WO2003107293A1 - Security monitoring apparatus and method - Google Patents

Security monitoring apparatus and method Download PDF

Info

Publication number
WO2003107293A1
WO2003107293A1 PCT/GB2003/002467 GB0302467W WO03107293A1 WO 2003107293 A1 WO2003107293 A1 WO 2003107293A1 GB 0302467 W GB0302467 W GB 0302467W WO 03107293 A1 WO03107293 A1 WO 03107293A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
security monitoring
camera
workstation
remotely
Prior art date
Application number
PCT/GB2003/002467
Other languages
French (fr)
Inventor
Raymond Joseph Lambert
Original Assignee
Raymond Joseph Lambert
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Raymond Joseph Lambert filed Critical Raymond Joseph Lambert
Priority to AU2003244779A priority Critical patent/AU2003244779A1/en
Publication of WO2003107293A1 publication Critical patent/WO2003107293A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19695Arrangements wherein non-video detectors start video recording or forwarding but do not generate an alarm themselves
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19656Network used to communicate with a camera, e.g. WAN, LAN, Internet
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface
    • G08B13/19684Portable terminal, e.g. mobile phone, used for viewing video remotely

Definitions

  • This invention relates to security monitoring apparatus for detecting and observing events such as the presence of intruders, trespassers, vandals and the like. It is particularly well suited, but in no way limited, to the monitoring of remote locations such as railway lines and coastal sites.
  • security monitoring apparatus comprising: a remotely-locatable device comprising a camera, sensing means and transmitting means, the remotely-locatable device being operable, on the detection of an event by the sensing means, to transmit digital image data captured by the camera; and a server connected to a digital communication network and in communication with receiving means, the receiving means being operable to receive digital image data transmitted by the remotely-locatable device, and the server being configured to transmit the digital image data to a monitoring workstation in communication with the network.
  • the remotely-locatable device (also referred to herein as the "remote device” or “remote monitoring device”) may advantageously be positioned in remote locations such as railway lines and coastal sites, although it may also be sited in less remote locations such as industrial plants, commercial and residential buildings, and other places where security monitoring is desired.
  • the remotely-locatable device may comprise the camera, sensing means and transmitting means in a common housing or in separate units in communication (electrically or wirelessly) with one another.
  • a plurality of sensing means may be connected to one camera, or a plurality of cameras may be connected to one sensing means. Having the camera, sensing means and transmitting means in a common housing provides a benefit of compactness and ease of installation, whereas having them in separate units provides greater operational flexibility and the ability to tailor the equipment to suit the application and environment.
  • detectable events include inter alia motion, human presence, sound, vibration, fluctuations in mechanical stress or strain, changes in light intensity, pressure or temperature, or combinations thereof.
  • the remotely-locatable device may be used to detect the presence of intruders or animals, abnormal levels of mechanical stress or strain (e.g. on railway lines, bridges, etc.), abnormal temperatures or pressures (e.g. in power stations or industrial machinery), and so on. It will be appreciated by those skilled in the art that many other events may be monitored in such a manner.
  • the invention will be illustrated herein primarily in the context of security monitoring apparatus for observing and responding to intruders, it is to be emphasised that it is equally applicable to inter alia the types of events listed above.
  • Transmitting the digital image data via the server and the network to a monitoring workstation provides the advantage that the monitoring workstation may also be virtually anywhere.
  • the workstation is one of a plurality of workstations connected to the Internet. This enables monitoring personnel to work from home, enabling disabled and housebound people to perform a useful and rewarding job.
  • the Internet provides an effective pre-existing network over which the image data may be transmitted, and the image data may readily be displayed though a conventional Internet browser interface.
  • sensing means at the remotely-locatable device provides the advantage that images are only transmitted to the monitoring workstations when movement or human presence is detected. Under normal circumstances the remotely-locatable device is dormant and images are not transmitted.
  • the monitoring system is event driven and does not require a security person to continually monitor a given camera. Human intervention is only required when the sensing means detect an event and an image is transmitted. In this manner a single security person can oversee potentially hundreds of sites, resulting in reduced labour costs for security personnel.
  • the monitoring workstations may even be located overseas, in countries where labour is cheap, in order to reduce costs still further.
  • the sensing means are responsive to one or more of:- motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain.
  • this list should not be regarded as exhaustive, and other physical phenomena (e.g. electric current, voltage etc.) may also be detected using appropriate sensors.
  • the server is configured to request an acknowledgement that digital image data sent to the workstation has been viewed by a person at said workstation. If no acknowledgement is received, the server can direct the image data to another workstation. This ensures that the disturbance or incident detected by the remotely-locatable device is observed by monitoring personnel and, if necessary, acted upon.
  • the remotely-locatable device is wirelessly connected to the network. This provides greatest freedom to the user, enabling the device to be located in particularly remote sites and to be repositioned as desired.
  • electrical cables may be used to connect the device to the network if the location permits.
  • the remotely-locatable device is configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), satellite communication, optical communication, dialup connection using a modem.
  • the 3G (third generation wireless) mobile telecommunication protocol is particularly well suited to this purpose.
  • the remotely-locatable device is adapted to communicate with other electrical devices in its locality such that, on detection of motion or human presence by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation, said instructions being communicated via the server and the network.
  • the other electrical devices referred to may be light bulbs, televisions and radios, for example. This feature may be employed in residential and office locations, for example, and is intended to deter the intruder from proceeding with his activities. Alarms may also be activated in this manner.
  • X10 is a protocol which enables devices connected to a mains electricity supply to receive control signals via the electricity supply itself.
  • the camera is motorised and moveable such that its direction of view may be changed.
  • the camera is moveable on the instructions of a person at a monitoring workstation, said instructions being communicated via the server and the network.
  • the remotely-locatable device further comprises a directionally sensitive sensor or plurality of sensors, and is configured to move the camera to face the direction of a detected object or person.
  • the security monitoring apparatus comprises a plurality of remotely-locatable devices at a common site, the devices comprising communication means to enable them to communicate between one another and to cause their respective cameras to capture a common incident.
  • the server holds or has access to a record of the cameras in use, together with data specifying the location of each camera and an appropriate response should an incident be detected by a given camera.
  • the server holds details of the monitoring workstations and the corresponding monitoring personnel to whom image data from that camera should be sent.
  • the server is operable to perform periodic checks that a remotely-locatable device is functioning correctly. This means that if a camera develops a fault, the fault does not go undetected.
  • the server is operable to make adjustments to the sensitivity of sensing means if the corresponding remotely-locatable device is prone to reporting false alarms.
  • a method of security monitoring comprising the steps of: detecting an event using sensing means; operating a camera to capture image data in response to the detection by the sensing means; transmitting said image data to a server; and sending said image data from said server to a monitoring workstation via a data communication network.
  • the method further comprises sending an acknowledgement from the workstation to the server that image data sent to the workstation has been viewed by a person at said workstation.
  • the method further comprises the server sending the image data to an alternative workstation if no acknowledgement is received by the server from the workstation to which the image data was initially sent.
  • the method further comprises a person at a monitoring workstation alerting security personnel in the locality of a detected event or an incident (or potential incident) observed on said workstation.
  • the method further comprises activating and/or controlling electrical devices in the locality of a detected event or an incident (or potential incident) observed on said workstation.
  • the electrical devices are activated and/or controlled from said workstation using X10, Bluetooth (RTM) or wireless communication.
  • the method further comprises controlling the movement of a camera by inputting commands to a workstation, said commands being transmitted to the camera via the server and the network.
