[go: up one dir, main page]

GB2389978A - Event-triggered security monitoring apparatus - Google Patents

Event-triggered security monitoring apparatus Download PDF

Info

Publication number
GB2389978A
GB2389978A GB0213866A GB0213866A GB2389978A GB 2389978 A GB2389978 A GB 2389978A GB 0213866 A GB0213866 A GB 0213866A GB 0213866 A GB0213866 A GB 0213866A GB 2389978 A GB2389978 A GB 2389978A
Authority
GB
United Kingdom
Prior art keywords
server
security monitoring
camera
workstation
remotely
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0213866A
Other versions
GB0213866D0 (en
Inventor
Raymond Joseph Lambert
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to GB0213866A priority Critical patent/GB2389978A/en
Publication of GB0213866D0 publication Critical patent/GB0213866D0/en
Priority to PCT/GB2003/002467 priority patent/WO2003107293A1/en
Priority to AU2003244779A priority patent/AU2003244779A1/en
Publication of GB2389978A publication Critical patent/GB2389978A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19695Arrangements wherein non-video detectors start video recording or forwarding but do not generate an alarm themselves
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19656Network used to communicate with a camera, e.g. WAN, LAN, Internet
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface
    • G08B13/19684Portable terminal, e.g. mobile phone, used for viewing video remotely

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Human Computer Interaction (AREA)
  • Alarm Systems (AREA)

Abstract

Security monitoring apparatus comprising: a remotely-locatable device 10,12,14 comprising a camera, 16 sensing means 18 and transmitting means, the remotely-locatable device 10,12,14 being operable on the detection of an event by the sensing means, to transmit digital image data captured by the camera; and a server 24 connected to a digital communication network 22 and and in communication with receiving means, the receiving means being operable to receive digital image data transmitted by the remotely-locatable device, and the server being configured to transmit the digital image data to a monitoring workstation 26 in communication with the network. The invention also provides a method of security monitoring comprising the steps of: detecting an event using sensing means;operating a camera to capture image data in response to the detection by the sensing means; transmitting said image data to a server; and sending said image data from said server to a monitoring workstation via a data communication network. The invention further provides a remotely-locatable security monitoring device and a server.

