote user through the web server interface.
  • the TPZ interface allows the user to click in the image to re-center the view.
  • the system also allows the user to move by frames or degrees and to set the zoom.
  • the system also allows the user to set up a tour of presets that encompasses tilt, pan and zoom adjustments to each stop. Additionally, the system allows the user to pull a motion detection zone across any part of the image and to set the threshold levels of motion to cause a trigger.
  • control interface allows the user to change many of the camera's features in real-time, or to return the camera to fully automated operation.
  • the applications running in the Pocket may be configured with modified software code in alternate embodiments to allow functioning on web servers modified to support ASP controls remote users.
  • the SES LiveView has to be significantly altered from its current functionality. As local control moves from the capture end of the system to the remote user end of the system, alternate embodiments may be configured of the SES LiveView program. [00105J Additionally, the SES LiveView has to support a new function.
  • the GPS Live View data can be packaged with GPS data as a means of self-preservation in case of theft.
  • the Tyee can keep track of the locations of each of the Sentinel units when their operators give the indication that their positions are fixed. Until they are released from this restraint, an alarm can be issued if the Sentinel GPS data indicates that the unit has moved. This alarm can be in the form of an API to allow appropriate data to be sent to Dispatch or LESA control.
  • the data may be managed by the Pocket providing service in the delivery patrol car.
  • ASIC Application-Specific Integrated Circuit
  • the video signal is modulated to NTSC or TV.
  • the software abstracts the video to a 320 by 240 pixel image, captured at 30 fps using one field of the video. It is possible to capture both fields and inter-modulate for a 640 by 480 image.
  • the LiveView video can be transmitted at the maximum rate allowed by the available bandwidth. In one embodiment for wireless coverage, the image can be transmitted at least once per second for a larger image and faster for a smaller image. In another embodiment employing Evolution Data Optimized EV-DO Rev A, the transmission rate increases to approximately 30 fps.
  • the fidelity/rate and size are selectable by an authorized user on the LESA network.
  • CODECs and Image Transmission Built Into Camera The CODEC and image transmission capability are built into the Sentinel device, which contains the camera, as well as the tilt-pan mechanism and intelligent video processing and communications electronics.
  • Sentinel could be configured to copy the video to a removable device, but not moved to a removable device.
  • the system always provides an audit trail (digital chain of custody) which would be violated if the only copy were allowed to be removed physically.
  • the Sentinel may store up to 100 hours or more of video, so storage capacity in the camera device is sufficient for substantially most surveillance needs. When the device is within range of the precinct or station, it can automatically offload all video and data files to the NAS disk - without user intervention.
  • Image Is Viewable By Standard Video Viewing Software The SecureEye Systems' Tyee server-based system has the capability to make a CD containing the selected video plus all playback files optionally advantageous to run on a computer without any other SecureEye Systems' applications. With export tools, the digital video can be converted into a standard-playable format for those times when it is optionally advantageous to make an mpeg-compatible version.
  • FIGURE 17 presents a screenshot of a user editor having hierarchal rights to grant or deny permission to a requestor to observe or listen to a digital image and/or audio file.
  • Method employed allows a System Administrator to restrict the access to a specific workstation. System Administrators grant or deny access to specific devices via user IDs and passwords.
  • workstations can be denied access to the playback ActiveX component if the workstation is password protected from downloading browser-based components. That is, if the policy of the department is that only system administrators can load programs or components, this protection can extend to the ActiveX component which is the SecureEye Systems video player. Windows showing which police vehicle and/or user official is denied or granted access to the TPZ cameras viewing the surveilled space.
  • the SecureEye Systems Tyee server-based component keeps track of everyone who logs in, from what IP address, date and time, and what actions were taken whether it is viewing of archived data or updating of camera or user parameters. These logs are available to an administrator, who may request logs by user, by camera, by date/time, or by action.
  • FIGURE 18 is a screen shot of an example report screen derived from archived reports.
  • a report is selected based on user ID, camera ID, date/time, and other search parameters. These parameters are associated with a given officials badge number or user ID number at the indicated screenshot windows. Other specifications ask for the ability to create Case IDs and associate video and other data with this case ID.
  • the Tyee system allows the authorized user to select video segments and assign them to a Case ID ⁇ See the "Assign Case #" blue bar near the top of 19 below). When this button is selected, the following screen is displayed.
  • FIGURE 19 depicts a screenshot for assigning a case number associated with a time block segment of a digital video file.
  • a case number is entered in the indicated case number data field and the other indicated data fields are filled.
  • the other data fields include the TimeBlock ID number, the camera location, the camera description, the time block, the subject, and a window of additional comments.
  • the screen shot is programmed to fill in the date/time and other data fields for a given video segment.
  • FIGURE 20 depicts a screen shot aiding a user to retrieve case ID blocks by category.
  • the Tyee software sub-system pre- fills the date/time of the selected video, as well as the camera description and ID.
  • the user enters the desired Case Number, Personnel or Interviewer associated with the video, Subject of the video, and any additional comments optionally advantageous.
  • After video or snapshots are assigned a Case ID, they are retrievable through the Case ID screen. Any of the entered fields may be used to retrieve the video stored with Case IDs, as shown in the tillable text fields.
  • a link to it is presented and clicking on this link can bring up the desired video for playback.
  • FIGURE 21 depicts a screen shot having a series of thumbnail images retrievable by category.
  • a panel of ten images is shown that are retrievable by storage date, or by assigned Case ID number.
  • Snapshots saved via the LiveView capability can be archived and retrieved in a similar way to the video.
  • the images are stored according to date and time, all images from a given time frame may be requested and viewed. Also, snapshots can be assigned Case IDs and retrieved this way, along with the video (as in the screen in FIGURE 20).
  • FIGURE 22 illustrates more information regarding the tilt, pan, and zoom (TPZ) Sentinel camera.
  • the TPZ camera is seen to be of rugged construction and serves as a readily deployable mobile witness to perform remote surveillance.
  • FIGURE 23 illustrates a server screenshot and associated functions provided by the instructions contained within the software code residing in computer readable media.

Abstract

A remote camera system having a view of a surveilled space is equipped with microprocessors to wirelessly convey encrypted, full motion digital images of the surveilled space to a monitoring network remotely separated from the surveilled space. The monitoring network includes analog and/or digital displays that may be fixed, in mobile vehicles, or be hand held personal digital assistants.