  • the method further comprises the server alerting a person that an event has been detected.
  • the person is alerted by the server using e-mail, paging, text-messaging or a telephone call.
  • the method further comprises maintaining a record on the server of cameras in use, together with data specifying the location of each camera and an appropriate response should an event be detected by the sensing means corresponding to a given camera.
  • the server holds details of the monitoring workstations and the corresponding monitoring personnel to whom image data should be sent.
  • the method further comprises the server periodically checking that a camera is functioning correctly.
  • the method further comprises the server making adjustments to the sensitivity of sensing means if the corresponding camera is prone to reporting false alarms.
  • a remotely-locatable security monitoring device comprising a camera, sensing means and transmitting means, the remotely-locatable device being operable, on the detection of an event by the sensing means, to transmit digital image data captured by the camera to a remote server or a remote workstation.
  • the remotely-locatable device may comprise the camera, sensing means and transmitting means in a common housing or in separate units in communication (electrically or wirelessly) with one another.
  • a plurality of sensing means may be connected to one camera, or a plurality of cameras may be connected to one sensing means.
  • the sensing means are responsive to one or more of:- motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain.
  • the transmitting means are wireless.
  • the remotely-locatable security monitoring device is configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), satellite communication, optical communication, dialup connection using a modem.
  • the remotely-locatable security monitoring device is adapted to communicate with other electrical devices in its locality such that, on detection of an event by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation.
  • the remotely-locatable security monitoring device further comprises communication means to enable it to communicate with other such remotely-locatable security monitoring devices such that, in use, a plurality of such devices proximally located can communicate with each other to cause their respective cameras to capture a common incident.
  • a server operable to be connected to a digital communication network, to receive digital image data from a remotely- locatable security monitoring device, and to transmit the digital image data to a monitoring workstation in communication with the network.
  • the server is configured to request an acknowledgement that digital image data sent to a workstation has been viewed by a person at said workstation.
  • the server holds or has access to a record of a plurality of security monitoring devices in use, together with data specifying the location of each security monitoring device and an appropriate response should an event be detected by a given security monitoring device.
  • the server is operable to perform periodic checks that a security monitoring device is functioning correctly.
  • the server is operable to make adjustments to the sensitivity of a security monitoring device if it is prone to reporting false alarms.
  • Figure 1 illustrates a network (e.g. the Internet) to which remote monitoring devices, a server and monitoring workstations are connected;
  • a network e.g. the Internet
  • Figure 2 illustrates a remote monitoring device connected to a local electrical device (in this instance, a television) for monitoring and deterring intruders
  • Figure 3 illustrates two remote monitoring devices and an electrical device (a TV) installed in a common site, the monitoring devices being controlled by a local control unit and the TV being controlled by a local portal controller;
  • Figure 4 illustrates a plan view and a side view of a sensor array as may be used in conjunction with a security camera
  • Figure 5 illustrates an arrangement of cameras and sensors which would typically be used against a wall, providing 180 degree coverage
  • Figure 6 illustrates an arrangement of cameras and sensors suitable for use in the middle of a large compound or building, providing 360 degree coverage
  • Figure 7 illustrates two cameras with sensors arranged facing in opposite directions, as may be used in a narrow alley or corridor;
  • Figure 8 illustrates a rear view of a remote monitoring device
  • Figure 9 illustrates a front view of a remote monitoring device
  • Figure 10 illustrates two remote monitoring devices in mutual communication monitoring an area common to both cameras.
  • Figure 1 illustrates a network of remote monitoring devices 10, 12, 14 in communication with monitoring workstations 26, 28, 30, 32 via a network 22 and a server 24.
  • the network 22 is, or at least partially comprises, the Internet.
  • the remote monitoring devices 10, 12, 14 may be wirelessly connected to the network 22, or may be connected by an electrical cable.
  • devices 10 and 14 are shown in wireless communication with the network 22, whereas device 12 is connected by a cable.
  • this has a camera 16 and a sensor 18 responsive to motion or human presence in the vicinity of the camera.
  • Transmitting means such as a wireless transmitter, a dialup modem, or a permanent wired connection, are also provided to enable the device 10 to communicate with the network 22.
  • a power supply is included in the device 10. If the device is to be installed in a remote area, then the power supply may be a battery or a solar cell.
  • the device is within reach of a mains electricity supply, then this may be used instead to provide power.
  • the various components i.e. the camera 16, the sensor 18, the transmitting means and the control circuitry
  • the various components may alternatively be provided in separate units in communication (electrically or wirelessly) with one another.
  • a plurality of sensors may be connected to one camera, or a plurality of cameras may be connected to one sensor.
  • the database may be a SQL (structured query language) database.
  • monitoring workstations 26, 28, 30, 32 In communication with the server 24 are a plurality of monitoring workstations 26, 28, 30, 32.
  • the monitoring workstations may be directly connected to the server 24, or in communication with the server via the Internet.
  • the monitoring workstations are domestic personal computers (which may be manned by disabled or housebound people) having Internet access and running Internet browser software.
  • Data communication over the network is preferably encrypted, for example, using SSL (secure sockets layer).
  • the remote monitoring devices are positioned where desired. If no activity is detected by the sensor, then the device is dormant. However, as shown in Figure 1 with respect to device 10, if an intruder 20 or movement of some kind is detected by the sensor 18, then the device operates its camera 16 to capture one or more images of the intruder 20. These images are then transmitted to the server 24 via the network 22.
  • the server 24 and its database hold details of the location of the cameras and the monitoring workstations to which the image of the intruder 20 is to be transmitted.
  • a preferred monitoring workstation may be specified, along with reserve workstations should the preferred one be unresponsive or unable to deal with the images transmitted from the camera.
  • Specialist monitoring workstations may be used for specific categories of location (e.g. railways or coastlines). Because different situations will require particular actions to be taken, the monitoring personnel may need to be appropriately trained. Monitoring personnel may be trained in teams, and the server may be configured to track the availability and workload of both the monitoring workstations and their personnel.
  • the server is preferably configured to determine which workstations are active (i.e. which workstations are on-line and logged on to the server) and hence ready to receive the images.
  • the server 24 transmits them to the specified workstation.
  • the image is transmitted to workstation 26.
  • Camera-specific response instructions may also be stored on the server and transmitted to the workstation.
  • a person at the workstation 26 views and assesses the image and, if necessary, informs (39) security personnel 40 local to the site of the intruder 20.
  • the security personnel 40 may be employed by the client organisation (i.e. at the site of the intrusion), or they may be the police or a security company.
  • the security personnel 40 will then respond (41 ) to apprehend the intruder 20. In some cases, no action may need to be taken by the monitoring personnel - for example, if the sensor was triggered by an animal.
  • the server When sending the image to the workstation, the server also requests an acknowledgement that the image has been received and considered by the person at the workstation. An automated acknowledgement may be sent from the workstation to the server to confirm that the image has been received and viewed. If no such acknowledgement is received by the server within a predetermined time, then the server will select another workstation to which to send the image.
  • the server may also alert people directly that an incident has been detected. This may be done via an automated telephone call (e.g. to a mobile phone 34), or by paging or sending a text message or an e-mail message to a device such as a personal digital assistant 36.
  • the people alerted in such a manner may be the monitoring personnel (e.g. to request them to look urgently at an image on their workstation) or the police or security personnel local to the intruder.
  • the server can alert people in the locality of the camera.
  • Monitoring personnel may work in teams. Some may be based in the same room or building as one another, and hence can interact and support one another. Others based elsewhere may be contacted when their assistance is required (e.g. if a primary monitor has to leave his workstation for whatever reason and is hence unavailable). Such communication between the monitoring personnel may be effected via their workstations and the server.