Description

SECURITY MONITORING APPARATUS AND METHOD
This invention relates to security monitoring apparatus for detecting and observing events such as the presence of intruders, trespassers, vandals and the like. It is particularly well 5 suited, but in no way limited, to the monitoring of remote locations such as railway lines and coastal sites.
Conventional security monitoring systems such as closed circuit television (CCTV) are well known, and are commonly used to watch for intruders in industrial sites, offices, warehouses 10 etc. However, the traditional method of monitoring with CCTV requires security personnel to continually watch the monitor screens to check for intruders and the like. The cost of employing these security personnel is considerable. The security personnel must watch the monitor screens continuously, particularly when the site is otherwise unstuffed. However, incidents which actually require the intervention of the security personnel may only happen 5 occasionally. For the majority of the time, therefore, the security personnel simply watch the screens whilst nothing of any relevance happens. It is considered that this situation is far from ideal, since the security personnel are costly to employ for long periods of time, yet they are only actually needed to take action occasionally. Furthermore, security personnel left watching the monitor screens for long periods of time may well get bored or restless, and 20 their attention to their duty may stray. They may even fail asleep whilst on duty, as a consequence of their lack of activity. This clearly compromises the security of the site.
Many locations, particularly remote sites such as railway lines and coastal sites, do not warrant on-site security personnel because incidents happen very rarely. However, 25 particularly in the case of railway lines, it will be appreciated that when incidents such as
intrusion or vandalism do occur, the consequences can be extremely serious. If a miscreant places an object (e.g. a vandalised bench) on a railway track, or drops a brick from a bridge, then a tragic accident may result. Inevitably disruption to the railway service is caused. The driver of a high speed train would be unable to stop the train in time to avoid impact with the 5 object. However, the remoteness of the sites and the general lack of incidents means that it is impractical to install conventional CCTV monitoring systems and to employ dedicated security personnel.
Problematic incidents also occur at coastal sites. Although vandalism and trespassing may 10 occur in these locations, more serious problems are the arrival of unlawful immigrants, incidents of drug smuggling, and people getting themselves into perilous danger, e.g. on cliffs or in caves. Again, in these locations it is impractical to install conventional CCTV systems and to employ dedicated staff to monitor them.
It is a general object of the present invention to overcome or at least mitigate at least some of the problems and deficiencies associated with conventional security systems and the monitoring thereof, particularly in remote locations in which there is often little activity, such as those identified above. It is a further object of the present invention to provide useful and valuable employment for people who traditionally are not used to their potential, such as 20 disabled people or the housebound.
According to a first aspect of the invention there is provided security monitoring apparatus comprising: a remotely-locatable device comprising a camera, sensing means and transmitting means, the remotely-locatable device being operable, on the detection of an 25 event by the sensing means, to transmit digital image data captured by the camera; and a
server connected to a digital communication network and in communication with receiving means, the receiving means being operable to receive digital image data transmitted by the remotely-locatable device, and the server being configured to transmit the digital image data to a monitoring workstation in communication with the network.
The remotely-locatable device (also referred to herein as the Remote device" orremote monitoring devices) may advantageously be positioned in remote locations such as railway lines and coastal sites, although it may also be sited in less remote locations such as industrial plants, commercial and residential buildings, and other places where security 10 monitoring is desired.
The remotely-locatable device may comprise the camera, sensing means and transmitting means in a common housing or in separate units in communication (electrically or wirelessly) with one another. A plurality of sensing means may be connected to one camera, or a i'; plurality of cameras may be connected to one sensing means. Having the camera, sensing means and transmitting means in a common housing provides a benefit of compactness and ease of installation, whereas having them in separate units provides greater operational flexibility and the ability to tailor the equipment to suit the application and environment.
20 The term event" should be interpreted broadly, to cover any incident or phenomenon detectable by appropriate sensing means. For example, detectable events include inter alla motion, human presence, sound, vibration, fluctuations in mechanical stress or strain, changes in light intensity, pressure or temperature, or combinations thereof. Hence the remotely-locatable device may be used to detect the presence of intruders or animals, 25 abnormal levels of mechanical stress or strain (e.g. on railway lines, bridges, etc.), abnormal
temperatures or pressures (e.g. in power stations or industrial machinery) , and so on. It will be appreciated by those skilled in the art that many other events may be monitored in such a manner. Although the invention will be illustrated herein primarily in the context of security monitoring apparatus for observing and responding to intruders, it is to be emphasised that it 5 is equally applicable to inter alla the types of events listed above.
Transmitting the digital image data via the server and the network to a monitoring workstation provides the advantage that the monitoring workstation may also be virtually anywhere. In a preferred embodiment of the invention the workstation is one of a plurality of 10 workstations connected to the Internet. This enables monitoring personnel to work from home, enabling disabled and housebound people to perform a useful and rewarding job.
The Internet provides an effective pre-existing network over which the image data may be transmitted, and the image data may readily be displayed though a conventional Intemet browser interface.
The provision of sensing means at the remotely-locatable device provides the advantage that images are only transmitted to the monitoring workstations when movement or human presence is detected. Under normal circumstances the remotely-locatable device is dominant and images are not transmitted. The monitoring system is event driven and does not require 20 a security person to continually monitor a given camera. Human intervention is only required when the sensing means detect an event and an image is transmitted. In this manner a single security person can oversee potentially hundreds of sites, resulting in reduced labour costs for security personnel. The monitoring workstations may even be located overseas, in countries where labour is cheap, in order to reduce costs still further.
Preferably the sensing means are responsive to one or more of:- motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain. As mentioned above, this list should not be regarded as exhaustive, and other physical phenomena (e.g. electric current, voltage etc.) 5 may also be detected using appropriate sensors.
Preferably the server is configured to request an acknowledgement that digital image data sent to the workstation has been viewed by a person at said workstation. If no acknowledgement is received, the server can direct the image data to another workstation.
10 This ensures that the disturbance or incident detected by the remotelylocatable device is observed by monitoring personnel and, if necessary, acted upon.
Preferably the remotely-locatable device is wirelessly connected to the network. This provides greatest freedom to the user, enabling the device to be located in particularly 15 remote sites and to be repositioned as desired. However, as an alternative, electrical cables may be used to connect the device to the network if the location permits.
Preferably the remotely-iocatabie device is configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), 20 satellite communication, optical communication, dialup connection using a modem. The 3G (third generation wireless) mobile telecommunication protocol is particularly well suited to this purpose.
Preferably the remotely-locatable device is adapted to communicate with other electrical 25 devices in its locality such that, on detection of motion or human presence by the sensing
means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation, said instructions being communicated via the server and the network. The other electrical devices referred to may be light bulbs, televisions and radios, for example. This feature may be employed in residential and office locations, for example, 5 and is intended to deter the intruder from proceeding with his activities. Alarms may also be activated in this manner.