Description

SYSTEM AND METHOD FOR REMOTE SURVEILLANCE
INVENTORS
Mark Knutson
Robert Holliday
James Masten
CROSS REFERENCES TO RELATED APPLICATIONS
[0001] This application claims priority to and incorporates by reference in their entirety U.S. Patent Application No. 12/109,276 filed April 24, 2008; International Application Serial No. PCT/US2008/61334 filed April 23, 2008; U.S. Patent Application No. 12/108,414 filed April 23, 2008; and U.S. Provisional Patent Application No. 60/938,614 filed May 17, 2007. This application incorporates by reference in its entirety U.S. Provisional Patent Application No. 60/913,507 filed April 23, 2007. All applications above incorporated by reference in their entirety.
FIELD OF THE INVENTION
[0002] This invention relates generally to systems and methods to conduct remote surveillance, more particularly to those surveillance operations concerned with public safety.
BACKGROUND OF THE INVENTION [0003] Predecessor surveillance systems are limited in their abilities to remotely record, store, and transmit images suitable for evidentiary purposes. Available digital players, for example the standard video viewing software, such as RealPlayer™ or Microsoft® Media Player™, does not suitably lend itself to perform the required audit functions that are deemed necessary for law enforcement use. Additionally, vendors update their programs periodically and often lack backwards compatibility with no guarantee that a CD made for a court case will necessarily be playable on the court's computer. SUMMARY OF THE PARTICULAR EMBODIMENTS
[0004] A system and method to remotely acquire, store, and access still and full motion digitally stored images from a surveilled space. Systems include at least one remote camera equipped with electronics and microprocessors to acquire, store, encrypt, and wirelessly transmit full motion and still images having sufficient resolution to meet evidentiary standards. The stored and encrypted digital images may be remotely accessed by a remote monitoring sub-system. The remote monitoring system may wirelessly access the digital images from stationary, mobile, or hand-held portable displays.
BRIEF DESCRIPTION OF THE DRAWINGS
[0005] Preferred and alternative embodiments of the present invention are described in detail below with reference to the following drawings:
[0006] FIGURE 1 pictographically depicts an embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with headquarters via cellular-based wireless, non-cellular wireless, and wired communication using the Internet under live and historic viewing scenarios;
[0007] FIGURE 2 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with headquarters via cellular-based wireless, non-cellular wireless and wired communication under live and historic viewing scenarios; [0008] FIGURE 3 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with mobile vehicles via cellular-based and non cellular-based wireless communication under live and historic viewing scenarios;
[0009] FIGURE 4 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with mobile vehicles via cellular-based and non cellular-based wireless communication, and separate non-cellular based communications, under live and historic viewing scenarios;
[0010] FIGURE 5 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with a mobile vehicles via non cellular-based wireless communication under a live viewing scenario, and cellular-based wireless, non cellular-based wireless, and wired communication with headquarters under an historic viewing scenario;
[0011] FIGURE 6 pictographically illustrates a plurality of evidentiary displays obtained from digital files of the 2:00 AM crime scene;
[0012] FIGURE 7 depicts an embodiment of the remote surveillance system;
[0013] FIGURE 8 depicts an embodiment of camera and hardware components of the remote surveillance system;
[0014] FIGURE 9 depicts a sub-system flow chart of the wireless portion of the remove surveillance system;
[0015] FIGURE 10 depicts screenshots relating to the camera position and viewable images obtained;
[0016] FIGURE 11 depicts a screenshot activated to present a live view of a remotely surveilled space;
[0017] FIGURE 12 presents a screenshot to view the content of an archived image file; [0018] FIGURE 13A present a flow chart overview of viewing an archived image file;
[0019] FIGURE 13B present a flow chart overview of viewing the archived image file and conveyance of user commands to the surveilled space;
[0020] FIGURE 13C present a flow chart overview of viewing a live image file and conveyance of user commands to the surveilled space;
[0021] FIGURE 14 presents a listing of software programs configured to operate camera, communication, and support equipment of the remote surveillance system;
[0022] FIGURE 15 presents screenshots for obtaining archived digital video and/or audio files by time and calendar date;
[0023] FIGURE 16 presents a screenshot of a video play list categorized by officer, dates, and start and end times;
[0024] FIGURE 17 presents a screenshot of a user editor having hierarchal rights to grant or deny permission to a requestor to observe or listen to a digital image and/or audio file;
[0025] FIGURE 18 is a screenshot of a CarCam archive;
[0026] FIGURE 19 depicts a screenshot for assigning a case number associated with a time block segment of a digital video file;
[0027] FIGURE 20 depicts a screen shot aiding a user to retrieve case ID blocks by category;
[0028] FIGURE 21 depicts a screen shot having a series of thumbnail images retrievable by category;
[0029] FIGURE 22 illustrates more information regarding the tilt, pan, and zoom (TPZ) camera; and
[0030] FIGURE 23 illustrates a server screenshot and associated functions provided by the instructions contained within the software code residing in computer readable media. DETAILED DESCRIPTION OF THE PARTICULAR EMBODIMENTS [0031] The system hardware and software components are unique and designed specifically to support public safety surveillance applications in which a space is remotely observed by cameras and camera images obtained therein are digitally stored having sufficient resolution and under protocols to meet evidentiary standards. Image storage protocols provide a chain-of-custody data management and a built-in audit trail history to image files remotely accessed and/or retrieved by authorized personnel for off site or on site viewing.
[0032] The system's remote image acquisition and evidentiary storage protocols provides a force multiplier effect in an effort to find a way to offset the sharply increasing workload of the field officer. Remote accessing and/or retrieval for on site viewing (viewing within or closely nearby the surveilled space) or off site away from the surveilled space can utilize a cellular network configured with adequate data bandwidth. Images viewed by the authorized personnel can utilize microprocessor based devices equipped with the Intel® Core Duo™ processor or the AMD® 64 Athlon1"1 64 processor that enable a continuous background video capture process while enabling full-speed, near-real-time control activities from the same processor.
[0033] Alternate embodiments for the cellular network can include WCDMA and EV-DO bandwidths. The Wideband Code Division Multiple Access (WCDMA) cellular network delivers approximately 152.6Kb/s data rates and is roughly comparable to digital subscriber line DSL speeds. The Evolution-Data Optimized (EV-DO) permits video acquisition and play back to the field officer at rates better than 500 Kb/s. Other alternate embodiments for the cellular networks include revision upgrade to the EV-DO standard, specifically Revision A. Thus the alternate system embodiments provide to the local jurisdiction or region can be served by the Revision A EV-DO that can enable full-motion, full-featured, recorded and/or live video dissemination of the remotely surveilled space. [0034] Embodiments of the remote surveillance system are adaptable for use by village, city, regional or other governmental or authorized private entities to provide a rapidly deployable, mobile, wireless video and audio communications network to increase drug interdiction and address other activities occurring in high crime areas. Mobile video can work as a force multiplier, crime deterrent, and can significantly enhance our ability to respond to community requests for special focus crime prevention. The emphasis can be on enabling patrol officers and special operations teams to quickly set up a surveillance system that can be observed remotely, as needed. These images can be viewable from designated monitoring stations and have the flexibility to support multiple agencies.
[0035] The system can enable law enforcement to connect into both public and private sector surveillance systems. This can aid in the detection, intervention, investigation, and prosecution of criminal activity. Officers can have mobile video equipment that can be placed on the dash of their car, carried with them, or left on location. These images can be transmitted to the officer's laptop and/or a command center, as well as shared by other officers involved in the event. Drug trafficking areas, domestic violence locations, construction sites, and many other areas of interest can be temporarily monitored, as requested. Video surveillance "kits" would also be available for use for search warrant and SWAT surveillance - before, during and post-event - and would be used in situations where event monitoring is necessary. For example, the video surveillance kits may include rapidly deployable cameras with wireless communication ability to convey and store digital images onto digital storage mediums. Live and stored digital images enable remote monitoring of present time and historic viewing of surveilled or examined spaces from nearby structures or vehicles having viewing displays in wireless communication with the digital storage mediums or the rapidly deployable cameras. Thus, monitoring could be done from a tactical van, via a handheld device or multiple handheld devices, and/or from a precinct, headquarters, or communication center, allowing for viewing from a distance in stationary environments or in moving environments of an approaching vehicle, thereby increasing officer safety.