  • the images transmitted from the cameras to the workstations may take a variety of formats, depending on the speed of data communication available
  • video images may be captured (e.g. at 640 x 480 resolution).
  • still images may be transmitted.
  • Small or low-resolution preview images may be transmitted in the first instance and then, if the monitoring person deems it necessary, he may instruct the server to supply high- resolution or moving video images instead.
  • the monitoring workstations may be used to control the remote devices. Instructions from the workstations are sent to the remote devices via the network 22 and the server 24.
  • the cameras may be motorised, and their direction of view may thus be adjusted by the monitoring personnel by inputting instructions to their workstations. This enables a monitoring person to track the movement of a potential intruder.
  • other electrical devices may also be in communication with the remote monitoring device 50, for example via the X10 protocol, or by Bluetooth (RTM) or some other wireless communication means.
  • These other devices may be lights or domestic appliances such as a television 54, and may be activated or controlled either automatically, when the remote sensor detects a potential intruder 20, or on command from a monitoring workstation if the monitoring person considers it appropriate. The activation of such appliances or lights is intended to deter the intruder from proceeding with his activities.
  • a plurality of monitoring devices 58, 60 may be networked via a local controller 56. This controller (or hub) 56 is in communication with the network 22.
  • Other electrical devices such as a television set 64 may be controlled via the controller 56, either directly or via a secondary portal controller 62.
  • a separate portal controller may be employed for each communications protocol used to control the electrical devices - e.g. one portal controller for X10 devices and one for Bluetooth (RTM).
  • RTM Bluetooth
  • Alternatively a multi-portal controller may be employed that can communicate over more than one protocol.
  • Figure 4 shows plan and side views of an emitter/sensor array. To achieve a 360-degree monitoring capability the sensors may be arranged around the circumference of the camera, effectively in a circle as shown in this Figure. Each sensor's field of view is similar to the camera; the narrower the field of view the greater the distance and detail of the pictures.
  • the camera when a sensor is triggered, the camera may be configured to turn to that position and start filming or capturing images for a few seconds. Where the target triggers two adjacent sensors the camera will stop between them (and this may be used to halve the number of sensors needed). Alternatively there may be an array of cameras covering the required field of view. In this case individual cameras may be added or subtracted according to the conditions of the site.
  • Figures 5, 6 and 6 show examples of possible arrangements of cameras and sensors. Although in Figure 6 eight cameras are used to cover the full 360 degrees, the number of cameras could be increased to sixteen or more.
  • Figure 8 illustrates a rear view of a remote monitoring device 70, showing a connector 72 for connection to a local controller (e.g. 56 in Figure 3).
  • the front of the device as shown in Figure 9, incorporates the camera lens 74 and the sensor 76.
  • the sensor may be passive infrared or another light source, that triggers when there is a movement within its field of view.
  • the active camera may also communicate with any adjacent cameras, which will turn towards its location and take further pictures, sending them to the server at the same time.
  • the system uses its emitter/sensor in a dual role, first to detect an intruder and secondly as means for inter-camera communication. Communication between cameras may also be achieved using Bluetooth (RTM), laser, X10 or other alternative technology.
  • RTM Bluetooth
  • the communication will be between the emitter on one camera and the sensor on the other. This will be in the form of a pulsed signal, arranged such that the emitting camera is not mistaken for an intruder.
  • the primary camera When the primary camera is first switched on, it contacts the server, notifies the system of its activation and provide its location or coordinates.
  • the server will recognise the camera and obtain relevant details from the camera, together with a picture from the camera.
  • the server selects a monitoring person (or another surveillance organisation as agreed with the customer) to perform the initial set-up.
  • a monitoring person When a monitoring person receives notification of a new camera installation they can take direct control of it, via their workstation, and adjust the vertical position (up/down) of the camera and the sensor level to avoid spurious alarms caused by cats etc. They monitoring person can also check the other cameras in the installation and select the most appropriate secondary pictures to take when an adjacent camera is triggered.
  • Camera communication Cameras in the system may be configured to communicate with each other and to ensure that they remain active. In the event of a camera failing or otherwise being damaged, the other local cameras may be configured to make regular sweeps of the affected area, until the affected camera is back in action. As described above, the remote camera unit may also be configured to communicate with other devices (e.g. via Bluetooth (RTM), laser, dialup, radio or X10) to activate lighting, locks, alarms, etc.
  • RTM Bluetooth
  • laser laser, dialup, radio or X10
  • Cameras may track either with a multi-lens setup or a motorised lens using directional sensors.
  • a primary camera When the sensor detects a target, a primary camera will turn to the required direction or activate the appropriate camera and capture images. At the same time it can communicate with other cameras in the system to track to the same direction and to take additional photos to pick up other useful information such as nearby parked cars.
  • the tracking facility means that a narrow angle lens can be used rather than a wide angle lens, which allows the pictures taken to be high definition.
  • the monitoring workstation can be situated anywhere in the world where adequate cost-effective Internet communication exists.
  • the monitor acknowledges receipt, determines whether the incident is real or a false alarm and take appropriate action.
  • An automated response may be used (e.g. using text messaging, e-mail, etc.) or alternatively manual action may be taken, such as alerting local authorities or the client, etc.
  • the monitoring person may remotely operate the camera to enable further investigation of the situation.
  • a monitoring person takes control of a camera system
  • they can manually adjust the direction of the camera and operate any lighting or devices that are in communication with the system. They are also able to adjust the individual sensors to avoid false alarms caused by passing cats etc.
  • the server is preferably configured such that it: • Maintains a list of client cameras, including location maps and response instructions.
  • the workstation may be selected dependent on availability and the training of the person there.
  • the server may also contact the response unit (e.g. 40 in Figure 1 ) directly, if no monitoring workstation is available to deal with the matter.
  • a preferred embodiment of the invention comprises a remote monitoring device incorporating mobile phone technology and a camera, and a monitoring workstation in communication with the remote monitoring device via the Internet.
  • a compact camera, computer and 3G mobile phone transmitter/receiver may be employed that is self sufficient in power and requires no cables. This makes it easy to install or move to different locations as the need demands.
  • the camera is able to track a target through 270-360 degrees using sensors and where two or more units are installed, communicate with each other so that they can point in the same direction to pick up other information or protect each other from tampering or theft. The monitoring is done over the Internet.
  • the essential difference between the two systems is that the traditional system requires constant surveillance or recording.
  • the system in accordance with the present invention is event driven, and in normal circumstances would be dormant, switching on only when the sensors trigger it into operation. It is ideal for areas in which human traffic is rare and is likely to be undesirable. This means that one monitoring person can look after many hundreds of cameras.
  • Images taken by the remote cameras are sent to a server on the Internet, which forwards the images to one or more monitoring workstations (which may be home-based). Other forms of communication used may include SMS text messaging and automatic voice calling.
  • the server checks that the images have been responded to within a predetermined time. If no response has been received then the server will resend the images to other monitors. These other monitors can be predefined, or automated based on the locality of the camera (which may make use of the GPS co-ordinates of the camera).
  • the monitors may be managed by the server in teams, so that situations needing specific responses are properly provided for, by virtue of the monitoring personnel being suitably trained.
  • the server may keep a history of each monitored site and provide a site map (e.g. using MapPoint - a software facility that uses GPS to provide local area maps) to the monitoring person, thereby detailing the location of the activated camera.
  • a site map e.g. using MapPoint - a software facility that uses GPS to provide local area maps
  • Other phenomena which may be monitored, using appropriate sensors, include abnormal levels of mechanical stress or strain (e.g. on railway lines, bridges, etc.) and abnormal temperatures or pressures (e.g. in power stations or industrial machinery).