Particularly preferably said other electrical devices are activated and/or controlled using X10, Bluetooth (RTM) or wireless communication. X10 is a protocol which enables devices IO connected to a mains electricity supply to receive control signals via the electricity supply itself. Preferably the camera is motorised and moveable such that its direction of view may be changed. IS Particularly preferably the camera is moveable on the instructions of a person at a monitoring workstation, said instructions being communicated via the server and the network. This enables an intruder or wrongdoer to be tracked by the camera as he moves about. Preferably the remotely-locatable device further comprises a directionally sensitive sensor or plurality of sensors, and is configured to move the camera to face the direction of a detected object or person.
( Preferably the security monitoring apparatus comprises a plurality of remotely-locatable devices at a common site, the devices comprising communication means to enable them to communicate between one another and to cause their respective cameras to capture a common incident.
Preferably the server holds or has access to a record of the cameras in use, together with data specifying the location of each camera and an appropriate response should an incident be detected by a given camera. For a given camera, preferably the server holds details of the monitoring workstations and the corresponding monitoring personnel to whom image 10 data from that camera should be sent.
Preferably the server is operable to perform periodic checks that a remotely-locatable device is functioning correctly. This means that if a camera develops a fault, the fault does not go : undetected. IS Preferably the server is operable to make adjustments to the sensitivity of sensing means if the corresponding remotely-locatable device is prone to reporting false alarms.
In accordance with a second aspect of the invention, there is provided a method of security 20 monitoring comprising the steps of: detecting an event using sensing means; operating a camera to capture image data in response to the detection by the sensing means; transmitting said image data to a server; and sending said image data from said server to a monitoring workstation via a data communication network.
Preferably the method further comprises sending an acknowledgement from the workstation to the server that image data sent to the workstation has been viewed by a person at said workstation. 5 Preferably the method further comprises the server sending the image data to an alternative workstation if no acknowledgement is received by the server from the workstation to which the innage data was initially sent.
Preferably the method further comprises a person at a monitoring workstation alerting 10 security personnel in the locality of a detected event or an incident (or potential incident) observed on said workstation.
Preferably the method further comprises activating and/or controlling electrical devices in the locality of a detected event or an incident (or potential incident) observed on said . 15 workstation. Particularly preferably the electrical devices are activated and/or controlled from said workstation using X10, Bluetooth (RTM) or wireless communication.
Preferably the method further comprises controlling the movement of a camera by inputting commands to a workstation, said commands being transmitted to the camera via the server 20 and the network.
Preferably the method further comprises the server alerting a person that an event has been I detected. Particularly preferably the person is alerted by the server using e-mail, paging, text-messaging or a telephone call.
Preferably the method further comprises maintaining a record on the server of cameras in use, together with data specifying the location of each camera and an appropriate response should an event be detected by the sensing means corresponding to a given camera. For a given camera, preferably the server holds details of the monitoring workstations and the S corresponding monitoring personnel to whom image data should be sent.
Preferably the method further comprises the server periodically checking that a camera is functioning correctly.
10 Preferably the method further comprises the server making adjustments to the sensitivity of sensing means if the corresponding camera is prone to reporting false alarms.
According to a third aspect of the invention there is a provided a remotely-locatable security monitoring device comprising a camera, sensing means and transmitting means, the 15 remotely-locatable device being operable, on the detection of an event by the sensing means, to transmit digital image data captured by the camera to a remote server or a remote workstation. As mentioned previously, the remotely-locatable device may comprise the camera, sensing 20 means and transmitting means in a common housing or in separate units in communication (electrically or wirelessly) with one another. A plurality of sensing means may be connected to one camera, or a plurality of cameras may be connected to one sensing means.
( Preferably the sensing means are responsive to one or more of:- motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain.
5 Preferably the transmitting means are wireless.
Preferably the remotely-locatable security monitoring device is configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), satellite communication, optical communication, dialup connection using a modem.
Preferably the remotely-locatable security monitoring device is adapted to communicate with other electrical devices in its locality such that, on detection of an event by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation.
IS Particularly preferably the remotely-locatable security monitoring device further comprises communication means to enable it to communicate with other such remotely-locatable security monitoring devices such that, in use, a plurality of such devices proximally located can communicate with each other to cause their respective cameras to capture a common 20 incident.
According to a fourth aspect of the invention there is a provided a server operable to be connected to a digital communication network, to receive digital image data from a remotely-
locatable security monitoring device, and to transmit the digital image data to a monitoring 25 workstation in communication with the network.
( Preferably the server is configured to request an acknowledgement that digital image data sent to a workstation has been viewed by a person at said workstation.
S Preferably the server holds or has access to a record of a plurality of security monitoring devices in use, together with data specifying the location of each security monitoring device and an appropriate response should an event be detected by a given security monitoring device. 10 Preferably the server is operable to perform periodic checks that a security monitoring device is functioning correctly.
Preferably the server is operable to make adjustments to the sensitivity of a security monitoring device if it is prone to reporting false alarms.
Embodiments of the invention will now be described, by way of example, and with reference . to the drawings in which: Figure 1 iitustrates a network (e.g. the Internet) to which remote monitoring devices, a server and monitoring workstations are connected; 20 Figure 2 illustrates a remote monitoring device connected to a local electrical device (in this instance, a television) for monitoring and deterring intruders; Figure 3 illustrates two remote monitoring devices and an electrical device (a TV) installed in a common site, the monitoring devices being controlled by a local control unit and the TV being controlled by a local portal controller;
( Figure 4 illustrates a plan view and a side view of a sensor array as may be used in conjunction with a security camera; Figure 5 illustrates an arrangement of cameras and sensors which would typically be used against a wall, providing 180 degree coverage; 5 Figure 6 illustrates an arrangement of cameras and sensors suitable for use in the middle of a large compound or building, providing 360 degree coverage; Figure 7 illustrates two cameras with sensors arranged facing in opposite directions, as may be used in a narrow alley or corridor; Figure 8 illustrates a rear view of a remote monitoring device; 10 Figure 9 illustrates a front view of a remote monitoring device; and Figure 10 illustrates two remote monitoring devices in mutual communication monitoring an area common to both cameras.
Figure 1 illustrates a network of remote monitoring devices 10, 12, 14 in communication with IS monitoring workstations 26, 28, 30, 32 via a network 22 and a server 24. In a preferred embodiment of the invention the network 22 is, or at least partially comprises, the Internet.
The remote monitoring devices 10, 12, 14 may be wirelessly connected to the network 22, or may be connected by an electrical cable. In Figure 1, devices 10 and 14 are shown in 20 wireless communication with the network 22, whereas device 12 is connected by a cable.