[0036] General scenarios illustrated below concern remote monitoring of designated spaces of interest, including known or suspected crime scenes or areas demonstrating or suspected to harbor threats to public safety and security. Scenarios include but are not limited to: 1. Citizens observe drug trafficking, but by the time law enforcement is notified and can respond, the offenders are gone. Mobile video can enable remote surveillance of a designated area, allowing officers to observe and respond much more quickly; 2. Business parks have been the targets of criminal activity. The community has requested more patrol to act as a deterrent. Since resources are limited, officers can strategically place cameras around the area and continue patrolling their current assignment but be able to observe late night activity and respond as needed; 3. Construction sites often have equipment and materials stolen in the night. Placing a mobile video camera at the work site can allow officers to respond immediately as thefts occur; 4. Domestic violence offenders often return to threaten victims, but leave before officers can respond. Having a mobile video unit available can give citizens an opportunity to allow surveillance of their location, if desired, and provide an immediate notification and timely intervention by law enforcement; 5. Major incident responses often tax the resources of emergency responders. For example, at 4:30 a.m. a container off-loaded from a ship explodes. The first units to respond are overcome by a chemical odor. Several individuals are reported dead near the site. A quick response video surveillance team installs four linked wireless cameras around the site at safe locations. Managers at the incident command post are quickly able to see all areas in and around the explosion site in a remote controlled live video environment. The cameras begin in a low light setting supplemented by forward-looking infrared (FLIR) imagery until dawn allows for full color video. [0037] Other embodiments of the remote surveillance systems include the ability to capture video/audio from a wireless camera by police or designated personnel, the camera's focus and frame a field of view by lens zooming, and to control when to make their camera's images available to authorized personnel. Image access includes the ability to store, pan through, and freeze frame video images and to extract audio information. Image recording includes digital storage of image and associated audio files, and further includes the ability to capture tabular data associated with each video session, are described in the descriptions and figures below.
[0038] The remote surveillance system also includes the ability to capture tabular data associated with each video session and to display video/audio from any wireless laptop computer by police officers, command, or other authorized personnel. The ability to search and select available video systems whether they are operating from a mobile or stationary environment is another embodiment functionality of the system. Alternate embodiments for the remote surveillance system include MS SQL Server, a IIS, a 14TB NAS subsystem, XP and Windows 2000 Clients, a 100 MB Ethernet LAN and DS3 Internet connectivity, a Cisco PIX firewall, a MS Active Directory and Novell Directory Services. The mobile component of the remote surveillance system can include XP and Windows 2000 Laptops, GPRS/G3 air cards, Cisco and NetMotion VPN.
[0039] FIGURE 1 pictographically depicts an embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with headquarters via cellular-based wireless, non-cellular wireless, and wired communication using the Internet under live and historic viewing scenarios. The camera includes tilt, pan, and zoom (TPZ) functionality so that different viewing angles and fields of view may be obtained by the surveilled scene or space. A remote control system 10 includes at least one tilt pan and zoom (TPZ) camera 12 with rotational view of a monitored space 14. Other TPZ cameras 12 can be positioned as needed to expand the viewing range or acquire additional details in depth of the surveilled or monitored space 14. If suspected criminal activity is exhibited or otherwise indicated, the monitored space may be referred to as a crime scene 14. The surveillance scene or monitored space 14 depicted in this example illustrates an indicated crime in progress showing a robber with a sack of money fleeing from a house to a getaway car during a 2:00 AM timeframe designated by the crescent Moon. The live view of the crime scene 14 is conveyed from the at least one TPZ camera 12 to a near-scene storage computer 16 for storage. The near-scene computer 16 is equipped for subsequent wireless transmission. Video image and/or any audio content stored within the near-scene computer 16 are relayed via wireless signal 24 to a cellular tower 26. The cellular tower 26 sends the images and any audio content of the live crime scene 14 to a digital computer receiver 30 configured to send digital information content of the crime scene 14 by wired connection 32 to the Internet 36 in signal communication with a dispatch or communication center's computer 40. Personnel controlling the dispatch computer 40 can view the surveillance scene or monitored space 14 under live or present time, in this case at 2:00 AM. Alternatively, dispatch personnel controlling the computer 40 can retrieve stored images of the 2:00AM crime or surveillance scene 14 from the computer 16 via the wireless signals 24 and 28 to view the 2:00AM crime or surveillance scene 14 after the fact, or historically, depicted with a Sun on the right at 2:00 PM during the day.
[0040] FIGURE 2 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with headquarters via cellular-based wireless, non-cellular wireless and wired communication under live and historic viewing scenarios. System 50 includes direct cellular tower communication with the dispatch computer 40 wireless signals 29 to permit either live or historic viewing of the 2:00 AM crime scene 14.
[0041] FIGURE 3 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with mobile vehicles via cellular-based and non cellular-based wireless communication under live and historic viewing scenarios. System 100 includes two police vehicles 100 and 114, each having a laptop computer 120 capable of receiving wireless communication via wireless signal 102 transmitted by the digital computer receiver 30 to view either images of the live crime scene 14 or to view the crime scene historically. In this scenario, the police vehicle 110 approaches the crime scene 14 while the crime is in progress, and police vehicle 114 approaches the crime scene to view the crime historically, or after-the-fact. The laptop computer 120 can also be in the form of a personal digital assistant (PDA) or tablet PC.
[0042] FIGURE 4 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with mobile vehicles via cellular-based and non cellular-based wireless communication, and separate non-cellular based communications, under live and historic viewing scenarios. System 200 is substantially similar to system 100, but also provides for direct communication of the police vehicle 110 with the near-scene storage computer 16 to retrieve live, present time images, or historic recorded images directly and independent of the cellular tower 26 via wireless signal 202 from the near-scene computer 16.
[0043] FIGURE 5 pictographically depicts an alternate embodiment of a remote surveillance system having a view of a crime scene in two-way signal communication with mobile vehicles via non cellular-based wireless communication under a live viewing scenario, and cellular-based wireless, non cellular-based wireless, and wired communication with headquarters under an historic viewing scenario. System 250 includes a combination of System 200 and system 10 in which the police vehicle 110 communicates with the near-scene storage computer 16 to retrieve live images directly and independent of the cellular tower 26 via wireless signal 202, and the dispatch computer 40 receives historic (as depicted) or live digital images via the cellular tower 26 of the digital images of the crime scene or survielled space 14 via the near-scene storage computer 16 via wireless signals 24 and 28. [0044] FIGURE 6 pictographically illustrates a plurality of evidentiary displays obtained from digital files of the 2:00 AM crime scene. In the top display, the wide-angle presentation of the crime scene is shown with the suspected robber running from the house and approaching the getaway car on court computer display 260 as image 270. In the left lower panel, a magnification of the wide-angle digital file illustrates the getaway car's license number having sufficient resolution to read the alphanumericai characters to permit the identification of the getaway vehicle in image 270A. In the right lower computer display is a magnification of the fleeing suspect having sufficient clarity and resolution to meet facial identification standards in image 270B.
[0045] Using the particular embodiments of the remote surveillance systems, officers in the city, county, or regional jurisdictions can be able to call on an electronic partner to support observation of remote spaces.
[0046] Other embodiments of the remote surveillance system include the ability for an officer to easily deploy the video and/or audio portion of the system, to camouflage the video and supporting electronics as needed for discrete deployment so as to blend in with the area or space being surveilled, and to engage remote control of a cameras lens focus to impart manual control or resetting to auto-focus as desired. The field of view by the camera can include acute, oblique, hemispherical, and depending on camera placement, spherical views of the surveilled space. The deployed camera 12 and associated electronics can view any indoor, outdoor, or combination indoor and outdoor surveilled space. Set up is amenable to easy deployment and circuitry activated by an on-off switch.
[0047] Images obtained from the camera are digitized and can include visible, infrared, and ultraviolet light sources and can be presented in color or black and white. The camera can be configured to operate under brightly lit circumstances and can include light amplification technology when ambient light is medium to low. The camera in certain embodiments can be able to zoom and read an auto license plate that is approximately 500 feet away the camera, and associated electronics can include potential tracking device, for example a global positioning satellite (GPS) apparatus in case of theft or misplacement. The GPS unit can share the antenna that supports the Wide Band Code Division Multiplexing (WCDMA) connection. The quality of the video can be set to evidentiary standards by headquarters, or as allowed, at standards other than evidentiary by the deploying officer. The video quality can also be set by remote control.