Abstract

Security monitoring apparatus comprising: a remotely-locatable device comprising a camera, sensing means and transmitting means, the remotely-locatable device being operable, on the detection of an event by the sensing means, to transmit digital image data captured by the camera; and a server connected to a digital communication network and in communication with receiving means, the receiving means being operable to receive digital image data transmitted by the remotely-locatable device, and the server being configured to transmit the digital image data to a monitoring workstation in communication with the network. The invention also provides a method of security monitoring comprising the steps of: detecting an event using sensing means; operating a camera to capture image data in response to the detection by the sensing means; transmitting said image data to a server; and sending said image data from said server to a monitoring workstation via a data communication network. The invention further provides a remotely-locatable security monitoring device and a server.

Description

SECURITY MONITORING APPARATUS AND METHOD
This invention relates to security monitoring apparatus for detecting and observing events such as the presence of intruders, trespassers, vandals and the like. It is particularly well suited, but in no way limited, to the monitoring of remote locations such as railway lines and coastal sites.
Conventional security monitoring systems such as closed circuit television (CCTV) are well known, and are commonly used to watch for intruders in industrial sites, offices, warehouses etc. However, the traditional method of monitoring with CCTV requires security personnel to continually watch the monitor screens to check for intruders and the like. The cost of employing these security personnel is considerable. The security personnel must watch the monitor screens continuously, particularly when the site is otherwise unstaffed. However, incidents which actually require the intervention of the security personnel may only happen occasionally. For the majority of the time, therefore, the security personnel simply watch the screens whilst nothing of any relevance happens. It is considered that this situation is far from ideal, since the security personnel are costly to employ for long periods of time, yet they are only actually needed to take action occasionally. Furthermore, security personnel left watching the monitor screens for long periods of time may well get bored or restless, and their attention to their duty may stray. They may even fall asleep whilst on duty, as a consequence of their lack of activity. This clearly compromises the security of the site.
Many locations, particularly remote sites such as railway lines and coastal sites, do not warrant on-site security personnel because incidents happen very rarely. However, particularly in the case of railway lines, it will be appreciated that when incidents such as intrusion or vandalism do occur, the consequences can be extremely serious. If a miscreant places an object (e.g. a vandalised bench) on a railway track, or drops a brick from a bridge, then a tragic accident may result. Inevitably disruption to the railway service is caused. The driver of a high speed train would be unable to stop the train in time to avoid impact with the object. However, the remoteness of the sites and the general lack of incidents means that it is impractical to install conventional CCTV monitoring systems and to employ dedicated security personnel.
Problematic incidents also occur at coastal sites. Although vandalism and trespassing may occur in these locations, more serious problems are the arrival of unlawful immigrants, incidents of drug smuggling, and people getting themselves into perilous danger, e.g. on cliffs or in caves. Again, in these locations it is impractical to install conventional CCTV systems and to employ dedicated staff to monitor them.
It is a general object of the present invention to overcome or at least mitigate at least some of the problems and deficiencies associated with conventional security systems and the monitoring thereof, particularly in remote locations in which there is often little activity, such as those identified above. It is a further object of the present invention to provide useful and valuable employment for people who traditionally are not used to their potential, such as disabled people or the housebound.
According to a first aspect of the invention there is provided security monitoring apparatus comprising: a remotely-locatable device comprising a camera, sensing means and transmitting means, the remotely-locatable device being operable, on the detection of an event by the sensing means, to transmit digital image data captured by the camera; and a server connected to a digital communication network and in communication with receiving means, the receiving means being operable to receive digital image data transmitted by the remotely-locatable device, and the server being configured to transmit the digital image data to a monitoring workstation in communication with the network.
The remotely-locatable device (also referred to herein as the "remote device" or "remote monitoring device") may advantageously be positioned in remote locations such as railway lines and coastal sites, although it may also be sited in less remote locations such as industrial plants, commercial and residential buildings, and other places where security monitoring is desired.
The remotely-locatable device may comprise the camera, sensing means and transmitting means in a common housing or in separate units in communication (electrically or wirelessly) with one another. A plurality of sensing means may be connected to one camera, or a plurality of cameras may be connected to one sensing means. Having the camera, sensing means and transmitting means in a common housing provides a benefit of compactness and ease of installation, whereas having them in separate units provides greater operational flexibility and the ability to tailor the equipment to suit the application and environment.
The term "event" should be interpreted broadly, to cover any incident or phenomenon detectable by appropriate sensing means. For example, detectable events include inter alia motion, human presence, sound, vibration, fluctuations in mechanical stress or strain, changes in light intensity, pressure or temperature, or combinations thereof. Hence the remotely-locatable device may be used to detect the presence of intruders or animals, abnormal levels of mechanical stress or strain (e.g. on railway lines, bridges, etc.), abnormal temperatures or pressures (e.g. in power stations or industrial machinery), and so on. It will be appreciated by those skilled in the art that many other events may be monitored in such a manner. Although the invention will be illustrated herein primarily in the context of security monitoring apparatus for observing and responding to intruders, it is to be emphasised that it is equally applicable to inter alia the types of events listed above.
Transmitting the digital image data via the server and the network to a monitoring workstation provides the advantage that the monitoring workstation may also be virtually anywhere. In a preferred embodiment of the invention the workstation is one of a plurality of workstations connected to the Internet. This enables monitoring personnel to work from home, enabling disabled and housebound people to perform a useful and rewarding job. The Internet provides an effective pre-existing network over which the image data may be transmitted, and the image data may readily be displayed though a conventional Internet browser interface.
The provision of sensing means at the remotely-locatable device provides the advantage that images are only transmitted to the monitoring workstations when movement or human presence is detected. Under normal circumstances the remotely-locatable device is dormant and images are not transmitted. The monitoring system is event driven and does not require a security person to continually monitor a given camera. Human intervention is only required when the sensing means detect an event and an image is transmitted. In this manner a single security person can oversee potentially hundreds of sites, resulting in reduced labour costs for security personnel. The monitoring workstations may even be located overseas, in countries where labour is cheap, in order to reduce costs still further.
Preferably the sensing means are responsive to one or more of:- motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain. As mentioned above, this list should not be regarded as exhaustive, and other physical phenomena (e.g. electric current, voltage etc.) may also be detected using appropriate sensors.
Preferably the server is configured to request an acknowledgement that digital image data sent to the workstation has been viewed by a person at said workstation. If no acknowledgement is received, the server can direct the image data to another workstation. This ensures that the disturbance or incident detected by the remotely-locatable device is observed by monitoring personnel and, if necessary, acted upon.
Preferably the remotely-locatable device is wirelessly connected to the network. This provides greatest freedom to the user, enabling the device to be located in particularly remote sites and to be repositioned as desired. However, as an alternative, electrical cables may be used to connect the device to the network if the location permits.
Preferably the remotely-locatable device is configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), satellite communication, optical communication, dialup connection using a modem. The 3G (third generation wireless) mobile telecommunication protocol is particularly well suited to this purpose. Preferably the remotely-locatable device is adapted to communicate with other electrical devices in its locality such that, on detection of motion or human presence by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation, said instructions being communicated via the server and the network. The other electrical devices referred to may be light bulbs, televisions and radios, for example. This feature may be employed in residential and office locations, for example, and is intended to deter the intruder from proceeding with his activities. Alarms may also be activated in this manner.
Particularly preferably said other electrical devices are activated and/or controlled using X10, Bluetooth (RTM) or wireless communication. X10 is a protocol which enables devices connected to a mains electricity supply to receive control signals via the electricity supply itself.
Preferably the camera is motorised and moveable such that its direction of view may be changed.
Particularly preferably the camera is moveable on the instructions of a person at a monitoring workstation, said instructions being communicated via the server and the network. This enables an intruder or wrongdoer to be tracked by the camera as he moves about. Preferably the remotely-locatable device further comprises a directionally sensitive sensor or plurality of sensors, and is configured to move the camera to face the direction of a detected object or person.
Preferably the security monitoring apparatus comprises a plurality of remotely-locatable devices at a common site, the devices comprising communication means to enable them to communicate between one another and to cause their respective cameras to capture a common incident.
Preferably the server holds or has access to a record of the cameras in use, together with data specifying the location of each camera and an appropriate response should an incident be detected by a given camera. For a given camera, preferably the server holds details of the monitoring workstations and the corresponding monitoring personnel to whom image data from that camera should be sent.
Preferably the server is operable to perform periodic checks that a remotely-locatable device is functioning correctly. This means that if a camera develops a fault, the fault does not go undetected.
Preferably the server is operable to make adjustments to the sensitivity of sensing means if the corresponding remotely-locatable device is prone to reporting false alarms.
In accordance with a second aspect of the invention, there is provided a method of security monitoring comprising the steps of: detecting an event using sensing means; operating a camera to capture image data in response to the detection by the sensing means; transmitting said image data to a server; and sending said image data from said server to a monitoring workstation via a data communication network.