Taking remote monitoring device 10 as an example, this has a camera 16 and a sensor 18 responsive to motion or human presence in the vicinity of the camera. Transmitting means, such as a wireless transmitter, a dialup modem, or a permanent wired connection, are also 25 provided to enable the device 10 to communicate with the network 22. A power supply is
( included in the device 10. If the device is to be installed in a remote area, then the power supply may be a battery or a solar cell. Alternatively, if the device is within reach of a mains electricity supply, then this may be used instead to provide power. Although in the Figure the monitoring device 10 is illustrated as a single unit, the various components (i.e. the 5 camera 16, the sensor 18, the transmitting means and the control circuitry) may alternatively be provided in separate units in communication (electrically or wirelessly) with one another.
Furthermore, a plurality of sensors may be connected to one camera, or a plurality of cameras may be connected to one sensor.
to Connected to the network 22 is a server 24 hosting, or in communication with, a database.
The database may be a SQL (structured query language) database.
In communication with the server 24 are a plurality of monitoring workstations 26, 28, 30, 32.
The monitoring workstations may be directly connected to the server 24, or in 15 communication with the server via the internet. In a preferred embodiment of the invention the monitoring workstations are domestic personal computers (which may be manned by disabled or housebound people) having Internet access and running Internet browser software. Data communication over the network is preferably encrypted, for example, using SSL (secure sockets layer).
In use, the remote monitoring devices are positioned where desired. If no activity is detected by the sensor, then the device is dormant. However, as shown in Figure 1 with respect to device 10, if an intruder 20 or movement of some kind is detected by the sensor 18, then the device operates its camera 16 to capture one or more images of the intruder 20.
25 These images are then transmitted to the server 24 via the network 22.
( The server 24 and its database hold details of the location of the cameras and the monitoring workstations to which the image of the intruder 20 is to be transmitted. For a given camera, a preferred monitoring workstation may be specified, along with reserve 5 workstations should the preferred one be unresponsive or unable to deal with the images transmitted from the camera. Specialist monitoring workstations may be used for specific categories of location (e.g. railways or coastlines). Because different situations will require particular actions to be taken, the monitoring personnel may need to be appropriately trained. Monitoring personnel may be trained in teams, and the server may be configured to 10 track the availability and workload of both the monitoring workstations and their personnel.
The server is preferably configured to determine which workstations are active (i.e. which workstations are on-line and logged on to the server) and hence ready to receive the images. Thus, on receiving the images from the camera 16, the server 24 transmits them to the specified workstation. In the example shown in Figure 1, the image is transmitted to workstation 26. Camera-specific response instructions may also be stored on the server and transmitted to the workstation. A person at the workstation 26 then views and assesses 20 the image and, if necessary, informs (39) security personnel 40 local to the site of the intruder 20. The security personnel 40 may be employed by the client organization (i.e. at the site of the intrusion), or they may be the police or a security company. The security personnel 40 will then respond (41) to apprehend the intruder 20. In some cases, no action may need to be taken by the monitoring personnel - for example, if the sensor was triggered 25 by an animal.
( When sending the image to the workstation, the server also requests an acknowledgement that the image has been received and considered by the person at the workstation. An automated acknowledgement may be sent from the workstation to the server to confirm that 5 the image has been received and viewed. If no such acknowledgement is received by the server within a predetermined time, then the server will select another workstation to which to send the image.
On receiving an image from a camera, the server may also alert people directly that an 10 incident has been detected. This may be done via an automated telephone call (e.g. to a mobile phone 34), or by paging or sending a text message or an e-mail message to a device such as a personal digital assistant 36. The people alerted in such a manner may be the monitoring personnel (e.g. to request them to look urgently at an image on their workstation) or the police or security personnel local to the intruder. Through knowing the location of the :5 camera from which the image originated, the server can alert people in the locality of the camera. Monitoring personnel may work in teams. Some may be based in the same room or building as one another, and hence can interact and support one another. Others based elsewhere 20 may be contacted when their assistance is required (e.g. if a primary monitor has to leave his workstation for whatever reason and is hence unavailable). Such communication between the monitoring personnel may be effected via their workstations and the server.
The images transmitted from the cameras to the workstations may take a variety of formats, 25 depending on the speed of data communication available For example, video images may
( be captured (e.g. at 640 x 480 resolution). Alternatively, still images may be transmitted.
Small or low-resolution preview images may be transmitted in the first instance and then, if the monitoring person deems it necessary, he may instruct the server to supply high-
resolution or moving video images instead.
The monitoring workstations may be used to control the remote devices. Instructions from the workstations are sent to the remote devices via the network 22 and the server 24. In particular, the cameras may be motorised, and their direction of view may thus be adjusted by the monitoring personnel by inputting instructions to their workstations. This enables a 10 monitoring person to track the movement of a potential intruder.
As shown in Figure 2, other electrical devices may also be in communication with the remote monitoring device 50, for example via the X10 protocol, or by Bluetooth (RTM) or some other wireless communication means. These other devices may be lights or domestic appliances 15 such as a television 54, and may be activated or controlled either automatically, when the remote sensor detects a potential intruder 20, or on command from a monitoring workstation if the monitoring person considers it appropriate. The activation of such appliances or lights is intended to deter the intruder from proceeding with his activities.
20 As shown in Figure 3, in a given location, a plurality of monitoring devices 58, 60 may be networked via a local controller 56. This controller (or hub) 56 is in communication with the network 22. Other electrical devices such as a television set 64 may be controlled via the controller 56, either directly or via a secondary portal controller 62. A separate portal controller may be employed for each communications protocol used to control the electrical 25 devices - e.g. one portal controller for X10 devices and one for Bluetooth (RTM).
( Alternatively a multi-portal controller may be employed that can communicate over more than one protocol.
The design of the remote monitoring devices is important in order to be able to monitor S remote locations effectively. Figure 4 shows plan and side views of an emitter/sensor array.
To achieve a 360-degree monitoring capability the sensors may be arranged around the circumference of the camera, effectively in a circle as shown in this Figure. Each sensor's field of view is similar to the camera; the narrower the field of view the greater the distance
and detail of the pictures.
With motorised cameras, when a sensor is triggered, the camera may be configured to turn to that position and start filming or capturing images for a few seconds. Where the target triggers two adjacent sensors the camera will stop between them (and this may be used to halve the number of sensors needed). Alternatively there may be an array of cameras IS covering the required field of view. In this case individual cameras may be added or
subtracted according to the conditions of the site. Figures 5, 6 and 6 show examples of possible arrangements of cameras and sensors. Although in Figure 6 eight cameras are used to cover the full 360 degrees, the number of cameras could be increased to sixteen or more. Figure 8 illustrates arear view of a remote monitoring device 70, showing a connector 72 for connection to a local controller (e.g. 56 in Figure 3). The front of the device, as shown in Figure 9, incorporates the camera lens 74 and the sensor 76. The sensor may be passive infrared or another light source, that triggers when there is a movement within its field of