[0048] The TPZ camera 12 can be AC powered by 1 10 volts or other voltages available in local jurisdictions and can include a small DC powered battery to provide backup or supplemental support for AC power supplies. The auxiliary DC battery can preferably meet power requirements for the camera, transmitter, and supporting electronics for approximately 4-12 hours. The TPZ camera 12 and associated electronics and power supplies are constructed to operate within hazardous environmental conditions and not ignite flammable fuels during normal operation.
[0049] Digital storage media in communication with the TPZ camera 12 can be configured to store digital video and/or audio content of the surveilled space. The length of the digital recording within the digital storage media in communication with the TPZ camera 12 can be configured to store at least 4 hours of digital video and/or audio content of the surveilled space. Digital storage mechanisms within the TPZ camera 12 may be configured to store at least 8 hours of digital and/or audio content. Alternatively, the near-scene storage computer 16 may be configured to store at least 8 hours of evidentiary quality digital video and/or audio files. Variable recording rates are possible and may be selected to a desired frame per second (FPS). The desired frame rate can be between about 15 and about 60 FPS. When the surveilled scene exposes the camera to vibrations or other jarring actions, images acquired may be taken with motion or image stabilizing circuitry and devices associated with the camera. [0050] Alternate embodiments of the remote surveillance systems include the TPZ camera 12 being capable of motion sensing activation. Camera activation can occur within approximately 1 minute of a sensed motion and to continue acquiring video and/or audio content approximately 5 minutes after motion sensing has ceased. The system may be able to trigger a software alert based on motion detection and motion detection settings and thresholds of the camera may be adjustable. The software may include motion detection alert notification protocols through an Application Program Interface (API) to support various alarm presets and thresholds. The camera may be configured with alarm presets that are communicated to headquarters' computer systems or to the laptops occupying the mobile vehicles.
[0051] The camera may also be configured to concentrate on regions of interest within the surveilled space by a center-on-click operation. Preset tours of the monitored space may be programmed remotely by precinct headquarters, the communications center, or via instructions conveyed by the software operating from laptops engaged by designated officers granted rights to take preset tours or otherwise remotely modify the preset tours by modifying any of the tilt, pan, and zoom operations of the camera. Depth of focus may also be remotely modified by headquarters or designated vehicle officers and varied with the regions of interest of the monitored space.
[0052] Alternate embodiments described above may be utilize Application-Specific Integrated Circuits (ASIC) programmable with selectable code-decode (CODECs) standards. Encryption and security protocols may utilize at least 128 bit encryption (AES) with FIPS compliance to permit secure transmission from the TPZ camera 12 and/or near-scene storage computer 16 and precinct headquarters, the communication centers, and to those laptops 120 granted access rights occupying stationary or mobile vehicles 110/114.
[0053] FIGURES 7-22 illustrate alternate embodiments of the particular embodiments illustrated in FIGURES 1-6. The alternate embodiments include multiple cellular towers, alternate designs of the remote camera 12, alternate embodiments of the near surveilled space computer 16, alternate embodiments of the receiving computer 30, and descriptions and illustrations of screenshots of computer executable programs. In implementing the alternate embodiments, various components of the SecureEye Systems' Rapidly Deployable Video Monitory System can be used.
[0054] The system hardware and software components are unique and designed specifically to support public safety surveillance applications in which a space is remotely observed by cameras and camera images obtained therein are digitally stored having sufficient resolution and under protocols to meet evidentiary standards. Image storage protocols provide a chain-of-custody data management and a built-in audit trail history to image files remotely accessed and/or retrieved by authorized personnel for off site or on site viewing.
[0055] The system's remote image acquisition and evidentiary storage protocols provides a force multiplier effect in an effort to find a way to offset the sharply increasing workload of the field officer. Remote accessing and/or retrieval for on site viewing (viewing within or closely nearby the surveilled space) or off site away from the surveilled space may utilize a cellular network configured with adequate data bandwidth. Images viewed by the authorized personnel may utilize microprocessor based devices equipped with the Intel® Core Duo™ processor or the AMD® 64 Athlon™ 64 processor that enable a continuous background video capture process while enabling full-speed, near-real-time control activities from the same processor.
[0056] Alternate embodiments for the cellular network may include WCDMA and EV-DO bandwidths. The Wideband Code Division Multiple Access (WCDMA) cellular network delivers approximately 152.6Kb/s data rates and is roughly comparable to digital subscriber line DSL speeds. The Evolution-Data Optimized (EV-DO) permits video acquisition and play back to the field officer at rates better than 500 Kb/s. Other alternate embodiments for the cellular networks include revision upgrade to the EV-DO standard, specifically Revision A. Thus the alternate system embodiments provide to the local jurisdiction or region may be served by the Revision A EV-DO that can enable full-motion, full-featured, recorded and/or live video dissemination of the remotely surveilled space.
[0057] SecureEye Systems' Rapidly Deployable Video Monitory System enables individual officers, field teams and support personnel to dramatically extend the operational coverage area and increase effectiveness in almost all situations. Using the SecureEye Systems Sentinel system, officers in the city, county, or regional jurisdictions can be able to call on an electronic partner to support observation of situations that, until now, required the commitment of an officer who was then lost to additional field service.
[0058] Making use of the existing nearly ubiquitous cellular network enables the patrol officer to call on the support of the team behind the scenes in novel ways. Now, support personnel working from the various department supervisors' desks of city, county and/or regional jurisdictions can be enabled to aid the officer with the deployment of the camera system and assist in processing or making use of the delivered data.
[0059] FIGURE 7 depicts an alternate embodiment of the remote surveillance system. The remote surveillance system includes a Law Enforcement Support Agency information technology (LESA IT) archive server in signal communication with a Dispatch, a plurality of cellular towers (towers 1-4), at least one remote camera (Sentinels 1-3) having a view of a surveilled space, and an authorized network personal computer. The Sentinel cameras are in wireless communication with the cellular towers and police or patrol vehicles. When inside the coverage of the cellular system, the Sentinel becomes instantly visible to the behind-the scenes administrative support personnel when removed from the trunk, and to distant and approach patrol vehicles. Prior to the removal from the trunk, the operability of the Sentinel system can be ascertained. A functional check query can be sent via the Mobile Digital Computer (MDC) located in the patrol vehicle. The laptop in the patrol vehicle may be connected via an Ethernet connection to the Pocket (discussed below) in the trunk of the patrol vehicle. The Pocket contains an intelligent device that maintains communication with the Sentinel and then provides a bridge link between the MDC and the Sentinel. The functional operability of the Sentinel, including the status of the Sentinel battery, is available through this link to the officer in the patrol vehicle and the support personnel at LESA IT. Dispatch includes a server equipped to run computer readable media having programmed software instruction (referred to as TYEE) to execute the functions described below in remotely monitoring, recording, accessing, and retrieving digitally stored images and/or audio files of the surveilled space in a manner suitable for evidentiary purposes.
[0060] The flexible management policy of the Sentinel system allows the Chief Administrator to set hierarchies for the various functions of control and viewing by both the support and field personnel. In fact, the Chief Administrator can segment the corps of Sentinel systems to task groups; each assigned an Administrator that can manage the control and viewing rights of their assigned group of Sentinel systems. The administrator can enable any vehicle or support personnel equipment with either wireless or wired access to the LESA servers.
[0061] An appropriate administrator can verify to the field officer that an image from the Sentinel system is visible and the unit is properly placed. The administrator can enable both support and field personnel to the various levels of control and viewing available. The deploying officer can also be so enabled and upon returning to the patrol vehicle, the officer can see the video image on his MDC screen.
[0062] If there is no cellular coverage, then the officer can use a hand-held pocket television to connect to the video signal and verify the video image. Upon returning to the patrol vehicle, the officer can use the same browser-based tools to see the Sentinel images as would be used when there is cellular coverage. When there is no cellular coverage, the Pocket intelligent device takes on the role of the Tyee server system at LESA, the main difference being that whereas the main-server-based Tyee is capable of providing management and archival services for many Sentinel systems, the Pocket as server may only manage its mated Sentinel. The Sentinel and the Pocket are linked by a new technology: a wireless link that has dramatically improved range over previous devices. In a relatively urban setting, the range should exceed 1,000 feet; in clear line of sight, the range should exceed a mile.
[0063] When operating outside the coverage of the cellular system, the patrol officer has to take on the role of administrator. The officer can point, zoom and adjust the camera. The officer can also enable other patrol units (with Pockets or PocketLite capability) that arrive on the scene to see the Live View images from the deployed Sentinel unit.
