SECURITY MONITORING APPARATUS AND METHOD
This invention relates to security monitoring apparatus for detecting and observing events such as the presence of intruders, trespassers, vandals and the like. It is particularly well suited, but in no way limited, to the monitoring of remote locations such as railway lines and coastal sites.
Conventional security monitoring systems such as closed circuit television (CCTV) are well known, and are commonly used to watch for intruders in industrial sites, offices, warehouses etc. However, the traditional method of monitoring with CCTV requires security personnel to continually watch the monitor screens to check for intruders and the like. The cost of employing these security personnel is considerable. The security personnel must watch the monitor screens continuously, particularly when the site is otherwise unstaffed. However, incidents which actually require the intervention of the security personnel may only happen occasionally. For the majority of the time, therefore, the security personnel simply watch the screens whilst nothing of any relevance happens. It is considered that this situation is far from ideal, since the security personnel are costly to employ for long periods of time, yet they are only actually needed to take action occasionally. Furthermore, security personnel left watching the monitor screens for long periods of time may well get bored or restless, and their attention to their duty may stray. They may even fall asleep whilst on duty, as a consequence of their lack of activity. This clearly compromises the security of the site.
Many locations, particularly remote sites such as railway lines and coastal sites, do not warrant on-site security personnel because incidents happen very rarely. However,
particularly in the case of railway lines, it will be appreciated that when incidents such as intrusion or vandalism do occur, the consequences can be extremely serious. If a miscreant places an object (e.g. a vandalised bench) on a railway track, or drops a brick from a bridge, then a tragic accident may result. Inevitably disruption to the railway service is caused. The driver of a high speed train would be unable to stop the train in time to avoid impact with the object. However, the remoteness of the sites and the general lack of incidents means that it is impractical to install conventional CCTV monitoring systems and to employ dedicated security personnel.
Problematic incidents also occur at coastal sites. Although vandalism and trespassing may occur in these locations, more serious problems are the arrival of unlawful immigrants, incidents of drug smuggling, and people getting themselves into perilous danger, e.g. on cliffs or in caves. Again, in these locations it is impractical to install conventional CCTV systems and to employ dedicated staff to monitor them.
It is a general object of the present invention to overcome or at least mitigate at least some of the problems and deficiencies associated with conventional security systems and the monitoring thereof, particularly in remote locations in which there is often little activity, such as those identified above. It is a further object of the present invention to provide useful and valuable employment for people who traditionally are not used to their potential, such as disabled people or the housebound.
According to a first aspect of the invention there is provided security monitoring apparatus comprising: a remotely-locatable device comprising a camera, sensing means and transmitting means, the remotely-locatable device being operable, on the detection of an
event by the sensing means, to transmit digital image data captured by the camera; and a server connected to a digital communication network and in communication with receiving means, the receiving means being operable to receive digital image data transmitted by the remotely-locatable device, and the server being configured to transmit the digital image data to a monitoring workstation in communication with the network.
The remotely-locatable device (also referred to herein as the "remote device" or "remote monitoring device") may advantageously be positioned in remote locations such as railway lines and coastal sites, although it may also be sited in less remote locations such as industrial plants, commercial and residential buildings, and other places where security monitoring is desired.
The remotely-locatable device may comprise the camera, sensing means and transmitting means in a common housing or in separate units in communication (electrically or wirelessly) with one another. A plurality of sensing means may be connected to one camera, or a plurality of cameras may be connected to one sensing means. Having the camera, sensing means and transmitting means in a common housing provides a benefit of compactness and ease of installation, whereas having them in separate units provides greater operational flexibility and the ability to tailor the equipment to suit the application and environment.
The term "event" should be interpreted broadly, to cover any incident or phenomenon detectable by appropriate sensing means. For example, detectable events include inter alia motion, human presence, sound, vibration, fluctuations in mechanical stress or strain, changes in light intensity, pressure or temperature, or combinations thereof. Hence the
remotely-locatable device may be used to detect the presence of intruders or animals, abnormal levels of mechanical stress or strain (e.g. on railway lines, bridges, etc.), abnormal temperatures or pressures (e.g. in power stations or industrial machinery), and so on. It will be appreciated by those skilled in the art that many other events may be monitored in such a manner. Although the invention will be illustrated herein primarily in the context of security monitoring apparatus for observing and responding to intruders, it is to be emphasised that it is equally applicable to inter alia the types of events listed above.