Preferably the method further comprises sending an acknowledgement from the workstation to the server that image data sent to the workstation has been viewed by a person at said workstation.
Preferably the method further comprises the server sending the image data to an alternative workstation if no acknowledgement is received by the server from the workstation to which the image data was initially sent.
Preferably the method further comprises a person at a monitoring workstation alerting security personnel in the locality of a detected event or an incident (or potential incident) observed on said workstation.
Preferably the method further comprises activating and/or controlling electrical devices in the locality of a detected event or an incident (or potential incident) observed on said workstation. Particularly preferably the electrical devices are activated and/or controlled from said workstation using X10, Bluetooth (RTM) or wireless communication.
Preferably the method further comprises controlling the movement of a camera by inputting commands to a workstation, said commands being transmitted to the camera via the server and the network. Preferably the method further comprises the server alerting a person that an event has been detected. Particularly preferably the person is alerted by the server using e-mail, paging, text-messaging or a telephone call.
Preferably the method further comprises maintaining a record on the server of cameras in use, together with data specifying the location of each camera and an appropriate response should an event be detected by the sensing means corresponding to a given camera. For a given camera, preferably the server holds details of the monitoring workstations and the corresponding monitoring personnel to whom image data should be sent.
Preferably the method further comprises the server periodically checking that a camera is functioning correctly.
Preferably the method further comprises the server making adjustments to the sensitivity of sensing means if the corresponding camera is prone to reporting false alarms.
According to a third aspect of the invention there is a provided a remotely-locatable security monitoring device comprising a camera, sensing means and transmitting means, the remotely-locatable device being operable, on the detection of an event by the sensing means, to transmit digital image data captured by the camera to a remote server or a remote workstation.
As mentioned previously, the remotely-locatable device may comprise the camera, sensing means and transmitting means in a common housing or in separate units in communication (electrically or wirelessly) with one another. A plurality of sensing means may be connected to one camera, or a plurality of cameras may be connected to one sensing means.
Preferably the sensing means are responsive to one or more of:- motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain.
Preferably the transmitting means are wireless.
Preferably the remotely-locatable security monitoring device is configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), satellite communication, optical communication, dialup connection using a modem.
Preferably the remotely-locatable security monitoring device is adapted to communicate with other electrical devices in its locality such that, on detection of an event by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation.
Particularly preferably the remotely-locatable security monitoring device further comprises communication means to enable it to communicate with other such remotely-locatable security monitoring devices such that, in use, a plurality of such devices proximally located can communicate with each other to cause their respective cameras to capture a common incident. According to a fourth aspect of the invention there is a provided a server operable to be connected to a digital communication network, to receive digital image data from a remotely- locatable security monitoring device, and to transmit the digital image data to a monitoring workstation in communication with the network.
Preferably the server is configured to request an acknowledgement that digital image data sent to a workstation has been viewed by a person at said workstation.
Preferably the server holds or has access to a record of a plurality of security monitoring devices in use, together with data specifying the location of each security monitoring device and an appropriate response should an event be detected by a given security monitoring device.
Preferably the server is operable to perform periodic checks that a security monitoring device is functioning correctly.
Preferably the server is operable to make adjustments to the sensitivity of a security monitoring device if it is prone to reporting false alarms.
Embodiments of the invention will now be described, by way of example, and with reference to the drawings in which:
Figure 1 illustrates a network (e.g. the Internet) to which remote monitoring devices, a server and monitoring workstations are connected;
Figure 2 illustrates a remote monitoring device connected to a local electrical device (in this instance, a television) for monitoring and deterring intruders; Figure 3 illustrates two remote monitoring devices and an electrical device (a TV) installed in a common site, the monitoring devices being controlled by a local control unit and the TV being controlled by a local portal controller;
Figure 4 illustrates a plan view and a side view of a sensor array as may be used in conjunction with a security camera;
Figure 5 illustrates an arrangement of cameras and sensors which would typically be used against a wall, providing 180 degree coverage;
Figure 6 illustrates an arrangement of cameras and sensors suitable for use in the middle of a large compound or building, providing 360 degree coverage; Figure 7 illustrates two cameras with sensors arranged facing in opposite directions, as may be used in a narrow alley or corridor;
Figure 8 illustrates a rear view of a remote monitoring device;
Figure 9 illustrates a front view of a remote monitoring device; and
Figure 10 illustrates two remote monitoring devices in mutual communication monitoring an area common to both cameras.
Figure 1 illustrates a network of remote monitoring devices 10, 12, 14 in communication with monitoring workstations 26, 28, 30, 32 via a network 22 and a server 24. In a preferred embodiment of the invention the network 22 is, or at least partially comprises, the Internet.
The remote monitoring devices 10, 12, 14 may be wirelessly connected to the network 22, or may be connected by an electrical cable. In Figure 1 , devices 10 and 14 are shown in wireless communication with the network 22, whereas device 12 is connected by a cable. Taking remote monitoring device 10 as an example, this has a camera 16 and a sensor 18 responsive to motion or human presence in the vicinity of the camera. Transmitting means, such as a wireless transmitter, a dialup modem, or a permanent wired connection, are also provided to enable the device 10 to communicate with the network 22. A power supply is included in the device 10. If the device is to be installed in a remote area, then the power supply may be a battery or a solar cell. Alternatively, if the device is within reach of a mains electricity supply, then this may be used instead to provide power. Although in the Figure the monitoring device 10 is illustrated as a single unit, the various components (i.e. the camera 16, the sensor 18, the transmitting means and the control circuitry) may alternatively be provided in separate units in communication (electrically or wirelessly) with one another. Furthermore, a plurality of sensors may be connected to one camera, or a plurality of cameras may be connected to one sensor.
Connected to the network 22 is a server 24 hosting, or in communication with, a database. The database may be a SQL (structured query language) database.
In communication with the server 24 are a plurality of monitoring workstations 26, 28, 30, 32. The monitoring workstations may be directly connected to the server 24, or in communication with the server via the Internet. In a preferred embodiment of the invention the monitoring workstations are domestic personal computers (which may be manned by disabled or housebound people) having Internet access and running Internet browser software. Data communication over the network is preferably encrypted, for example, using SSL (secure sockets layer). In use, the remote monitoring devices are positioned where desired. If no activity is detected by the sensor, then the device is dormant. However, as shown in Figure 1 with respect to device 10, if an intruder 20 or movement of some kind is detected by the sensor 18, then the device operates its camera 16 to capture one or more images of the intruder 20. These images are then transmitted to the server 24 via the network 22.
The server 24 and its database hold details of the location of the cameras and the monitoring workstations to which the image of the intruder 20 is to be transmitted. For a given camera, a preferred monitoring workstation may be specified, along with reserve workstations should the preferred one be unresponsive or unable to deal with the images transmitted from the camera. Specialist monitoring workstations may be used for specific categories of location (e.g. railways or coastlines). Because different situations will require particular actions to be taken, the monitoring personnel may need to be appropriately trained. Monitoring personnel may be trained in teams, and the server may be configured to track the availability and workload of both the monitoring workstations and their personnel.
The server is preferably configured to determine which workstations are active (i.e. which workstations are on-line and logged on to the server) and hence ready to receive the images.
Thus, on receiving the images from the camera 16, the server 24 transmits them to the specified workstation. In the example shown in Figure 1 , the image is transmitted to workstation 26. Camera-specific response instructions may also be stored on the server and transmitted to the workstation. A person at the workstation 26 then views and assesses the image and, if necessary, informs (39) security personnel 40 local to the site of the intruder 20. The security personnel 40 may be employed by the client organisation (i.e. at the site of the intrusion), or they may be the police or a security company. The security personnel 40 will then respond (41 ) to apprehend the intruder 20. In some cases, no action may need to be taken by the monitoring personnel - for example, if the sensor was triggered by an animal.
When sending the image to the workstation, the server also requests an acknowledgement that the image has been received and considered by the person at the workstation. An automated acknowledgement may be sent from the workstation to the server to confirm that the image has been received and viewed. If no such acknowledgement is received by the server within a predetermined time, then the server will select another workstation to which to send the image.
On receiving an image from a camera, the server may also alert people directly that an incident has been detected. This may be done via an automated telephone call (e.g. to a mobile phone 34), or by paging or sending a text message or an e-mail message to a device such as a personal digital assistant 36. The people alerted in such a manner may be the monitoring personnel (e.g. to request them to look urgently at an image on their workstation) or the police or security personnel local to the intruder. Through knowing the location of the camera from which the image originated, the server can alert people in the locality of the camera.
Monitoring personnel may work in teams. Some may be based in the same room or building as one another, and hence can interact and support one another. Others based elsewhere may be contacted when their assistance is required (e.g. if a primary monitor has to leave his workstation for whatever reason and is hence unavailable). Such communication between the monitoring personnel may be effected via their workstations and the server.