[0064] The deployed Sentinel may view any indoor, outdoor, or combination indoor and outdoor surveilled space and can operate as a slave to its mated Pocket. The Pocket units of the arriving patrol vehicles can operate as bridge units to enable their MDCs to contact the Pocket of the deploying vehicle as the managing Tyee server. Because access to the Live View is through a browser-based application, this procedure is relatively simple. The arriving vehicles can have pre-configured "Favorites" in their browser set-ups. These "Favorites" can include the list of Sentinel-equipped vehicles. By just clicking on the appropriate "Favorite" selection, the browser can point to the URL of the web page controlling the deployed Sentinel, where it can pause, asking for the correct password. The deploying officer can use his voice radio to provide passwords to enable arriving officers.
[0065] This scenario can be implemented for up to four Sentinels on a given scene. All four of the deploying vehicles can see the Live View from all four deployed Sentinels; any number of authorized Pocket- or PocketLite-equipped vehicles can see the Live View from each of the four deployed sentinels.
[0066] FIGUPvE 8 depicts an embodiment of camera and hardware components of the remote surveillance system. The SecureEye Systems' Rapidly Deployable Video Monitoring System comprises three functional blocks: (1) a deployable camera device, known as Sentinel that includes a tilt, pan, and zoom (TPZ) functionality; (2) the interface in the trunk of the patrol car, known as the Pocket, and (3) the backend system known as the Tyee.
[0067] The Sentinel unit consists of four major component groups. These groups are: (1) the TPZ camera; (2) the main processor unit with the communications unit; (3) the power management unit; and (4) the power supply, which includes the battery and GPS. The Sentinel TPZ camera device is a small box (approximately 10" x 10" x 16") with a plastic dome protecting the tilt, pan and zoom camera inside. The Sentinel is small enough that several different disguises can be used to mask its real purpose. To deploy, the officer simply removes the unit from the Pocket by unplugging the power and data connectors and lifting the mechanical restraint bail, then positions it to monitor a situation where a remote observer is needed. For operational verification, the officer can either ask dispatch to confirm that the image they see is satisfactory; return to his car and examine the transmitted image directly, or make a wired connection to the unit and examine the video output directly on a hand-held pocket TV.
[0068] FIGURE 9 depicts a sub-system flow chart of the wireless portion of the remove surveillance system in signal communication with the TPZ camera device of FIGURE 20. The TPZ unit (FIGURE 20 - Sl) includes a rugged tilt and pan unit that is made from quarter-inch 6061 aluminum plate. It is rugged, yet relatively lightweight and conforms to the small feature size of the Sentinel. The camera is a high-quality Sony® 980 block camera with 26X optical zoom, image stabilizer and Infrared image capability. SES has augmented the Sony® core with interface electronics (S5) allowing remote operation and a bank of illuminating Infrared LEDs (S4) for application in total darkness.
[0069] The communications unit actually shares physical accommodations on the mini-ITX board where a mini-PCI and a mini-PCI Express socket provide support to a unique 802.1 lg/900MHz transceiver and a WCDMA EV-DO Rev A transceiver (S3, S6). Both of these devices are exceptional in their current systems performance but also in their opportunity for growth. The 802.1 lg/900 MHz device provides all of the IP protocol optionally advantageous to support the full web-based back-end structures.
[0070] The power supplies (S7, S8) developed by SecureEye Systems deliver performance that is optionally advantageous to meet the operational demands of the Sentinel system. These high frequency switching power supplies deliver efficiency that is greater than 88% over the battery's entire operating range. The Sentinel device is capable of using either of two batteries. The larger battery is a 50-Amp-hour (600 Watt-hours) Lithium Ion device (S/P2a) that can power the Sentinel for more than eight hours. A second alternative is a 27-Amp-hours (324 Watt-hours) sealed, glass mat lead-acid dry cell battery that can power the Sentinel unit for about six hours (S/P2b). The major difference between these batteries is price. Both batteries are non-gassing and certified safe in the trunk of a patrol car where the air is exchanged with the passenger compartment.
[0071] The Sentinel TPZ camera device unit draws about 60 Watts in full operation. The power consumption breakdown allocates about 40 Watts to the process, memory and hard drive. The tilt and pan mechanism draws a continuous 6 Watts of power. This system is designed with direct drive stepper motors that dynamically manage the position of the camera. Because of the orientation of the camera relative to earth vertical is not known, one way to manage the tilt and pan positioning is dynamically, with the motors always engaged. The GPS unit (S8) shares the antenna that supports the Wide Band Code Division Multiplexing (WCDMA) connection (S2) and delivers once per second position updates to both the evidentiary data that is captured in the remote archive and the live view data sent to the Tyee for distribution. Other embodiments of the TPZ Sentinel camera device include at least one of the characteristics in Table 1:
CAMERA PERFORMANCE SPECIFICATION
Figure imgf000022_0001
[0072] The Pocket in the trunk of the patrol car is a receiver for the Sentinel unit. The Pocket securely locks the Sentinel in place in the trunk of the patrol car and provides power and data connections to the Sentinel device. {See FIGURES 7 and 8 above, and 22 below.)
[0073] The Pocket unit consists of four major component groups. These groups are: (1) the intelligent device — single board computer; (2) the vehicle interface unit; (3) the communications unit; and (4) the power supply, which includes the battery. [0074] The intelligent device is a single-board computer and supporting hard drive (FIGURE 8 - P2) hosting an application that serves several main roles. When the Sentinel is in the Pocket and the vehicle is on patrol, the Pocket intelligent device is continuously assessing the status of the Sentinel system. The Sentinel status information is available to the MDC and to the officer in the vehicle. If the vehicle is within cellular coverage, then the status information can be accessed by the support personnel at LESA. If the vehicle is outside of the cellular coverage the status information can still be accessed by the officer in the vehicle.
[0075] If the vehicle is outside the cellular coverage, then the intelligent device provides another role. Using a browser interface running on the vehicle MDC, the officer can select the Sentinel system to operate on the local WAN (S6/P2) provided by the Pocket and the Sentinel. In this case the intelligent device in the Pocket takes on some of the character of the Tyee video network management system. The officer in the car can have the same interface available as when the vehicle is under cellular coverage. Additionally, the officer can have the control interface available that the administrator has when under cellular coverage.
[0076] The vehicle interface unit (P3) monitors the status of the patrol vehicle. It knows when the vehicle is running. The vehicle interface unit also knows the status of the battery in the Sentinel unit and the status of its own battery in the trunk. When the patrol vehicle is parked and monitoring the Sentinel unit through the Pocket interface and local WAN link (S6/P2), the battery in the Pocket (S/P2a or S/P2b) protects the vehicle battery by powering the Pocket unit. All of these data points are monitored once a minute and the data is collected in the operational logs of the Sentinel system. The logs are off-loaded when the video data is off-loaded.
[0077] The communications unit in the Pocket provides three communications services. It supports the local WAN using 802.1 Ig protocols and operating at 900 MHz (S6/P2). This technology provides uncompromising range to support unobserved operations between the vehicle and the Sentinel. Since range is inversely proportional to the square of the frequency when all other parameters are the same, this system has more reach than a comparable system operating at 2.4 GHz.
[0078] The Pocket also serves as a bridge between the Sentinel and the MDC (E1/E2) to enable support and administrative personnel to verify the status of the Sentinel as ready for deployment.
[0079] The third communication service provided by the Pocket is a direct interface to archival storage when the vehicle is at the precinct or station. At the precinct or station the Pocket (P2) makes contact with a 802.1 lg/900MHz access point at the station to provide a high speed path for the off-load of all the data collected during the deployment of the Sentinel. This is a hands-off, automated transfer that moves all of the recorded video data and operations logs from the Sentinel field assignment to the fully managed and audited archive services provided by Tyee.
[0080] The Pocket uses the same high-efficiency switching power supplies (P4) as the Sentinel. But, as an option, the battery unit can be a larger, sealed glass mat type battery. A larger battery can significantly shorten the recharge time for the Sentinel unit. The internal resistance of the glass mat type batteries is very low. This low internal resistance means that there is no internal heating associated with rapid charging. A fully charged 100 Amp-hour glass mat battery in the Pocket would recharge even a completely discharged battery in the Sentinel in less than 15 minutes.
[0081] FIGURE 10 depicts screenshots relating to the camera position and viewable images obtained. In signal communication with the Tyee Server, a term designating the software application that provides both a server-based control interface and a video archive that uses Network Attached Storage (NAS) for the managed archival function. The Tyee server sub-system is based on the video management and archival systems that [0082] The Tyee provides an interface that allows password-enabled administrators, power users and users to: (1) make network- wide administrative decisions; (2) initialize groups of Sentinel units; (3) check the status and initialize an individual Sentinel; (4) control the camera parameters (e.g., TPZ, quality, motion detection) of an individual Sentinel; and (5) view the live or archived video produced by Sentinel units.