25 view.
Inter-camera communication At the same time as transmitting pictures to the server, the active camera may also communicate with any adjacent cameras, which will turn towards its location and take further 5 pictures, sending them to the server at the same time. In such cases, the system uses its emitter/sensor in a dual role, first to detect an intruder and secondly as means for inter-
camera communication. Communication between cameras may also be achieved using Bluetooth (RTM), laser, X10 or other alternative technology. When the cameras need to communicate, the communication will be between the emitter on one camera and the sensor 10 on the other. This will be in the form of a pulsed signal, arranged such that the emitting camera is not mistaken for an intruder.
As shown in Figure 10, when two cameras 80, 82 detect an intruder 88 there will be a cross-
over point of the emitter beams, that can be used to operate other devices 90 close to the IS location of the intruder, using the signalling mode of the emitter. These other devices could be lighting, dye spray, locks, alarms, electrical appliances, and so on.
Installation and setup of new monitoring hardware When a customer purchases a camera, they may give details of where the system is to be 20 located (this may include a local map) and what to do in the event of an unwanted intrusion.
These details will be maintained by the server/database.
When the primary camera is first switched on, it contacts the server, notifies the system of its activation and provide its location or coordinates. The server will recognise the camera and 25 obtain relevant details from the camera, together with a picture from the camera.
( The server then selects a monitoring person (or another surveillance organization as agreed with the customer) to perform the initial set-up.
5 Initial set-up of cameras When a monitoring person receives notification of a new camera installation they can take direct control of it, via their workstation, and adjust the vertical position (up/down) of the camera and the sensor level to avoid spurious alarms caused by cats etc. They monitoring person can also check the other cameras in the installation and select the most appropriate 10 secondary pictures to take when an adjacent camera is triggered.
Camera communication Cameras in the system may be configured to communicate with each other and to ensure that they remain active. In the event of a camera failing or otherwise being damaged, the 15 other local cameras may be configured to make regular sweeps of the affected area, until the affected camera is back in action.
As described above, the remote camera unit may also be configured to communicate with other devices (e.g. via Bluetooth (RTM), laser, dialup, radio or X10) to activate lighting, 20 locks, alarms, etc. Automatic camera tracking Cameras may track either with a multi-lens setup or a motorised lens using directional sensors. When the sensor detects a target, a primary camera will turn to the required 25 direction or activate the appropriate camera and capture images. At the same time it can
communicate with other cameras in the system to track to the same direction and to take additional photos to pick up other useful information such as nearby parked cars.
The tracking facility means that a narrow angle lens can be used rather than a wide angle 5 lens, which allows the pictures taken to be high definition.
Because the angle between two or more cameras in a system detecting a target is known, using the coordinates of the cameras it is possible to determine the exact position of the intruder, and this in turn may allow some other action to be made possible. Global 10 positioning technology may be used to determine the location of the cameras.
Home based monitoring With the example of monitoring personnel viewing images and controlling cameras via the Internet, the monitoring workstation can be situated anywhere in the world where adequate i: costeffective Internet communication exists.
On receiving a photo, the monitor acknowledges receipt, determines whether the incident is real or a false alarm and take appropriate action. An automated response may be used (e.g. using text messaging, e-mail, etc.) or alternatively manual action may be taken, such as 20 alerting local authorities or the client, etc. The monitoring person may remotely operate the camera to enable further investigation of the situation.
Camera control In the case where a monitoring person takes control of a camera system, they can manually 25 adjust the direction of the camera and operate any lighting or devices that are in
( communication with the system. They are also able to adjust the individual sensors to avoid false alarms caused by passing cats etc. The server 5 The server is preferably configured such that it: À Maintains a list of client cameras, including location maps and response instructions.
À Maintains the allocation of monitors to clients, ensuring adequate cover.
À Checks camera connections periodically.
À Maintains a history of each camera.
10 À Connects a monitoring workstation to the appropriate camera in the case of an event.
The workstation may be selected dependent on availability and the training of the person there.
À Can make adjustments to the camera sensors when high incidents of false alarms are reported.
The server may also contact the response unit (e.g. 40 in Figure 1) directly, if no monitoring workstation is available to deal with the matter.
., Summary
20 A preferred embodiment of the invention comprises a remote monitoring device incorporating mobile phone technology and a camera, and a monitoring workstation in communication with the remote monitoring device via the Internet.
With traditional monitoring systems, one or more persons watch banks of screens, looking 25 for suspicious behaviour. These systems are suitable for the high street or areas of high
( activity. However, they are expensive to operate and are fixed into location. It is difficult to move either the monitoring location or the cameras themselves.
However, in accordance with a preferred embodiment of the invention, a compact camera, 5 computer and 3G mobile phone transmitter/receiver may be employed that is self sufficient in power and requires no cables. This makes it easy to install or move to different locations as the need demands. The camera is able to track a target through 270-360 degrees using sensors and where two or more units are installed, communicate with each other so that they can point in the same direction to pick up other information or protect each other from 10 tampering or theft. The monitoring is done over the Internet.
The essential difference between the two systems is that the traditional system requires constant surveillance or recording. However, the system in accordance with the present invention is event driven, and in normal circumstances would be dormant, switching on only i5 when the sensors trigger it into operation. It is ideal for areas in which human traffic is rare and is likely to be undesirable. This means that one monitoring person can look after many hundreds of cameras.
. Images taken by the remote cameras are sent to a server on the Internet, which forwards the 20 images to one or more monitoring workstations (which may be home-based). Other forms of communication used may include SMS text messaging and automatic voice calling. The server checks that the images have been responded to within a predetermined time. If no response has been received then the server will resend the images to other monitors.
These other monitors can be predefined, or automated based on the locality of the camera 25 (which may make use of the GPS co-ordinates of the camera).
( The monitors may be managed by the server in teams, so that situations needing specific responses are properly provided for, by virtue of the monitoring personnel being suitably trained. s The server may keep a history of each monitored site and provide a site map (e.g. using MapPoint - a software facility that uses GPS to provide local area maps) to the monitoring person, thereby detailing the location of the activated camera.
10 Examples of potential surveillance sites and applications À Railway embankments, where an intruder may place an obstruction on the railway line. À Customs and excise, where there is a need to keep watch on a remote area of coastline or port boundary, where drug smuggling or unlawful immigration may occur.
i; À Seaport and airport perimeters.
À Airport hangers, where a human presence could be suspicious.
À Police observation of a house in which drug dealing is taking place.
À Remote sites in which terrorists are known to operate.
À Commercial and residential sites.
20 À A company's research and development department (for out-of-hours monitoring).
À To provide cheap overnight cover for conventional CCTV surveillance.
À Other phenomena which may be monitored, using appropriate sensors, include abnormal levels of mechanical stress or strain (e.g. on railway lines, bridges, etc.) and abnormal temperatures or pressures (e.g. in power stations or industrial 25 machinery).