The images transmitted from the cameras to the workstations may take a variety of formats, depending on the speed of data communication available For example, video images may be captured (e.g. at 640 x 480 resolution). Alternatively, still images may be transmitted. Small or low-resolution preview images may be transmitted in the first instance and then, if the monitoring person deems it necessary, he may instruct the server to supply high- resolution or moving video images instead.
The monitoring workstations may be used to control the remote devices. Instructions from the workstations are sent to the remote devices via the network 22 and the server 24. In particular, the cameras may be motorised, and their direction of view may thus be adjusted by the monitoring personnel by inputting instructions to their workstations. This enables a monitoring person to track the movement of a potential intruder.
As shown in Figure 2, other electrical devices may also be in communication with the remote monitoring device 50, for example via the X10 protocol, or by Bluetooth (RTM) or some other wireless communication means. These other devices may be lights or domestic appliances such as a television 54, and may be activated or controlled either automatically, when the remote sensor detects a potential intruder 20, or on command from a monitoring workstation if the monitoring person considers it appropriate. The activation of such appliances or lights is intended to deter the intruder from proceeding with his activities. As shown in Figure 3, in a given location, a plurality of monitoring devices 58, 60 may be networked via a local controller 56. This controller (or hub) 56 is in communication with the network 22. Other electrical devices such as a television set 64 may be controlled via the controller 56, either directly or via a secondary portal controller 62. A separate portal controller may be employed for each communications protocol used to control the electrical devices - e.g. one portal controller for X10 devices and one for Bluetooth (RTM). Alternatively a multi-portal controller may be employed that can communicate over more than one protocol.
The design of the remote monitoring devices is important in order to be able to monitor remote locations effectively. Figure 4 shows plan and side views of an emitter/sensor array. To achieve a 360-degree monitoring capability the sensors may be arranged around the circumference of the camera, effectively in a circle as shown in this Figure. Each sensor's field of view is similar to the camera; the narrower the field of view the greater the distance and detail of the pictures.
With motorised cameras, when a sensor is triggered, the camera may be configured to turn to that position and start filming or capturing images for a few seconds. Where the target triggers two adjacent sensors the camera will stop between them (and this may be used to halve the number of sensors needed). Alternatively there may be an array of cameras covering the required field of view. In this case individual cameras may be added or subtracted according to the conditions of the site. Figures 5, 6 and 6 show examples of possible arrangements of cameras and sensors. Although in Figure 6 eight cameras are used to cover the full 360 degrees, the number of cameras could be increased to sixteen or more. Figure 8 illustrates a rear view of a remote monitoring device 70, showing a connector 72 for connection to a local controller (e.g. 56 in Figure 3). The front of the device, as shown in Figure 9, incorporates the camera lens 74 and the sensor 76. The sensor may be passive infrared or another light source, that triggers when there is a movement within its field of view.
Inter-camera communication
At the same time as transmitting pictures to the server, the active camera may also communicate with any adjacent cameras, which will turn towards its location and take further pictures, sending them to the server at the same time. In such cases, the system uses its emitter/sensor in a dual role, first to detect an intruder and secondly as means for inter-camera communication. Communication between cameras may also be achieved using Bluetooth (RTM), laser, X10 or other alternative technology. When the cameras need to communicate, the communication will be between the emitter on one camera and the sensor on the other. This will be in the form of a pulsed signal, arranged such that the emitting camera is not mistaken for an intruder.
As shown in Figure 10, when two cameras 80, 82 detect an intruder 88 there will be a cross- over point of the emitter beams, that can be used to operate other devices 90 close to the location of the intruder, using the signalling mode of the emitter. These other devices could be lighting, dye spray, locks, alarms, electrical appliances, and so on.
Installation and setup of new monitonng hardware When a customer purchases a camera, they may give details of where the system is to be located (this may include a local map) and what to do in the event of an unwanted intrusion. These details will be maintained by the server/database.
When the primary camera is first switched on, it contacts the server, notifies the system of its activation and provide its location or coordinates. The server will recognise the camera and obtain relevant details from the camera, together with a picture from the camera.
The server then selects a monitoring person (or another surveillance organisation as agreed with the customer) to perform the initial set-up.
Initial set-up of cameras
When a monitoring person receives notification of a new camera installation they can take direct control of it, via their workstation, and adjust the vertical position (up/down) of the camera and the sensor level to avoid spurious alarms caused by cats etc. They monitoring person can also check the other cameras in the installation and select the most appropriate secondary pictures to take when an adjacent camera is triggered.
Camera communication Cameras in the system may be configured to communicate with each other and to ensure that they remain active. In the event of a camera failing or otherwise being damaged, the other local cameras may be configured to make regular sweeps of the affected area, until the affected camera is back in action. As described above, the remote camera unit may also be configured to communicate with other devices (e.g. via Bluetooth (RTM), laser, dialup, radio or X10) to activate lighting, locks, alarms, etc.
Automatic camera tracking
Cameras may track either with a multi-lens setup or a motorised lens using directional sensors. When the sensor detects a target, a primary camera will turn to the required direction or activate the appropriate camera and capture images. At the same time it can communicate with other cameras in the system to track to the same direction and to take additional photos to pick up other useful information such as nearby parked cars.
The tracking facility means that a narrow angle lens can be used rather than a wide angle lens, which allows the pictures taken to be high definition.
Because the angle between two or more cameras in a system detecting a target is known, using the coordinates of the cameras it is possible to determine the exact position of the intruder, and this in turn may allow some other action to be made possible. Global positioning technology may be used to determine the location of the cameras.
Home based monitoring
With the example of monitoring personnel viewing images and controlling cameras via the Internet, the monitoring workstation can be situated anywhere in the world where adequate cost-effective Internet communication exists. On receiving a photo, the monitor acknowledges receipt, determines whether the incident is real or a false alarm and take appropriate action. An automated response may be used (e.g. using text messaging, e-mail, etc.) or alternatively manual action may be taken, such as alerting local authorities or the client, etc. The monitoring person may remotely operate the camera to enable further investigation of the situation.
Camera control
In the case where a monitoring person takes control of a camera system, they can manually adjust the direction of the camera and operate any lighting or devices that are in communication with the system. They are also able to adjust the individual sensors to avoid false alarms caused by passing cats etc.
The server
The server is preferably configured such that it: • Maintains a list of client cameras, including location maps and response instructions.
• Maintains the allocation of monitors to clients, ensuring adequate cover.
• Checks camera connections periodically.
• Maintains a history of each camera.
• Connects a monitoring workstation to the appropriate camera in the case of an event. The workstation may be selected dependent on availability and the training of the person there.
• Can make adjustments to the camera sensors when high incidents of false alarms are reported. The server may also contact the response unit (e.g. 40 in Figure 1 ) directly, if no monitoring workstation is available to deal with the matter.
Summary A preferred embodiment of the invention comprises a remote monitoring device incorporating mobile phone technology and a camera, and a monitoring workstation in communication with the remote monitoring device via the Internet.
With traditional monitoring systems, one or more persons watch banks of screens, looking for suspicious behaviour. These systems are suitable for the high street or areas of high activity. However, they are expensive to operate and are fixed into location. It is difficult to move either the monitoring location or the cameras themselves.
However, in accordance with a preferred embodiment of the invention, a compact camera, computer and 3G mobile phone transmitter/receiver may be employed that is self sufficient in power and requires no cables. This makes it easy to install or move to different locations as the need demands. The camera is able to track a target through 270-360 degrees using sensors and where two or more units are installed, communicate with each other so that they can point in the same direction to pick up other information or protect each other from tampering or theft. The monitoring is done over the Internet.
The essential difference between the two systems is that the traditional system requires constant surveillance or recording. However, the system in accordance with the present invention is event driven, and in normal circumstances would be dormant, switching on only when the sensors trigger it into operation. It is ideal for areas in which human traffic is rare and is likely to be undesirable. This means that one monitoring person can look after many hundreds of cameras.
Images taken by the remote cameras are sent to a server on the Internet, which forwards the images to one or more monitoring workstations (which may be home-based). Other forms of communication used may include SMS text messaging and automatic voice calling. The server checks that the images have been responded to within a predetermined time. If no response has been received then the server will resend the images to other monitors. These other monitors can be predefined, or automated based on the locality of the camera (which may make use of the GPS co-ordinates of the camera).
The monitors may be managed by the server in teams, so that situations needing specific responses are properly provided for, by virtue of the monitoring personnel being suitably trained.
The server may keep a history of each monitored site and provide a site map (e.g. using MapPoint - a software facility that uses GPS to provide local area maps) to the monitoring person, thereby detailing the location of the activated camera.
Examples of potential surveillance sites and applications
• Railway embankments, where an intruder may place an obstruction on the railway line.
• Customs and excise, where there is a need to keep watch on a remote area of coastline or port boundary, where drug smuggling or unlawful immigration may occur. Seaport and airport perimeters.
Airport hangers, where a human presence could be suspicious.
Police observation of a house in which drug dealing is taking place.
Remote sites in which terrorists are known to operate.
Commercial and residential sites.
A company's research and development department (for out-of-hours monitoring).
To provide cheap overnight cover for conventional CCTV surveillance.
Other phenomena which may be monitored, using appropriate sensors, include abnormal levels of mechanical stress or strain (e.g. on railway lines, bridges, etc.) and abnormal temperatures or pressures (e.g. in power stations or industrial machinery).