[0083] While the Sentinel is within cellular coverage, an authorized user can control a deployed Sentinel's TPZ via the password-protected browser-based interface. Even with a password, Tyee still follows a hierarchy of enabled users to allow priority users to take control. The camera can default to automatic exposure/focus, but the user interface allows going to manual control of camera image settings, such as brightness control, focus, gain, shutter speed. Additionally, the system allows an authorized user to pull a motion detection zone across any part of the image and to set the threshold levels of motion to cause a trigger.
[0084] The Tyee also enables a user at the precinct, station, or in a vehicle in the field (on the LESA cellular network) to view live images from a deployed Sentinel unit via the Live View capability. An authorized user can select the size, speed or quality of the video being transmitted from the deployed Sentinel, and can choose to grab and store on NAS disk a Live View snapshot for later viewing. While the size, speed or quality setting affects the LiveView images seen, the deployed Sentinel continues to record high fidelity smooth motion video for later offload to the central server. The recorded video is automatically offloaded wirelessly whenever the patrol unit returns to the precinct. Both the live and the recorded video either transmit or store associated data such as date and time and GPS coordinates.
[0085] An additional feature of the Tyee is its built-in logging system that makes and keeps a record of every user action associated with a Sentinel unit or the data in the archive. Reports of user actions are available to administrators, searchable by Sentinel unit, user, date, action, GPS data, CaselD, and other logged parameters. [0086] FIGURE 11 depicts a screenshot activated to present a live view of a remotely surveilled space. Images Are Stored As Designated By The Officer Or Supervisor. All of the transmitted video files are archived on the NAS and entries made in the SecureEye Systems archive SQL-based database. For audit trail and evidentiary reasons, users are not allowed to delete video. Users are allowed to view video and mark selected video segments with Case IDs to facilitate retrieval and playback. Also, during Live View, users may select an image to snapshot and store on the NAS, in addition to the regular archived video. Video can stay resident on the NAS disk until the expiration of the stated department policy retention period. Access to the video stored is facilitated by the "Pick" screens in the server- based user interface. For any video desired to be played back, the authorized user logs in, selects the appropriate camera from the list presented. He is then allowed to pick a date from a calendar (any day with video is underlined to show that it is selectable); then a screen showing an indicator for each segment of available video is used to click on the desired times. See FIGURE 18 below for examples of a date and time "Pick" screenshots.
[0087] FIGURE 12 presents a screenshot to view the content of an archived image file. A report may be generated formatted for an archive access, camera updates, and be editable by camera ID number, view parameters, and viewing dates and times. The reports may be associated by officer badge number and user number.
[0088] There three modes of video/data flow and operation for the Sentinel, based on cellular coverage and type of video. These modes are depicted in the following set of three flow diagrams.
[0089] FIGURE 13A presents a flow chart overview of viewing an archived image file and illustrates the creation and flow of archived video. Achievable video is shown flowing from the deployed Sentinel unit, through the Pocket device via its LAN, then up to the central server's NAS via the 802.1 lg/900 link described in previous sections. This operation is independent of the availability of the cellular network. Once the video data is archived on the NAS, authorized users can access the video for playback via the SES browser-based application. This application is part of the Tyee system as described above and records all accesses to the video. A simple, graphical interface shows the user where video data is available, allowing selection to any one-minute boundary with a few clicks of the mouse. This user interface also allows creation of a CD or DVD (on workstations with CD/DVD-writers), to disseminate video to other agencies or authorized parties. The CD/DVD created can contain everything optionally advantageous to play the video back. As with all actions on the Archive, a log is kept of any CD/DVD's made.
[0090] FIGURE 13B present a flow chart overview of viewing the archived image file and conveyance of user commands to the surveilled space. LiveView and Control is via Wireless Carrier Link and illustrates the flow of live video data and camera commands when the Sentinel is deployed within the cellular coverage area. Operators who have authorized access to LESA servers over any wired or wireless network can control the camera parameters via the interface described in FIGURE 22 above. Similarly, LiveView is available from the Sentinel to precincts/stations or vehicles, as well as to other vehicles that have authorized access to LESA servers over any wired or wireless network. The Pocket in the vehicle is not needed to facilitate this flow of data and control. Once the Sentinel is deployed, the vehicle with its Pocket does not need to remain in its vicinity.
[0091] FIGURE 13C present a flow chart overview of viewing a live image file and conveyance of user commands to the surveilled space. The LiveView and Control outside the Cellular Coverage Area: When the Sentinel is deployed outside the cellular coverage area, LiveView and control of the camera is still enabled for Pocket- or PocketLite-equipped vehicles in the vicinity. PocketLite refers to SES's option to provide an 802.1 lg/900 capability to vehicles without a full Pocket/Sentinel kit. The deployed Sentinel's mated Pocket now acts as the server and access point for transmission of the LiveView data via the 802.1 lg/900 link. Vehicles within the transmission range (which is a circle of at least 1000- foot radius) can be able to see live video from the Sentinel by linking to the mated Pocket. Up to four deployed Sentinels can function in proximity in this mode, delivering live video to any number of vehicles enabled on the 802.1 lg/900 network.
[0092] FIGURE 14 presents a listing of software programs configured to operate camera, communication, and support equipment of the remote surveillance system. The software architecture and applications enabling the Sentinel system were developed for public safety. The software is a complete, end-to-end system. SecureEye Systems uses its own software CODEC because it is important to tie the data structures from video and audio capture through to the archive and validation function.
[0093] FIGURE 15 presents screenshots for obtaining archived digital video and/or audio files by time and calendar date. Alternate embodiments employing the SecureEye Systems include a function specific video player in order to manage the video and associated data throughout its life cycle under evidentiary standards. In order to produce a complete audit trail, the logging function needs to be aware every time the data is played and by which user ID. The player is delivered with appropriate rights allowing the agency to control the distribution of the player any way it wants, except to put the player into the public domain. As private property, the city, county or other governmental authority can deliver a video CD/DVD with player to a defense lawyer with restrictions on its use.
[0094] FIGURE 16 presents a screenshot of a video play list categorized by officer, dates, and start and end times of a pick list for CDs. A window showing a CD file play list may be identified by officer badge number to identify a chain of possession of an authorized and verifiable digital image and/or audio file duplicate. In another window a folder listing having a series start and end time pick lists is displayed.
[0095] The SecureEye Systems archive allows the agency to make a copy of the video data in an industry standard format. When this happens, a record is made of who made copies of which data and when. The industry standard formatted material can be distributed without restriction to use an industry standard player.
[0096] The software components of the Sentinel system are all based on existing products from SecureEye Systems' library of applications developed specifically for public safety. Several of these products may be configured for alternate embodiments of the Sentinel remote surveillance systems.
[0097] Of the software components for the Sentinel itself, the SES Live View client application may be configured in alternate embodiments designed to have first level of control at the capture end of the system, and optionally, control at the server end of the system. This application may be restructured to shift control to the remote user end of the system (the administrator at the precinct/station). The SES LiveView application gives the user at the server end of the system the ability to shift the live video stream from fewer larger images delivered every second to smaller images delivered every second. The current cellular network can up-link at the rate of 152.6Kb/s. Since for LiveView it is optionally advantageous to deliver complete images, this system delivers jpegs. Full jpeg image of nominal quality can be 70Kb per image, while a reduced size image of nominal quality can be about 20Kb per image. Thus the user has the ability to trade from about two relatively high quality images per second to about eight lower quality images per second.
[0098] The up-link speed of the EV-DO Rev A cellular network enables up-linking at greater than lMb/s, providing enough margin the available bandwidth that the SES LiveView technology can switch to an mpeg-based compression scheme and deliver a full 30 fps video stream.
[0099] The video recording application at the Sentinel, SESystem, receives control inputs from external applications. The interface to this application can support inputs from the remote user. This application currently supports "pre-event" recording in a configurable format from zero to 30 minutes of pre-event buffering. An event can be defined as a motion alert, at which time it can begin archiving the video data (reaching backwards in time for the number of minutes configured in the pre-event recording setting).