Transmitting the digital image data via the server and the network to a monitoring workstation provides the advantage that the monitoring workstation may also be virtually anywhere. In a preferred embodiment of the invention the workstation is one of a plurality of workstations connected to the Internet. This enables monitoring personnel to work from home, enabling disabled and housebound people to perform a useful and rewarding job. The Internet provides an effective pre-existing network over which the image data may be transmitted, and the image data may readily be displayed though a conventional Internet browser interface.
The provision of sensing means at the remotely-locatable device provides the advantage that images are only transmitted to the monitoring workstations when movement or human presence is detected. Under normal circumstances the remotely-locatable device is dormant and images are not transmitted. The monitoring system is event driven and does not require a security person to continually monitor a given camera. Human intervention is only required when the sensing means detect an event and an image is transmitted. In this manner a single security person can oversee potentially hundreds of sites, resulting in
reduced labour costs for security personnel. The monitoring workstations may even be located overseas, in countries where labour is cheap, in order to reduce costs still further.
Preferably the sensing means are responsive to one or more of:- motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain. As mentioned above, this list should not be regarded as exhaustive, and other physical phenomena (e.g. electric current, voltage etc.) may also be detected using appropriate sensors.
Preferably the server is configured to request an acknowledgement that digital image data sent to the workstation has been viewed by a person at said workstation. If no acknowledgement is received, the server can direct the image data to another workstation. This ensures that the disturbance or incident detected by the remotely-locatable device is observed by monitoring personnel and, if necessary, acted upon.
Preferably the remotely-locatable device is wirelessly connected to the network. This provides greatest freedom to the user, enabling the device to be located in particularly remote sites and to be repositioned as desired. However, as an alternative, electrical cables may be used to connect the device to the network if the location permits.
Preferably the remotely-locatable device is configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), satellite communication, optical communication, dialup connection using a modem. The 3G (third generation wireless) mobile telecommunication protocol is particularly well suited to this purpose.
Preferably the remotely-locatable device is adapted to communicate with other electrical devices in its locality such that, on detection of motion or human presence by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation, said instructions being communicated via the server and the network. The other electrical devices referred to may be light bulbs, televisions and radios, for example. This feature may be employed in residential and office locations, for example, and is intended to deter the intruder from proceeding with his activities. Alarms may also be activated in this manner.
Particularly preferably said other electrical devices are activated and/or controlled using X10, Bluetooth (RTM) or wireless communication. X10 is a protocol which enables devices connected to a mains electricity supply to receive control signals via the electricity supply itself.
Preferably the camera is motorised and moveable such that its direction of view may be changed.
Particularly preferably the camera is moveable on the instructions of a person at a monitoring workstation, said instructions being communicated via the server and the network. This enables an intruder or wrongdoer to be tracked by the camera as he moves about.
Preferably the remotely-locatable device further comprises a directionally sensitive sensor or plurality of sensors, and is configured to move the camera to face the direction of a detected object or person.
Preferably the security monitoring apparatus comprises a plurality of remotely-locatable devices at a common site, the devices comprising communication means to enable them to communicate between one another and to cause their respective cameras to capture a common incident.
Preferably the server holds or has access to a record of the cameras in use, together with data specifying the location of each camera and an appropriate response should an incident be detected by a given camera. For a given camera, preferably the server holds details of the monitoring workstations and the corresponding monitoring personnel to whom image data from that camera should be sent.
Preferably the server is operable to perform periodic checks that a remotely-locatable device is functioning correctly. This means that if a camera develops a fault, the fault does not go undetected.
Preferably the server is operable to make adjustments to the sensitivity of sensing means if the corresponding remotely-locatable device is prone to reporting false alarms.
In accordance with a second aspect of the invention, there is provided a method of security monitoring comprising the steps of: detecting an event using sensing means; operating a camera to capture image data in response to the detection by the sensing means;
transmitting said image data to a server; and sending said image data from said server to a monitoring workstation via a data communication network.
Preferably the method further comprises sending an acknowledgement from the workstation to the server that image data sent to the workstation has been viewed by a person at said workstation.
Preferably the method further comprises the server sending the image data to an alternative workstation if no acknowledgement is received by the server from the workstation to which the image data was initially sent.
Preferably the method further comprises a person at a monitoring workstation alerting security personnel in the locality of a detected event or an incident (or potential incident) observed on said workstation.
Preferably the method further comprises activating and/or controlling electrical devices in the locality of a detected event or an incident (or potential incident) observed on said workstation. Particularly preferably the electrical devices are activated and/or controlled from said workstation using X10, Bluetooth (RTM) or wireless communication.