Claims (45)

1. Security monitoring apparatus comprising: a remotely-locatable device comprising a camera, sensing means and transmitting means, the remotelylocatable device being operable, on the detection of an event by 5 the sensing means, to transmit digital image data captured by the camera; and a server connected to a digital communication network and in communication with receiving means, the receiving means being operable to receive digital image data transmitted by the remotely-locatable device, and the server being configured to transmit the digital image data to a monitoring workstation in communication with the I O network.
2. Security monitoring apparatus as claimed in Claim 1, wherein the sensing means are
responsive to one or more of:- motion, human presence, heat, sound, vibration, ,. temperature, light intensity, pressure, mass, weight, force, mechanical stress or 5 mechanical strain.
3. Security monitoring apparatus as claimed in Claim 1 or Claim 2, wherein the server is configured to request an acknowledgement that digital image data sent to the workstation has been viewed by a person at said workstation.
4. Security monitoring apparatus as claimed in any preceding Claim, wherein the workstation is one of a plurality of workstations.
5. Security monitoring apparatus as claimed in any preceding Claim, wherein the network comprises the Internet and the workstations are personal computers connected to the Internet.
5
6. Security monitoring apparatus as claimed in any preceding Claim, wherein the remotely-locatable device is wirelessly connected to the network.
7. Security monitoring apparatus as claimed in any preceding Claim, wherein the remotely-locatable device is configured to transmit image data using a technique to taken from a group comprising: wireless mobile telephony, Biuetooth (RTM), satellite communication, optical communication, dialup connection using a modem.
8. Security monitoring apparatus as claimed in any preceding Claim, wherein the remotely-locatable device is adapted to communicate with other electrical devices in S its locality such that, on detection of motion or human presence by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation, said instructions being communicated via the server and the network.
20
9. Security monitoring apparatus as claimed in Claim 8, wherein said other electrical devices are activated and/or controlled using X10, Bluetooth (RTM) or wireless communication.
10. Security monitoring apparatus as claimed in any preceding Claim, wherein the 25 camera is motorised and moveable such that its direction of view may be changed.
(
11. Security monitoring apparatus as claimed in Claim 10, wherein the camera is moveable on the instructions of a person at a monitoring workstation, said instructions being communicated via the server and the network.
s
12. Security monitoring apparatus as claimed in Claim 10 or Claim 11, wherein the remotely-locatable device further comprises a directionally sensitive sensor or plurality of sensors, and is configured to move the camera to face the direction of a detected object or person.
13. Security monitoring apparatus as claimed in any preceding Claim, comprising a plurality of remotely-locatable devices at a common site, the devices comprising communication means to enable them to communicate between one another and to cause their respective cameras to capture a common incident.
!5
14. Security monitoring apparatus as claimed in any preceding Claim wherein the server holds or has access to a record of the cameras in use, together with data specifying the location of each camera and an appropriate response should an incident be detected by a given camera.
15. Security monitoring apparatus as claimed in Claim 14 wherein, for a given camera, the server holds details of the monitoring workstations and the corresponding monitoring personnel to whom image data from that camera should be sent.
(
16. Security monitoring apparatus as claimed in any preceding Claim, wherein the server is operable to perform periodic checks that a remotelylocatable device is functioning correctly. 5
17. Security monitoring apparatus as claimed in any preceding Claim, wherein the server is operable to make adjustments to the sensitivity of sensing means if the corresponding remotely-locatable device is prone to reporting false alarms.
18. A method of security monitoring comprising the steps of: 10 detecting an event using sensing means; operating a camera to capture image data in response to the detection by the sensing means; transmitting said image data to a server; and sending said image data from said server to a monitoring workstation via a data !5 communication network.
19. A method as claimed in Claim 18 further comprising sending an acknowledgement from the workstation to the server that image data sent to the workstation has been viewed by a person at said workstation.
20. A method as claimed in Claim 19 further comprising the server sending the image data to an alternative workstation if no acknowledgement is received by the server from the workstation to which the image data was initially sent.
21. A method as claimed in any of Claims 18 to 20, further comprising a person at a monitoring workstation alerting security personnel in the locality of a detected event or an incident (or potential incident) observed on said workstation.
S
22. A method as claimed in any of Claims 18 to 21, further comprising activating and/or controlling electrical devices in the locality of a detected event or an incident (or potential incident) observed on said workstation.
23. A method as claimed in Claim 22 wherein the electrical devices are activated and/or 10 controlled from said workstation using X10, Bluetooth (RTM) or wireless communication.
24. A method as claimed in any of Claims 18 to 23, further comprising controlling the movement of a camera by inputting commands to a workstation, said commands being transmitted to the camera via the server and the network.
25. A method as claimed in any of Claims 18 to 24, further comprising the server alerting a person that an event has been detected.
20
26. A method as claimed in Claim 25, wherein the person is alerted by the server using e-mail, paging, text-messaging or a telephone call.
27. A method as claimed in any of Claims 18 to 26 further comprising maintaining a record on the server of cameras in use, together with data specifying the location of
( each camera and an appropriate response should an event be detected by the sensing means corresponding to a given camera.
28. A method as claimed in Claim 27 wherein, for a given camera, the server further 5 holds details of the monitoring workstations and the corresponding monitoring personnel to whom image data should be sent.
29. A method as claimed in any of Claims 18 to 28 further comprising the server periodically checking that a camera is functioning correctly.
30. A method as claimed in any of Claims 18 to 29 further comprising the server making adjustments to the sensitivity of sensing means if the corresponding camera is prone to reporting false alarms.
S
31. A remotely-locatable security monitoring device comprising a camera, sensing means and transmitting means, the remotely-locatable device being operable, on the detection of an event by the sensing means, to transmit digital image data captured by the camera to a remote server or a remote workstation.
20
32. A remotely-locatable security monitoring device as claimed in Claim 31, wherein the sensing means are responsive to one or more of:motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain.
33. A remotely-locatable security monitoring device as claimed in Claim 31 or Claim 32, wherein the transmitting means are wireless.
34. A remotely-locatable security monitoring device as claimed in any of Claims 31 to 33, 5 configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), satellite communication, optical communication, dialup connection using a modem.
35. A remotely-locatable security monitoring device as claimed in any of Claims 31 to 34, 10 adapted to communicate with other electrical devices in its locality such that, on detection of an event by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation.
36. A remotely-locatable security monitoring device as claimed in any of Claims 31 to 35, S further comprising communication means to enable it to communicate with other such remotely-locatable security monitoring devices such that, in use, a plurality of such devices proximally located can communicate with each other to cause their respective cameras to capture a common incident.
20
37. A server operable to be connected to a digital communication network, to receive digital image data from a remotely-locatable security monitoring device, and to transmit the digital image data to a monitoring workstation in communication with the network.
38. A server as claimed in Claim 37, configured to request an acknowledgement that digital image data sent to a workstation has been viewed by a person at said workstation. 5
39. A server as claimed in Claim 37 or Claim 38, holding or having access to a record of a plurality of security monitoring devices in use, together with data specifying the location of each security monitoring device and an appropriate response should an event be detected by a given security monitoring device.
10
40. A server as claimed in any of Claims 37 to 39, operable to perform periodic checks that a security monitoring device is functioning correctly.
41. A server as claimed in any of Claims 37 to 40, operable to make adjustments to the sensitivity of a security monitoring device if it is prone to reporting false alarms.
!
42. Security monitoring apparatus substantially as herein described with reference to and as illustrated in any combination of the accompanying drawings.
43. A method of security monitoring substantially as herein described with reference to 20 and as illustrated in any combination of the accompanying drawings.
44. A remotely-locatable security monitoring device substantially as herein described with reference to and as illustrated in any combination of the accompanying drawings.
(
45. A server substantially as herein described with reference to and as illustrated in any combination of the accompanying drawings.
GB0213866A 2002-06-17 2002-06-17 Event-triggered security monitoring apparatus Withdrawn GB2389978A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
GB0213866A GB2389978A (en) 2002-06-17 2002-06-17 Event-triggered security monitoring apparatus
PCT/GB2003/002467 WO2003107293A1 (en) 2002-06-17 2003-06-09 Security monitoring apparatus and method
AU2003244779A AU2003244779A1 (en) 2002-06-17 2003-06-09 Security monitoring apparatus and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0213866A GB2389978A (en) 2002-06-17 2002-06-17 Event-triggered security monitoring apparatus