[00100] This recording technology is unique in that it captures video and/or audio data in one-minute segments normalized to Greenwich Mean Time (GMT). Partial minutes are padded out and properly indexed. Time synchronization is by network or GPS reference. This technology allows the synchronized playback of any video stream and any audio stream. It also enables the use of the SES Playlist which provides a graphical user interface that allows the user to start playback and end playback on any one-minute boundary, thus dramatically simplifying the user interface for the management of extremely large video archives involving many cameras and audio streams.
[00101] The TPZ and camera control applications can also accept inputs from the remote user through the web server interface. The TPZ interface allows the user to click in the image to re-center the view. The system also allows the user to move by frames or degrees and to set the zoom. The system also allows the user to set up a tour of presets that encompasses tilt, pan and zoom adjustments to each stop. Additionally, the system allows the user to pull a motion detection zone across any part of the image and to set the threshold levels of motion to cause a trigger.
[00102] The control interface allows the user to change many of the camera's features in real-time, or to return the camera to fully automated operation.
[00103] The applications running in the Pocket may be configured with modified software code in alternate embodiments to allow functioning on web servers modified to support ASP controls remote users.
[00104] At the Tyee server only the SES LiveView has to be significantly altered from its current functionality. As local control moves from the capture end of the system to the remote user end of the system, alternate embodiments may be configured of the SES LiveView program. [00105J Additionally, the SES LiveView has to support a new function. The GPS Live View data can be packaged with GPS data as a means of self-preservation in case of theft. The Tyee can keep track of the locations of each of the Sentinel units when their operators give the indication that their positions are fixed. Until they are released from this restraint, an alarm can be issued if the Sentinel GPS data indicates that the unit has moved. This alarm can be in the form of an API to allow appropriate data to be sent to Dispatch or LESA control. In the case where the Sentinel is operating without the coverage of the cellular network, the data may be managed by the Pocket providing service in the delivery patrol car.
[00106] Following this is the spreadsheet provided in the RFP giving the detailed specification for the Rapidly Deployable Mobile Wireless Video system and showing SecureEye Systems' response to each of the specification items. As can be seen in the column for meeting requirements, we believe we meet nearly all requirements stated, with a few caveats or exceptions.
[00107] ASIC (Application-Specific Integrated Circuit) based CODEC software provides for greater configurability than is available in a hardware CODEC. The application and software CODEC allows dynamic reconfiguration in response to real-world events.
[00108] FIPS Compliance. Although the camera has very high fidelity, the video signal is modulated to NTSC or TV. To be completely compatible with Windows, the software abstracts the video to a 320 by 240 pixel image, captured at 30 fps using one field of the video. It is possible to capture both fields and inter-modulate for a 640 by 480 image. The LiveView video can be transmitted at the maximum rate allowed by the available bandwidth. In one embodiment for wireless coverage, the image can be transmitted at least once per second for a larger image and faster for a smaller image. In another embodiment employing Evolution Data Optimized EV-DO Rev A, the transmission rate increases to approximately 30 fps. Also, in LiveView, the fidelity/rate and size (selectable as either 320 x 240 or 16O x 120) are selectable by an authorized user on the LESA network. [00109] CODECs and Image Transmission Built Into Camera. The CODEC and image transmission capability are built into the Sentinel device, which contains the camera, as well as the tilt-pan mechanism and intelligent video processing and communications electronics.
[00110] Hot Swappable Mobile Recording Device. If necessary, Sentinel could be configured to copy the video to a removable device, but not moved to a removable device. The system always provides an audit trail (digital chain of custody) which would be violated if the only copy were allowed to be removed physically. The Sentinel may store up to 100 hours or more of video, so storage capacity in the camera device is sufficient for substantially most surveillance needs. When the device is within range of the precinct or station, it can automatically offload all video and data files to the NAS disk - without user intervention.
[00111] Image Is Viewable By Standard Video Viewing Software. The SecureEye Systems' Tyee server-based system has the capability to make a CD containing the selected video plus all playback files optionally advantageous to run on a computer without any other SecureEye Systems' applications. With export tools, the digital video can be converted into a standard-playable format for those times when it is optionally advantageous to make an mpeg-compatible version.
[00112] FIGURE 17 presents a screenshot of a user editor having hierarchal rights to grant or deny permission to a requestor to observe or listen to a digital image and/or audio file. Method employed allows a System Administrator to restrict the access to a specific workstation. System Administrators grant or deny access to specific devices via user IDs and passwords. In addition, workstations can be denied access to the playback ActiveX component if the workstation is password protected from downloading browser-based components. That is, if the policy of the department is that only system administrators can load programs or components, this protection can extend to the ActiveX component which is the SecureEye Systems video player. Windows showing which police vehicle and/or user official is denied or granted access to the TPZ cameras viewing the surveilled space.
[00113] Several of the specifications indicate a requirement to track the access of all viewed data. The SecureEye Systems Tyee server-based component keeps track of everyone who logs in, from what IP address, date and time, and what actions were taken whether it is viewing of archived data or updating of camera or user parameters. These logs are available to an administrator, who may request logs by user, by camera, by date/time, or by action.
[00114J FIGURE 18 is a screen shot of an example report screen derived from archived reports. A report is selected based on user ID, camera ID, date/time, and other search parameters. These parameters are associated with a given officials badge number or user ID number at the indicated screenshot windows. Other specifications ask for the ability to create Case IDs and associate video and other data with this case ID. The Tyee system allows the authorized user to select video segments and assign them to a Case ID {See the "Assign Case #" blue bar near the top of 19 below). When this button is selected, the following screen is displayed.
[00115] FIGURE 19 depicts a screenshot for assigning a case number associated with a time block segment of a digital video file. Using the assign case number blue bar, a case number is entered in the indicated case number data field and the other indicated data fields are filled. The other data fields include the TimeBlock ID number, the camera location, the camera description, the time block, the subject, and a window of additional comments. In the case when a camera identifier is selected, the screen shot is programmed to fill in the date/time and other data fields for a given video segment.
[00116] FIGURE 20 depicts a screen shot aiding a user to retrieve case ID blocks by category. The Tyee software sub-system pre- fills the date/time of the selected video, as well as the camera description and ID. The user enters the desired Case Number, Personnel or Interviewer associated with the video, Subject of the video, and any additional comments optionally advantageous. After video or snapshots are assigned a Case ID, they are retrievable through the Case ID screen. Any of the entered fields may be used to retrieve the video stored with Case IDs, as shown in the tillable text fields. When the video segment is located, a link to it is presented and clicking on this link can bring up the desired video for playback.
[00117] FIGURE 21 depicts a screen shot having a series of thumbnail images retrievable by category. In this screenshot a panel of ten images is shown that are retrievable by storage date, or by assigned Case ID number. Snapshots saved via the LiveView capability (as well as any digital images read in), can be archived and retrieved in a similar way to the video. The images are stored according to date and time, all images from a given time frame may be requested and viewed. Also, snapshots can be assigned Case IDs and retrieved this way, along with the video (as in the screen in FIGURE 20).
[00118] FIGURE 22 illustrates more information regarding the tilt, pan, and zoom (TPZ) Sentinel camera. The TPZ camera is seen to be of rugged construction and serves as a readily deployable mobile witness to perform remote surveillance.
[00119] FIGURE 23 illustrates a server screenshot and associated functions provided by the instructions contained within the software code residing in computer readable media.
APPENDIX
Specification Appendix A: Particular and alternate embodiments
Figure imgf000035_0001
Figure imgf000036_0001
Figure imgf000037_0001
Figure imgf000038_0001
Figure imgf000039_0001
Figure imgf000040_0001
Figure imgf000041_0001
Figure imgf000042_0001
Figure imgf000043_0001
Figure imgf000044_0001
Figure imgf000045_0001
Figure imgf000046_0001
Figure imgf000047_0001
[00120] [00121] While the preferred embodiment of the invention has been illustrated and described, as noted above, many changes can be made without departing from the spirit and scope of the invention. For example, standardized players may be configured using programming software shell to provide access control and audit function in viewing non- alterable digital files. Other particular and alternate embodiments of the remote surveillance system is described in the attached Specification Appendix A. Accordingly, the scope of the invention is not limited by the disclosure of the preferred embodiment. Instead, the invention should be determined entirely by reference to the claim that follows.