Preferably the method further comprises controlling the movement of a camera by inputting commands to a workstation, said commands being transmitted to the camera via the server and the network.
Preferably the method further comprises the server alerting a person that an event has been detected. Particularly preferably the person is alerted by the server using e-mail, paging, text-messaging or a telephone call.
Preferably the method further comprises maintaining a record on the server of cameras in use, together with data specifying the location of each camera and an appropriate response should an event be detected by the sensing means corresponding to a given camera. For a given camera, preferably the server holds details of the monitoring workstations and the corresponding monitoring personnel to whom image data should be sent.
Preferably the method further comprises the server periodically checking that a camera is functioning correctly.
Preferably the method further comprises the server making adjustments to the sensitivity of sensing means if the corresponding camera is prone to reporting false alarms.
According to a third aspect of the invention there is a provided a remotely-locatable security monitoring device comprising a camera, sensing means and transmitting means, the remotely-locatable device being operable, on the detection of an event by the sensing means, to transmit digital image data captured by the camera to a remote server or a remote workstation.
As mentioned previously, the remotely-locatable device may comprise the camera, sensing means and transmitting means in a common housing or in separate units in communication
(electrically or wirelessly) with one another. A plurality of sensing means may be connected to one camera, or a plurality of cameras may be connected to one sensing means.
Preferably the sensing means are responsive to one or more of:- motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain.
Preferably the transmitting means are wireless.
Preferably the remotely-locatable security monitoring device is configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), satellite communication, optical communication, dialup connection using a modem.
Preferably the remotely-locatable security monitoring device is adapted to communicate with other electrical devices in its locality such that, on detection of an event by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation.
Particularly preferably the remotely-locatable security monitoring device further comprises communication means to enable it to communicate with other such remotely-locatable security monitoring devices such that, in use, a plurality of such devices proximally located can communicate with each other to cause their respective cameras to capture a common incident.
According to a fourth aspect of the invention there is a provided a server operable to be connected to a digital communication network, to receive digital image data from a remotely- locatable security monitoring device, and to transmit the digital image data to a monitoring workstation in communication with the network.
Preferably the server is configured to request an acknowledgement that digital image data sent to a workstation has been viewed by a person at said workstation.
Preferably the server holds or has access to a record of a plurality of security monitoring devices in use, together with data specifying the location of each security monitoring device and an appropriate response should an event be detected by a given security monitoring device.
Preferably the server is operable to perform periodic checks that a security monitoring device is functioning correctly.
Preferably the server is operable to make adjustments to the sensitivity of a security monitoring device if it is prone to reporting false alarms.
Embodiments of the invention will now be described, by way of example, and with reference to the drawings in which:
Figure 1 illustrates a network (e.g. the Internet) to which remote monitoring devices, a server and monitoring workstations are connected;
Figure 2 illustrates a remote monitoring device connected to a local electrical device (in this instance, a television) for monitoring and deterring intruders;
Figure 3 illustrates two remote monitoring devices and an electrical device (a TV) installed in a common site, the monitoring devices being controlled by a local control unit and the TV being controlled by a local portal controller;
Figure 4 illustrates a plan view and a side view of a sensor array as may be used in conjunction with a security camera;
Figure 5 illustrates an arrangement of cameras and sensors which would typically be used against a wall, providing 180 degree coverage;
Figure 6 illustrates an arrangement of cameras and sensors suitable for use in the middle of a large compound or building, providing 360 degree coverage; Figure 7 illustrates two cameras with sensors arranged facing in opposite directions, as may be used in a narrow alley or corridor;
Figure 8 illustrates a rear view of a remote monitoring device;
Figure 9 illustrates a front view of a remote monitoring device; and
Figure 10 illustrates two remote monitoring devices in mutual communication monitoring an area common to both cameras.
Figure 1 illustrates a network of remote monitoring devices 10, 12, 14 in communication with monitoring workstations 26, 28, 30, 32 via a network 22 and a server 24. In a preferred embodiment of the invention the network 22 is, or at least partially comprises, the Internet.
The remote monitoring devices 10, 12, 14 may be wirelessly connected to the network 22, or may be connected by an electrical cable. In Figure 1 , devices 10 and 14 are shown in wireless communication with the network 22, whereas device 12 is connected by a cable.
Taking remote monitoring device 10 as an example, this has a camera 16 and a sensor 18 responsive to motion or human presence in the vicinity of the camera. Transmitting means, such as a wireless transmitter, a dialup modem, or a permanent wired connection, are also provided to enable the device 10 to communicate with the network 22. A power supply is included in the device 10. If the device is to be installed in a remote area, then the power supply may be a battery or a solar cell. Alternatively, if the device is within reach of a mains electricity supply, then this may be used instead to provide power. Although in the Figure the monitoring device 10 is illustrated as a single unit, the various components (i.e. the camera 16, the sensor 18, the transmitting means and the control circuitry) may alternatively be provided in separate units in communication (electrically or wirelessly) with one another. Furthermore, a plurality of sensors may be connected to one camera, or a plurality of cameras may be connected to one sensor.
Connected to the network 22 is a server 24 hosting, or in communication with, a database. The database may be a SQL (structured query language) database.
In communication with the server 24 are a plurality of monitoring workstations 26, 28, 30, 32. The monitoring workstations may be directly connected to the server 24, or in communication with the server via the Internet. In a preferred embodiment of the invention the monitoring workstations are domestic personal computers (which may be manned by disabled or housebound people) having Internet access and running Internet browser software. Data communication over the network is preferably encrypted, for example, using SSL (secure sockets layer).
In use, the remote monitoring devices are positioned where desired. If no activity is detected by the sensor, then the device is dormant. However, as shown in Figure 1 with respect to device 10, if an intruder 20 or movement of some kind is detected by the sensor 18, then the device operates its camera 16 to capture one or more images of the intruder 20. These images are then transmitted to the server 24 via the network 22.
The server 24 and its database hold details of the location of the cameras and the monitoring workstations to which the image of the intruder 20 is to be transmitted. For a given camera, a preferred monitoring workstation may be specified, along with reserve workstations should the preferred one be unresponsive or unable to deal with the images transmitted from the camera. Specialist monitoring workstations may be used for specific categories of location (e.g. railways or coastlines). Because different situations will require particular actions to be taken, the monitoring personnel may need to be appropriately trained. Monitoring personnel may be trained in teams, and the server may be configured to track the availability and workload of both the monitoring workstations and their personnel.
The server is preferably configured to determine which workstations are active (i.e. which workstations are on-line and logged on to the server) and hence ready to receive the images.
Thus, on receiving the images from the camera 16, the server 24 transmits them to the specified workstation. In the example shown in Figure 1 , the image is transmitted to workstation 26. Camera-specific response instructions may also be stored on the server and transmitted to the workstation. A person at the workstation 26 then views and assesses the image and, if necessary, informs (39) security personnel 40 local to the site of the
intruder 20. The security personnel 40 may be employed by the client organisation (i.e. at the site of the intrusion), or they may be the police or a security company. The security personnel 40 will then respond (41 ) to apprehend the intruder 20. In some cases, no action may need to be taken by the monitoring personnel - for example, if the sensor was triggered by an animal.
When sending the image to the workstation, the server also requests an acknowledgement that the image has been received and considered by the person at the workstation. An automated acknowledgement may be sent from the workstation to the server to confirm that the image has been received and viewed. If no such acknowledgement is received by the server within a predetermined time, then the server will select another workstation to which to send the image.
On receiving an image from a camera, the server may also alert people directly that an incident has been detected. This may be done via an automated telephone call (e.g. to a mobile phone 34), or by paging or sending a text message or an e-mail message to a device such as a personal digital assistant 36. The people alerted in such a manner may be the monitoring personnel (e.g. to request them to look urgently at an image on their workstation) or the police or security personnel local to the intruder. Through knowing the location of the camera from which the image originated, the server can alert people in the locality of the camera.
Monitoring personnel may work in teams. Some may be based in the same room or building as one another, and hence can interact and support one another. Others based elsewhere may be contacted when their assistance is required (e.g. if a primary monitor has to leave
his workstation for whatever reason and is hence unavailable). Such communication between the monitoring personnel may be effected via their workstations and the server.
The images transmitted from the cameras to the workstations may take a variety of formats, depending on the speed of data communication available For example, video images may be captured (e.g. at 640 x 480 resolution). Alternatively, still images may be transmitted. Small or low-resolution preview images may be transmitted in the first instance and then, if the monitoring person deems it necessary, he may instruct the server to supply high- resolution or moving video images instead.
The monitoring workstations may be used to control the remote devices. Instructions from the workstations are sent to the remote devices via the network 22 and the server 24. In particular, the cameras may be motorised, and their direction of view may thus be adjusted by the monitoring personnel by inputting instructions to their workstations. This enables a monitoring person to track the movement of a potential intruder.
As shown in Figure 2, other electrical devices may also be in communication with the remote monitoring device 50, for example via the X10 protocol, or by Bluetooth (RTM) or some other wireless communication means. These other devices may be lights or domestic appliances such as a television 54, and may be activated or controlled either automatically, when the remote sensor detects a potential intruder 20, or on command from a monitoring workstation if the monitoring person considers it appropriate. The activation of such appliances or lights is intended to deter the intruder from proceeding with his activities.
As shown in Figure 3, in a given location, a plurality of monitoring devices 58, 60 may be networked via a local controller 56. This controller (or hub) 56 is in communication with the network 22. Other electrical devices such as a television set 64 may be controlled via the controller 56, either directly or via a secondary portal controller 62. A separate portal controller may be employed for each communications protocol used to control the electrical devices - e.g. one portal controller for X10 devices and one for Bluetooth (RTM). Alternatively a multi-portal controller may be employed that can communicate over more than one protocol.
The design of the remote monitoring devices is important in order to be able to monitor remote locations effectively. Figure 4 shows plan and side views of an emitter/sensor array. To achieve a 360-degree monitoring capability the sensors may be arranged around the circumference of the camera, effectively in a circle as shown in this Figure. Each sensor's field of view is similar to the camera; the narrower the field of view the greater the distance and detail of the pictures.
With motorised cameras, when a sensor is triggered, the camera may be configured to turn to that position and start filming or capturing images for a few seconds. Where the target triggers two adjacent sensors the camera will stop between them (and this may be used to halve the number of sensors needed). Alternatively there may be an array of cameras covering the required field of view. In this case individual cameras may be added or subtracted according to the conditions of the site. Figures 5, 6 and 6 show examples of possible arrangements of cameras and sensors. Although in Figure 6 eight cameras are used to cover the full 360 degrees, the number of cameras could be increased to sixteen or more.
Figure 8 illustrates a rear view of a remote monitoring device 70, showing a connector 72 for connection to a local controller (e.g. 56 in Figure 3). The front of the device, as shown in Figure 9, incorporates the camera lens 74 and the sensor 76. The sensor may be passive infrared or another light source, that triggers when there is a movement within its field of view.
Inter-camera communication
At the same time as transmitting pictures to the server, the active camera may also communicate with any adjacent cameras, which will turn towards its location and take further pictures, sending them to the server at the same time. In such cases, the system uses its emitter/sensor in a dual role, first to detect an intruder and secondly as means for inter-camera communication. Communication between cameras may also be achieved using Bluetooth (RTM), laser, X10 or other alternative technology. When the cameras need to communicate, the communication will be between the emitter on one camera and the sensor on the other. This will be in the form of a pulsed signal, arranged such that the emitting camera is not mistaken for an intruder.
As shown in Figure 10, when two cameras 80, 82 detect an intruder 88 there will be a cross- over point of the emitter beams, that can be used to operate other devices 90 close to the location of the intruder, using the signalling mode of the emitter. These other devices could be lighting, dye spray, locks, alarms, electrical appliances, and so on.
Installation and setup of new monitonng hardware
When a customer purchases a camera, they may give details of where the system is to be located (this may include a local map) and what to do in the event of an unwanted intrusion. These details will be maintained by the server/database.
When the primary camera is first switched on, it contacts the server, notifies the system of its activation and provide its location or coordinates. The server will recognise the camera and obtain relevant details from the camera, together with a picture from the camera.
The server then selects a monitoring person (or another surveillance organisation as agreed with the customer) to perform the initial set-up.
Initial set-up of cameras
When a monitoring person receives notification of a new camera installation they can take direct control of it, via their workstation, and adjust the vertical position (up/down) of the camera and the sensor level to avoid spurious alarms caused by cats etc. They monitoring person can also check the other cameras in the installation and select the most appropriate secondary pictures to take when an adjacent camera is triggered.
Camera communication Cameras in the system may be configured to communicate with each other and to ensure that they remain active. In the event of a camera failing or otherwise being damaged, the other local cameras may be configured to make regular sweeps of the affected area, until the affected camera is back in action.
As described above, the remote camera unit may also be configured to communicate with other devices (e.g. via Bluetooth (RTM), laser, dialup, radio or X10) to activate lighting, locks, alarms, etc.
Automatic camera tracking
Cameras may track either with a multi-lens setup or a motorised lens using directional sensors. When the sensor detects a target, a primary camera will turn to the required direction or activate the appropriate camera and capture images. At the same time it can communicate with other cameras in the system to track to the same direction and to take additional photos to pick up other useful information such as nearby parked cars.
The tracking facility means that a narrow angle lens can be used rather than a wide angle lens, which allows the pictures taken to be high definition.
Because the angle between two or more cameras in a system detecting a target is known, using the coordinates of the cameras it is possible to determine the exact position of the intruder, and this in turn may allow some other action to be made possible. Global positioning technology may be used to determine the location of the cameras.
Home based monitoring
With the example of monitoring personnel viewing images and controlling cameras via the Internet, the monitoring workstation can be situated anywhere in the world where adequate cost-effective Internet communication exists.
On receiving a photo, the monitor acknowledges receipt, determines whether the incident is real or a false alarm and take appropriate action. An automated response may be used (e.g. using text messaging, e-mail, etc.) or alternatively manual action may be taken, such as alerting local authorities or the client, etc. The monitoring person may remotely operate the camera to enable further investigation of the situation.
Camera control
In the case where a monitoring person takes control of a camera system, they can manually adjust the direction of the camera and operate any lighting or devices that are in communication with the system. They are also able to adjust the individual sensors to avoid false alarms caused by passing cats etc.
The server
The server is preferably configured such that it: • Maintains a list of client cameras, including location maps and response instructions.
• Maintains the allocation of monitors to clients, ensuring adequate cover.
• Checks camera connections periodically.
• Maintains a history of each camera.
• Connects a monitoring workstation to the appropriate camera in the case of an event. The workstation may be selected dependent on availability and the training of the person there.
• Can make adjustments to the camera sensors when high incidents of false alarms are reported.
The server may also contact the response unit (e.g. 40 in Figure 1 ) directly, if no monitoring workstation is available to deal with the matter.
Summary A preferred embodiment of the invention comprises a remote monitoring device incorporating mobile phone technology and a camera, and a monitoring workstation in communication with the remote monitoring device via the Internet.
With traditional monitoring systems, one or more persons watch banks of screens, looking for suspicious behaviour. These systems are suitable for the high street or areas of high activity. However, they are expensive to operate and are fixed into location. It is difficult to move either the monitoring location or the cameras themselves.
However, in accordance with a preferred embodiment of the invention, a compact camera, computer and 3G mobile phone transmitter/receiver may be employed that is self sufficient in power and requires no cables. This makes it easy to install or move to different locations as the need demands. The camera is able to track a target through 270-360 degrees using sensors and where two or more units are installed, communicate with each other so that they can point in the same direction to pick up other information or protect each other from tampering or theft. The monitoring is done over the Internet.
The essential difference between the two systems is that the traditional system requires constant surveillance or recording. However, the system in accordance with the present invention is event driven, and in normal circumstances would be dormant, switching on only when the sensors trigger it into operation. It is ideal for areas in which human traffic is rare
and is likely to be undesirable. This means that one monitoring person can look after many hundreds of cameras.
Images taken by the remote cameras are sent to a server on the Internet, which forwards the images to one or more monitoring workstations (which may be home-based). Other forms of communication used may include SMS text messaging and automatic voice calling. The server checks that the images have been responded to within a predetermined time. If no response has been received then the server will resend the images to other monitors. These other monitors can be predefined, or automated based on the locality of the camera (which may make use of the GPS co-ordinates of the camera).
The monitors may be managed by the server in teams, so that situations needing specific responses are properly provided for, by virtue of the monitoring personnel being suitably trained.
The server may keep a history of each monitored site and provide a site map (e.g. using MapPoint - a software facility that uses GPS to provide local area maps) to the monitoring person, thereby detailing the location of the activated camera.
Examples of potential surveillance sites and applications
• Railway embankments, where an intruder may place an obstruction on the railway line.
• Customs and excise, where there is a need to keep watch on a remote area of coastline or port boundary, where drug smuggling or unlawful immigration may occur.
Seaport and airport perimeters.
Airport hangers, where a human presence could be suspicious.
Police observation of a house in which drug dealing is taking place.
Remote sites in which terrorists are known to operate.
Commercial and residential sites.
A company's research and development department (for out-of-hours monitoring).
To provide cheap overnight cover for conventional CCTV surveillance.
Other phenomena which may be monitored, using appropriate sensors, include abnormal levels of mechanical stress or strain (e.g. on railway lines, bridges, etc.) and abnormal temperatures or pressures (e.g. in power stations or industrial machinery).