Claims

1. Security monitoring apparatus comprising: a remotely-locatable device comprising a camera, sensing means and transmitting means, the remotely-locatable device being operable, on the detection of an event by the sensing means, to transmit digital image data captured by the camera; and a server connected to a digital communication network and in communication with receiving means, the receiving means being operable to receive digital image data transmitted by the remotely-locatable device, and the server being configured to transmit the digital image data to a monitoring workstation in communication with the network.
2. Security monitoring apparatus as claimed in Claim 1 , wherein the sensing means are responsive to one or more of:- motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain.
3. Security monitoring apparatus as claimed in Claim 1 or Claim 2, wherein the server is configured to request an acknowledgement that digital image data sent to the workstation has been viewed by a person at said workstation.
Security monitoring apparatus as claimed in any preceding Claim, wherein the workstation is one of a plurality of workstations.
5. Security monitoring apparatus as claimed in any preceding Claim, wherein the network comprises the Internet and the workstations are personal computers connected to the Internet.
6. Security monitoring apparatus as claimed in any preceding Claim, wherein the remotely-locatable device is wirelessly connected to the network.
7. Security monitoring apparatus as claimed in any preceding Claim, wherein the remotely-locatable device is configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), satellite communication, optical communication, dialup connection using a modem.
8. Security monitoring apparatus as claimed in any preceding Claim, wherein the remotely-locatable device is adapted to communicate with other electrical devices in its locality such that, on detection of motion or human presence by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation, said instructions being communicated via the server and the network.
9. Security monitoring apparatus as claimed in Claim 8, wherein said other electrical devices are activated and/or controlled using X10, Bluetooth (RTM) or wireless communication.
10. Security monitoring apparatus as claimed in any preceding Claim, wherein the camera is motorised and moveable such that its direction of view may be changed.
11. Security monitoring apparatus as claimed in Claim 10, wherein the camera is moveable on the instructions of a person at a monitoring workstation, said instructions being communicated via the server and the network.
12. Security monitoring apparatus as claimed in Claim 10 or Claim 11, wherein the remotely-locatable device further comprises a directionally sensitive sensor or plurality of sensors, and is configured to move the camera to face the direction of a detected object or person.
13. Security monitoring apparatus as claimed in any preceding Claim, comprising a plurality of remotely-locatable devices at a common site, the devices comprising communication means to enable them to communicate between one another and to cause their respective cameras to capture a common incident.
14. Security monitoring apparatus as claimed in any preceding Claim wherein the server holds or has access to a record of the cameras in use, together with data specifying the location of each camera and an appropriate response should an incident be detected by a given camera.
15. Security monitoring apparatus as claimed in Claim 14 wherein, for a given camera, the server holds details of the monitoring workstations and the corresponding monitoring personnel to whom image data from that camera should be sent.
16. Security monitoring apparatus as claimed in any preceding Claim, wherein the server is operable to perform periodic checks that a remotely-locatable device is functioning correctly.
17. Security monitoring apparatus as claimed in any preceding Claim, wherein the server is operable to make adjustments to the sensitivity of sensing means if the corresponding remotely-locatable device is prone to reporting false alarms.
18. A method of security monitoring comprising the steps of: detecting an event using sensing means; operating a camera to capture image data in response to the detection by the sensing means; transmitting said image data to a server; and sending said image data from said server to a monitoring workstation via a data communication network.
19. A method as claimed in Claim 18 further comprising sending an acknowledgement from the workstation to the server that image data sent to the workstation has been viewed by a person at said workstation.
20. A method as claimed in Claim 19 further comprising the server sending the image data to an alternative workstation if no acknowledgement is received by the server from the workstation to which the image data was initially sent.
21. A method as claimed in any of Claims 18 to 20, further comprising a person at a monitoring workstation alerting security personnel in the locality of a detected event or an incident (or potential incident) observed on said workstation.
22. A method as claimed in any of Claims 18 to 21 , further comprising activating and/or controlling electrical devices in the locality of a detected event or an incident (or potential incident) observed on said workstation.
23. A method as claimed in Claim 22 wherein the electrical devices are activated and/or controlled from said workstation using X10, Bluetooth (RTM) or wireless communication.
24. A method as claimed in any of Claims 18 to 23, further comprising controlling the movement of a camera by inputting commands to a workstation, said commands being transmitted to the camera via the server and the network.
25. A method as claimed in any of Claims 18 to 24, further comprising the server alerting a person that an event has been detected.
26. A method as claimed in Claim 25, wherein the person is alerted by the server using e-mail, paging, text-messaging or a telephone call.
27. A method as claimed in any of Claims 18 to 26 further comprising maintaining a record on the server of cameras in use, together with data specifying the location of each camera and an appropriate response should an event be detected by the sensing means corresponding to a given camera.
28. A method as claimed in Claim 27 wherein, for a given camera, the server further holds details of the monitoring workstations and the corresponding monitoring personnel to whom image data should be sent.
29. A method as claimed in any of Claims 18 to 28 further comprising the server periodically checking that a camera is functioning correctly.
30. A method as claimed in any of Claims 18 to 29 further comprising the server making adjustments to the sensitivity of sensing means if the corresponding camera is prone to reporting false alarms.
31. A remotely-locatable security monitoring device comprising a camera, sensing means and transmitting means, the remotely-locatable device being operable, on the detection of an event by the sensing means, to transmit digital image data captured by the camera to a remote server or a remote workstation.
32. A remotely-locatable security monitoring device as claimed in Claim 31 , wherein the sensing means are responsive to one or more of:- motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain.
33. A remotely-locatable security monitoring device as claimed in Claim 31 or Claim 32, wherein the transmitting means are wireless.
34. A remotely-locatable security monitoring device as claimed in any of Claims 31 to 33, configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), satellite communication, optical communication, dialup connection using a modem.
35. A remotely-locatable security monitoring device as claimed in any of Claims 31 to 34, adapted to communicate with other electrical devices in its locality such that, on detection of an event by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation.
36. A remotely-locatable security monitoring device as claimed in any of Claims 31 to 35, further comprising communication means to enable it to communicate with other such remotely-locatable security monitoring devices such that, in use, a plurality of such devices proximally located can communicate with each other to cause their respective cameras to capture a common incident.
37. A server operable to be connected to a digital communication network, to receive digital image data from a remotely-locatable security monitoring device, and to transmit the digital image data to a monitoring workstation in communication with the network.
38. A server as claimed in Claim 37, configured to request an acknowledgement that digital image data sent to a workstation has been viewed by a person at said workstation.
39. A server as claimed in Claim 37 or Claim 38, holding or having access to a record of a plurality of security monitoring devices in use, together with data specifying the location of each security monitoring device and an appropriate response should an event be detected by a given security monitoring device.
40. A server as claimed in any of Claims 37 to 39, operable to perform periodic checks that a security monitoring device is functioning correctly.
41. A server as claimed in any of Claims 37 to 40, operable to make adjustments to the sensitivity of a security monitoring device if it is prone to reporting false alarms.
42. Security monitoring apparatus substantially as herein described with reference to and as illustrated in any combination of the accompanying drawings.
43. A method of security monitoring substantially as herein described with reference to and as illustrated in any combination of the accompanying drawings.
44. A remotely-locatable security monitoring device substantially as herein described with reference to and as illustrated in any combination of the accompanying drawings. A server substantially as herein described with reference to and as illustrated in any combination of the accompanying drawings.
PCT/GB2003/002467 2002-06-17 2003-06-09 Security monitoring apparatus and method WO2003107293A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2003244779A AU2003244779A1 (en) 2002-06-17 2003-06-09 Security monitoring apparatus and method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB0213866.7 2002-06-17
GB0213866A GB2389978A (en) 2002-06-17 2002-06-17 Event-triggered security monitoring apparatus

Publications (1)

Publication Number Publication Date
WO2003107293A1 true WO2003107293A1 (en) 2003-12-24

Family

ID=9938715

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB2003/002467 WO2003107293A1 (en) 2002-06-17 2003-06-09 Security monitoring apparatus and method

Country Status (3)