Publications (2)

Publication Number Publication Date
GB0213866D0 GB0213866D0 (en) 2002-07-31
GB2389978A true GB2389978A (en) 2003-12-24

Family

ID=9938715

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0213866A Withdrawn GB2389978A (en) 2002-06-17 2002-06-17 Event-triggered security monitoring apparatus

Country Status (3)

Country Link
AU (1) AU2003244779A1 (en)
GB (1) GB2389978A (en)
WO (1) WO2003107293A1 (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1564700A1 (en) * 2004-02-11 2005-08-17 Sensormatic Electronics Corporation System and method for remote access to security event information
EP1643471A1 (en) * 2004-09-29 2006-04-05 Thomas Grellner Surveillance system and camera thereto
GB2420044A (en) * 2004-11-03 2006-05-10 Pedagog Ltd Viewing remotely captured images across a data network
GB2397960B (en) * 2003-01-30 2006-10-25 Jian Zhang A method for the real-time monitoring and transmission of a visual domestic safeguard system
EP1720143A3 (en) * 2005-04-14 2007-08-29 American Research & Technology On-line security management system
GB2417636B (en) * 2003-05-06 2007-09-26 Realnetworks Inc Multi-purpose video surveillance
US7363543B2 (en) 2002-04-30 2008-04-22 International Business Machines Corporation Method and apparatus for generating diagnostic recommendations for enhancing process performance
WO2008088203A1 (en) * 2006-11-24 2008-07-24 Global Sight, S.A. De C.V. Systems for remote and digital data transmission and location by satellite from mobile or fixed terminals with urban surveillance cameras for face recognition, gunshot detector, capturing of public safety personnel and missing or kidnapped persons and citizens' alarm, stolen vehicles, electronic fine issuance and fine colle
WO2010116364A1 (en) * 2009-04-05 2010-10-14 Tadsec Advanced Homeland Security Technologies Ltd A security management system and method
WO2013034849A1 (en) * 2011-09-09 2013-03-14 France Veille Eurl Method of community surveillance
EP2840558A3 (en) * 2013-08-09 2015-08-19 LG Electronics, Inc. Electronic device communicating with external cameras
CN108780598A (en) * 2016-01-25 2018-11-09 林仁泽 Social safety net's system with portable lamp for wireless disaster detection and crime prevention

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2874776A1 (en) * 2004-09-01 2006-03-03 Sygetis Sarl Intrusion validating method for e.g. enterprise, involves converting visual information to obtain processed information that is in format readable by terminal, which is then connected to remote server to allow user to validate intrusion
NO20045666D0 (en) * 2004-12-27 2004-12-27 Tor Helgesen Alarm unit and control systems that call or send a message to a subscriber terminal when triggered
DE102006010955B3 (en) * 2006-03-03 2007-10-04 Siemens Ag Method for visually monitoring a room area
KR20160014242A (en) * 2014-07-29 2016-02-11 삼성전자주식회사 Method and device for mapping location of sensor and event operation with monitoring device
US9871830B2 (en) * 2014-10-07 2018-01-16 Cisco Technology, Inc. Internet of things context-enabled device-driven tracking
GB2562251A (en) * 2017-05-09 2018-11-14 Zircon Software Ltd System and method for detecting unauthorised personnel

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2064189A (en) * 1979-11-09 1981-06-10 Ascotts Ltd Surveillance System
CA2228679A1 (en) * 1998-02-04 1999-08-04 Gridzero Technologies Inc. Surveillance systems
WO2001013637A1 (en) * 1999-08-12 2001-02-22 Honeywell Limited System and method for digital video management
US6271752B1 (en) * 1998-10-02 2001-08-07 Lucent Technologies, Inc. Intelligent multi-access system
GB2364460A (en) * 2000-05-02 2002-01-23 Ford Global Tech Inc Web-based video conference system for remote fault diagnosis
US20020030738A1 (en) * 2000-06-01 2002-03-14 Moreinis Joseph Daniel Web based monitoring system
US6385772B1 (en) * 1998-04-30 2002-05-07 Texas Instruments Incorporated Monitoring system having wireless remote viewing and control

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2325548B (en) * 1997-05-21 2001-02-14 Richard Parviz Nabavi Improvements in and relating to security alarm systems and their controllers
US6215519B1 (en) * 1998-03-04 2001-04-10 The Trustees Of Columbia University In The City Of New York Combined wide angle and narrow angle imaging system and method for surveillance and monitoring
US7124427B1 (en) * 1999-04-30 2006-10-17 Touch Technologies, Inc. Method and apparatus for surveillance using an image server
US6281790B1 (en) * 1999-09-01 2001-08-28 Net Talon Security Systems, Inc. Method and apparatus for remotely monitoring a site
US20020005894A1 (en) * 2000-04-10 2002-01-17 Foodman Bruce A. Internet based emergency communication system
US6400265B1 (en) * 2001-04-24 2002-06-04 Microstrategy, Inc. System and method for monitoring security systems by using video images

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2064189A (en) * 1979-11-09 1981-06-10 Ascotts Ltd Surveillance System
CA2228679A1 (en) * 1998-02-04 1999-08-04 Gridzero Technologies Inc. Surveillance systems
US6385772B1 (en) * 1998-04-30 2002-05-07 Texas Instruments Incorporated Monitoring system having wireless remote viewing and control
US6271752B1 (en) * 1998-10-02 2001-08-07 Lucent Technologies, Inc. Intelligent multi-access system
WO2001013637A1 (en) * 1999-08-12 2001-02-22 Honeywell Limited System and method for digital video management
GB2364460A (en) * 2000-05-02 2002-01-23 Ford Global Tech Inc Web-based video conference system for remote fault diagnosis
US20020030738A1 (en) * 2000-06-01 2002-03-14 Moreinis Joseph Daniel Web based monitoring system

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7363543B2 (en) 2002-04-30 2008-04-22 International Business Machines Corporation Method and apparatus for generating diagnostic recommendations for enhancing process performance
GB2397960B (en) * 2003-01-30 2006-10-25 Jian Zhang A method for the real-time monitoring and transmission of a visual domestic safeguard system
GB2417636B (en) * 2003-05-06 2007-09-26 Realnetworks Inc Multi-purpose video surveillance
EP1564700A1 (en) * 2004-02-11 2005-08-17 Sensormatic Electronics Corporation System and method for remote access to security event information
EP1643471A1 (en) * 2004-09-29 2006-04-05 Thomas Grellner Surveillance system and camera thereto
GB2420044B (en) * 2004-11-03 2009-04-01 Pedagog Ltd Viewing system
GB2420044A (en) * 2004-11-03 2006-05-10 Pedagog Ltd Viewing remotely captured images across a data network
EP1720143A3 (en) * 2005-04-14 2007-08-29 American Research & Technology On-line security management system
WO2008088203A1 (en) * 2006-11-24 2008-07-24 Global Sight, S.A. De C.V. Systems for remote and digital data transmission and location by satellite from mobile or fixed terminals with urban surveillance cameras for face recognition, gunshot detector, capturing of public safety personnel and missing or kidnapped persons and citizens' alarm, stolen vehicles, electronic fine issuance and fine colle
WO2010116364A1 (en) * 2009-04-05 2010-10-14 Tadsec Advanced Homeland Security Technologies Ltd A security management system and method
WO2013034849A1 (en) * 2011-09-09 2013-03-14 France Veille Eurl Method of community surveillance
FR2980023A1 (en) * 2011-09-09 2013-03-15 France Veille Eurl COMMUNITY MONITORING PROCESS
EP2840558A3 (en) * 2013-08-09 2015-08-19 LG Electronics, Inc. Electronic device communicating with external cameras
CN108780598A (en) * 2016-01-25 2018-11-09 林仁泽 Social safety net's system with portable lamp for wireless disaster detection and crime prevention
EP3407315A4 (en) * 2016-01-25 2019-09-18 In Taek Lim Social safety network system having portable light for both wireless disaster fire detection and crime prevention
RU2734161C2 (en) * 2016-01-25 2020-10-13 Ин Тэк ЛИМ Public safety network system equipped with portable lights for wireless fire detection and crime prevention

Also Published As

Publication number Publication date
GB0213866D0 (en) 2002-07-31
AU2003244779A1 (en) 2003-12-31
WO2003107293A1 (en) 2003-12-24

Similar Documents

Publication Publication Date Title
GB2389978A (en) Event-triggered security monitoring apparatus
CA2623501C (en) Security monitoring arrangement and method using a common field of view
US20090122144A1 (en) Method for detecting events at a secured location
EP1547036B1 (en) Automatic detection and monitoring of perimeter physical movement
US6970183B1 (en) Multimedia surveillance and monitoring system including network configuration
JPH11154292A (en) Integrated warning system
CN102419883A (en) Monitoring method and system for monitoring defense area
US20040036596A1 (en) Security system and methods
US20070139192A1 (en) Sensor unit having a network video camera
KR100440786B1 (en) Remote digital video recording and emergency-monitoring system
JP3843733B2 (en) Security monitoring system using communication network
JP4620218B2 (en) Home security system
KR20080076201A (en) Mobile security system by omnidirectional camera
JP2003223603A (en) Centralized management system to prevent abnormal situations at business sites
KR20030012948A (en) Internet-based Access-control System using cabled or radio network
KR102283434B1 (en) System for Operating SOS Emergency Bell with IP Camera
KR101597154B1 (en) An apparatus for security system using dual wireless modules
KR100880428B1 (en) Ubiquitous policing system
JP2002183845A (en) Security equipment
KR100609735B1 (en) Unmanned remote video surveillance device using internet network
KR200296224Y1 (en) The guard camera system attaching a sensor
CN208014114U (en) A kind of light curtain door and window alarm system
JP7538588B2 (en) Fire alarm system
GB2451291A (en) Portable video surveillance system
EP4560600A1 (en) Security monitoring systems and methods

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)