Claims

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:
1. A method to remotely monitor a space comprising: installing at least one camera having a view of the space, the at least one camera being in signal communication with a first processor and configured to wirelessly communicate to at least one display having a second processor, the at least one display being remotely located from the space and in signal communication with a digital storage medium; capturing substantially full motion video images of the space by the at least one camera; converting the substantially full motion video images to an encrypted digital data stream using the first image processor; wirelessly transmitting the encrypted digital data stream to the second image processor; storing the transmitted, encrypted digital data stream in the digital storage medium; decrypting the transmitted, encrypted digital data stream using the second processor to reform the substantially full motion video images; and viewing the reformed, substantially full motion video images on the at least one display.
2. A system to remotely monitor a space comprising: at least one camera having a view of the space, the at least one camera being in signal communication with a first processor and configured to wirelessly communicate to at least one display having a second processor, the at least one display being remotely located from the space and in signal communication with a digital storage medium; means for capturing at least one substantially full motion video image of the space by the at least one camera; means for converting the at least one substantially full motion video images to an encrypted digital data stream using the first image processor; means for wirelessly transmitting the encrypted digital data stream to the second image processor; means for storing the transmitted, encrypted digital data stream in the digital storage medium; means for decrypting the transmitted, encrypted digital data stream using the second processor to reform the substantially full motion video images; and means for viewing the reformed, substantially full motion video images on the at least one display.
PCT/US2008/063960 2007-05-17 2008-05-16 System and method for remote surveillance WO2008144550A1 (en)

Applications Claiming Priority (8)

Application Number Priority Date Filing Date Title
US93861407P 2007-05-17 2007-05-17
US60/938,614 2007-05-17
US12/108,414 2008-04-23
US12/108,414 US20090322874A1 (en) 2007-04-23 2008-04-23 System and method for remote surveillance
PCT/US2008/061334 WO2009005879A2 (en) 2007-04-23 2008-04-23 System and method for remote surveillance
USPCT/US2008/061334 2008-04-23
US10927608A 2008-04-24 2008-04-24
US12/109,276 2008-04-24

Publications (1)

Publication Number Publication Date
WO2008144550A1 true WO2008144550A1 (en) 2008-11-27

Family

ID=40122165

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2008/063960 WO2008144550A1 (en) 2007-05-17 2008-05-16 System and method for remote surveillance

Country Status (1)

Country Link
WO (1) WO2008144550A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063752A (en) * 2010-10-18 2011-05-18 北京联合大学 Remote control door opening device for vehicle access door and vehicle access door opened by same
US9452732B1 (en) 2015-03-30 2016-09-27 Ford Global Technologies, Llc Vehicle key off load reduction via off-board sensor
CN106296892A (en) * 2016-07-28 2017-01-04 陶建壮 A kind of district vehicles gate control system
US20210125636A1 (en) * 2013-08-14 2021-04-29 Digital Ally, Inc. Computer program, method, and system for managing multiple data recording devices

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030163826A1 (en) * 2002-02-25 2003-08-28 Sentrus, Inc. Method and system for remote wireless video surveillance
US20040008253A1 (en) * 2002-07-10 2004-01-15 Monroe David A. Comprehensive multi-media surveillance and response system for aircraft, operations centers, airports and other commercial transports, centers and terminals
US20060071779A1 (en) * 2004-09-30 2006-04-06 Martin Renkis Wireless video surveillance system & method with input capture and data transmission prioritization and adjustment
US20060133476A1 (en) * 2004-11-12 2006-06-22 Page Warren S Digital in-car video surveillance system
US20070002140A1 (en) * 2005-05-03 2007-01-04 Greg Benson Trusted monitoring system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030163826A1 (en) * 2002-02-25 2003-08-28 Sentrus, Inc. Method and system for remote wireless video surveillance
US20040008253A1 (en) * 2002-07-10 2004-01-15 Monroe David A. Comprehensive multi-media surveillance and response system for aircraft, operations centers, airports and other commercial transports, centers and terminals
US20060071779A1 (en) * 2004-09-30 2006-04-06 Martin Renkis Wireless video surveillance system & method with input capture and data transmission prioritization and adjustment
US20060133476A1 (en) * 2004-11-12 2006-06-22 Page Warren S Digital in-car video surveillance system
US20070002140A1 (en) * 2005-05-03 2007-01-04 Greg Benson Trusted monitoring system and method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102063752A (en) * 2010-10-18 2011-05-18 北京联合大学 Remote control door opening device for vehicle access door and vehicle access door opened by same
CN102063752B (en) * 2010-10-18 2012-07-04 北京联合大学 Remote control door opening device for vehicle access door and vehicle access door opened by same
US20210125636A1 (en) * 2013-08-14 2021-04-29 Digital Ally, Inc. Computer program, method, and system for managing multiple data recording devices
US9452732B1 (en) 2015-03-30 2016-09-27 Ford Global Technologies, Llc Vehicle key off load reduction via off-board sensor
CN106004784A (en) * 2015-03-30 2016-10-12 福特全球技术公司 Vehicle key off load reduction via off-board sensor
CN106004784B (en) * 2015-03-30 2019-12-27 福特全球技术公司 Load reduction for vehicle ignition switch off via off-board sensors
CN106296892A (en) * 2016-07-28 2017-01-04 陶建壮 A kind of district vehicles gate control system

Similar Documents

Publication Publication Date Title
US20090322874A1 (en) System and method for remote surveillance
US20160286156A1 (en) System for managing information related to recordings from video/audio recording devices
US10419722B2 (en) Correlated media source management and response control
US10194192B2 (en) Integrated internet camera system and method
US20070097212A1 (en) 360 Degree surveillance system and method
US20140307981A1 (en) Image Data Collection From Mobile Vehicles With Computer, GPS, and IP-Based Communication
US20030185296A1 (en) System for the capture of evidentiary multimedia data, live/delayed off-load to secure archival storage and managed streaming distribution
JP5947044B2 (en) Image collection system, image pickup device, and image storage device
WO2015195507A1 (en) Firearm-mounted camera device with networked control and administration system and method
CN104867217A (en) Community monitoring and management system
US11769383B2 (en) Remote video triggering and tagging
WO2016033523A1 (en) Compact multi-function dvr with multiple integrated wireless data communication devices
JP2005322219A (en) Monitoring system, monitoring and controlling method and monitoring and controlling program
CN108683890A (en) A kind of law-enforcing recorder data transmission system and its method using 5G networks
WO2008144550A1 (en) System and method for remote surveillance
US20220397686A1 (en) Platforms, Systems, and Methods for Community Video Security Services that provide Elective and Resource Efficient Privacy Protection
CN207070090U (en) A kind of whole law enforcement record of panorama and acquisition management system
Kim et al. A server-based real-time privacy protection scheme against video surveillance by unmanned aerial systems
CN102164271A (en) Internet of things-based individual portable wireless narrowband video system
EP2827259A1 (en) Method for providing image data for a location
WO2020006189A1 (en) A wearable camera system for crime deterrence
CN206323502U (en) A kind of safety monitoring system
WO2006039481A2 (en) Wireless video surveillance system and method
DE112021004126T5 (en) Management and uploading of trip monitoring data from a mobility service provider based on an activity level
US20200100000A1 (en) Black box system for land-based structures and premises

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 08755749

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 08755749

Country of ref document: EP

Kind code of ref document: A1