Country Link
AU (1) AU2003244779A1 (en)
GB (1) GB2389978A (en)
WO (1) WO2003107293A1 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2874776A1 (en) * 2004-09-01 2006-03-03 Sygetis Sarl Intrusion validating method for e.g. enterprise, involves converting visual information to obtain processed information that is in format readable by terminal, which is then connected to remote server to allow user to validate intrusion
WO2006071123A1 (en) * 2004-12-27 2006-07-06 Tor Helgesen Unit for automatic video surveillance and control via the 3rd generation cell phone system
DE102006010955B3 (en) * 2006-03-03 2007-10-04 Siemens Ag Method for visually monitoring a room area
WO2016018067A1 (en) * 2014-07-29 2016-02-04 Samsung Electronics Co., Ltd. Method and device for mapping sensor location and event operation using monitoring device
US20160099976A1 (en) * 2014-10-07 2016-04-07 Cisco Technology, Inc. Internet of Things Context-Enabled Device-Driven Tracking
GB2562251A (en) * 2017-05-09 2018-11-14 Zircon Software Ltd System and method for detecting unauthorised personnel

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7363543B2 (en) 2002-04-30 2008-04-22 International Business Machines Corporation Method and apparatus for generating diagnostic recommendations for enhancing process performance
CN1194484C (en) * 2003-01-30 2005-03-23 张健 Real time monitoring and transferring methods of visible home safety and protection system
US20040223054A1 (en) * 2003-05-06 2004-11-11 Rotholtz Ben Aaron Multi-purpose video surveillance
CN1694531A (en) * 2004-02-11 2005-11-09 传感电子公司 System and method for remote access to security event information
DE502004007156D1 (en) * 2004-09-29 2008-06-26 Thomas Grellner Surveillance system and camera for this
GB2420044B (en) * 2004-11-03 2009-04-01 Pedagog Ltd Viewing system
US20060235697A1 (en) * 2005-04-14 2006-10-19 American Research & Technology On-line security management system
MXPA06013614A (en) * 2006-11-24 2007-12-06 Global Sight S A De C V Systems for the remote and digital transmission of data and satellite localization from mobile or fixed terminals using urbane surveying cameras for facial recognition, shot detection, capture of public safety staff and lost or kidnapped people, publ
WO2010116364A1 (en) * 2009-04-05 2010-10-14 Tadsec Advanced Homeland Security Technologies Ltd A security management system and method
FR2980023B1 (en) * 2011-09-09 2014-08-08 France Veille Eurl COMMUNITY MONITORING PROCESS
KR20150018125A (en) * 2013-08-09 2015-02-23 엘지전자 주식회사 Electronic device and terminal communicating whit it
KR101803806B1 (en) * 2016-01-25 2017-12-04 임인택 Social security network system having portable lighting for combing wireless disaster fire detection and security accident prevention

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2325548A (en) * 1997-05-21 1998-11-25 Richard Parviz Nabavi Security alarm systems
WO2000072573A2 (en) * 1999-04-30 2000-11-30 Touch Technologies, Inc. Method and apparatus for surveillance using an image server
US6215519B1 (en) * 1998-03-04 2001-04-10 The Trustees Of Columbia University In The City Of New York Combined wide angle and narrow angle imaging system and method for surveillance and monitoring
US6281790B1 (en) * 1999-09-01 2001-08-28 Net Talon Security Systems, Inc. Method and apparatus for remotely monitoring a site
US20020005894A1 (en) * 2000-04-10 2002-01-17 Foodman Bruce A. Internet based emergency communication system
US6385772B1 (en) * 1998-04-30 2002-05-07 Texas Instruments Incorporated Monitoring system having wireless remote viewing and control
US6400265B1 (en) * 2001-04-24 2002-06-04 Microstrategy, Inc. System and method for monitoring security systems by using video images

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2064189A (en) * 1979-11-09 1981-06-10 Ascotts Ltd Surveillance System
CA2228679A1 (en) * 1998-02-04 1999-08-04 Gridzero Technologies Inc. Surveillance systems
US6271752B1 (en) * 1998-10-02 2001-08-07 Lucent Technologies, Inc. Intelligent multi-access system
AUPQ217399A0 (en) * 1999-08-12 1999-09-02 Honeywell Limited Realtime digital video server
GB2364460A (en) * 2000-05-02 2002-01-23 Ford Global Tech Inc Web-based video conference system for remote fault diagnosis
US20020030738A1 (en) * 2000-06-01 2002-03-14 Moreinis Joseph Daniel Web based monitoring system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2325548A (en) * 1997-05-21 1998-11-25 Richard Parviz Nabavi Security alarm systems
US6215519B1 (en) * 1998-03-04 2001-04-10 The Trustees Of Columbia University In The City Of New York Combined wide angle and narrow angle imaging system and method for surveillance and monitoring
US6385772B1 (en) * 1998-04-30 2002-05-07 Texas Instruments Incorporated Monitoring system having wireless remote viewing and control
WO2000072573A2 (en) * 1999-04-30 2000-11-30 Touch Technologies, Inc. Method and apparatus for surveillance using an image server
US6281790B1 (en) * 1999-09-01 2001-08-28 Net Talon Security Systems, Inc. Method and apparatus for remotely monitoring a site
US20020005894A1 (en) * 2000-04-10 2002-01-17 Foodman Bruce A. Internet based emergency communication system
US6400265B1 (en) * 2001-04-24 2002-06-04 Microstrategy, Inc. System and method for monitoring security systems by using video images

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2874776A1 (en) * 2004-09-01 2006-03-03 Sygetis Sarl Intrusion validating method for e.g. enterprise, involves converting visual information to obtain processed information that is in format readable by terminal, which is then connected to remote server to allow user to validate intrusion
WO2006071123A1 (en) * 2004-12-27 2006-07-06 Tor Helgesen Unit for automatic video surveillance and control via the 3rd generation cell phone system
DE102006010955B3 (en) * 2006-03-03 2007-10-04 Siemens Ag Method for visually monitoring a room area
WO2016018067A1 (en) * 2014-07-29 2016-02-04 Samsung Electronics Co., Ltd. Method and device for mapping sensor location and event operation using monitoring device
US20160099976A1 (en) * 2014-10-07 2016-04-07 Cisco Technology, Inc. Internet of Things Context-Enabled Device-Driven Tracking
US9871830B2 (en) * 2014-10-07 2018-01-16 Cisco Technology, Inc. Internet of things context-enabled device-driven tracking
GB2562251A (en) * 2017-05-09 2018-11-14 Zircon Software Ltd System and method for detecting unauthorised personnel

Also Published As

Publication number Publication date
GB2389978A (en) 2003-12-24
GB0213866D0 (en) 2002-07-31
AU2003244779A1 (en) 2003-12-31

Similar Documents

Publication Publication Date Title
WO2003107293A1 (en) Security monitoring apparatus and method
CA2623501C (en) Security monitoring arrangement and method using a common field of view
US20090122144A1 (en) Method for detecting events at a secured location
US6163257A (en) Security system having event detectors and keypads with integral monitor
EP1547036B1 (en) Automatic detection and monitoring of perimeter physical movement
US6970183B1 (en) Multimedia surveillance and monitoring system including network configuration
KR100780601B1 (en) Apparatus and method for intellectual integration auto controlling
EP1249806A2 (en) Monitoring system
US20070139192A1 (en) Sensor unit having a network video camera
JPH11154292A (en) Integrated warning system
CN102419883A (en) Monitor method and system of monitored defense zone
US20040036596A1 (en) Security system and methods
KR100929921B1 (en) Ubiquitous integrated security video device and system
KR100440786B1 (en) Remote digital video recording and emergency-monitoring system
JP3843733B2 (en) Security monitoring system using communication network
JP2003223603A (en) Centralized control system for preventing office abnormality
KR102283434B1 (en) System for Operating SOS Emergency Bell with IP Camera
JP3128260U (en) Intrusion prevention warning barrier system
JP2005141481A (en) Security system
KR101597154B1 (en) An apparatus for security system using dual wireless modules
GB2443848A (en) A surveillance system with identification detection
JP2002183845A (en) Crime preventing device
KR200296224Y1 (en) The guard camera system attaching a sensor
GB2451291A (en) Portable video surveillance system
AU2020256378B2 (en) Fire Protection Systems

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP