GB2389978A - Event-triggered security monitoring apparatus - Google Patents
Event-triggered security monitoring apparatus Download PDFInfo
- Publication number
- GB2389978A GB2389978A GB0213866A GB0213866A GB2389978A GB 2389978 A GB2389978 A GB 2389978A GB 0213866 A GB0213866 A GB 0213866A GB 0213866 A GB0213866 A GB 0213866A GB 2389978 A GB2389978 A GB 2389978A
- Authority
- GB
- United Kingdom
- Prior art keywords
- server
- security monitoring
- camera
- workstation
- remotely
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 110
- 230000001960 triggered effect Effects 0.000 title description 4
- 238000004891 communication Methods 0.000 claims abstract description 57
- 238000012806 monitoring device Methods 0.000 claims abstract description 45
- 238000000034 method Methods 0.000 claims abstract description 31
- 238000001514 detection method Methods 0.000 claims abstract description 12
- 230000004044 response Effects 0.000 claims abstract description 9
- 230000033001 locomotion Effects 0.000 claims description 14
- 230000009118 appropriate response Effects 0.000 claims description 6
- 230000035945 sensitivity Effects 0.000 claims description 6
- 230000003287 optical effect Effects 0.000 claims description 4
- 230000000737 periodic effect Effects 0.000 claims description 4
- 230000003213 activating effect Effects 0.000 claims description 2
- 230000009471 action Effects 0.000 description 7
- 230000000694 effects Effects 0.000 description 6
- 230000002159 abnormal effect Effects 0.000 description 4
- 238000009434 installation Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 239000003814 drug Substances 0.000 description 3
- 229940079593 drug Drugs 0.000 description 3
- 230000005611 electricity Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 241000282326 Felis catus Species 0.000 description 2
- 241001465754 Metazoa Species 0.000 description 2
- 230000004913 activation Effects 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 206010038743 Restlessness Diseases 0.000 description 1
- 239000011449 brick Substances 0.000 description 1
- 235000019994 cava Nutrition 0.000 description 1
- 150000001875 compounds Chemical class 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
- 239000007921 spray Substances 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19695—Arrangements wherein non-video detectors start video recording or forwarding but do not generate an alarm themselves
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
- G08B13/19656—Network used to communicate with a camera, e.g. WAN, LAN, Internet
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19678—User interface
- G08B13/19684—Portable terminal, e.g. mobile phone, used for viewing video remotely
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
Abstract
Security monitoring apparatus comprising: a remotely-locatable device 10,12,14 comprising a camera, 16 sensing means 18 and transmitting means, the remotely-locatable device 10,12,14 being operable on the detection of an event by the sensing means, to transmit digital image data captured by the camera; and a server 24 connected to a digital communication network 22 and and in communication with receiving means, the receiving means being operable to receive digital image data transmitted by the remotely-locatable device, and the server being configured to transmit the digital image data to a monitoring workstation 26 in communication with the network. The invention also provides a method of security monitoring comprising the steps of: detecting an event using sensing means;operating a camera to capture image data in response to the detection by the sensing means; transmitting said image data to a server; and sending said image data from said server to a monitoring workstation via a data communication network. The invention further provides a remotely-locatable security monitoring device and a server.
Description
SECURITY MONITORING APPARATUS AND METHOD
This invention relates to security monitoring apparatus for detecting and observing events such as the presence of intruders, trespassers, vandals and the like. It is particularly well 5 suited, but in no way limited, to the monitoring of remote locations such as railway lines and coastal sites.
Conventional security monitoring systems such as closed circuit television (CCTV) are well known, and are commonly used to watch for intruders in industrial sites, offices, warehouses 10 etc. However, the traditional method of monitoring with CCTV requires security personnel to continually watch the monitor screens to check for intruders and the like. The cost of employing these security personnel is considerable. The security personnel must watch the monitor screens continuously, particularly when the site is otherwise unstuffed. However, incidents which actually require the intervention of the security personnel may only happen 5 occasionally. For the majority of the time, therefore, the security personnel simply watch the screens whilst nothing of any relevance happens. It is considered that this situation is far from ideal, since the security personnel are costly to employ for long periods of time, yet they are only actually needed to take action occasionally. Furthermore, security personnel left watching the monitor screens for long periods of time may well get bored or restless, and 20 their attention to their duty may stray. They may even fail asleep whilst on duty, as a consequence of their lack of activity. This clearly compromises the security of the site.
Many locations, particularly remote sites such as railway lines and coastal sites, do not warrant on-site security personnel because incidents happen very rarely. However, 25 particularly in the case of railway lines, it will be appreciated that when incidents such as
intrusion or vandalism do occur, the consequences can be extremely serious. If a miscreant places an object (e.g. a vandalised bench) on a railway track, or drops a brick from a bridge, then a tragic accident may result. Inevitably disruption to the railway service is caused. The driver of a high speed train would be unable to stop the train in time to avoid impact with the 5 object. However, the remoteness of the sites and the general lack of incidents means that it is impractical to install conventional CCTV monitoring systems and to employ dedicated security personnel.
Problematic incidents also occur at coastal sites. Although vandalism and trespassing may 10 occur in these locations, more serious problems are the arrival of unlawful immigrants, incidents of drug smuggling, and people getting themselves into perilous danger, e.g. on cliffs or in caves. Again, in these locations it is impractical to install conventional CCTV systems and to employ dedicated staff to monitor them.
It is a general object of the present invention to overcome or at least mitigate at least some of the problems and deficiencies associated with conventional security systems and the monitoring thereof, particularly in remote locations in which there is often little activity, such as those identified above. It is a further object of the present invention to provide useful and valuable employment for people who traditionally are not used to their potential, such as 20 disabled people or the housebound.
According to a first aspect of the invention there is provided security monitoring apparatus comprising: a remotely-locatable device comprising a camera, sensing means and transmitting means, the remotely-locatable device being operable, on the detection of an 25 event by the sensing means, to transmit digital image data captured by the camera; and a
server connected to a digital communication network and in communication with receiving means, the receiving means being operable to receive digital image data transmitted by the remotely-locatable device, and the server being configured to transmit the digital image data to a monitoring workstation in communication with the network.
The remotely-locatable device (also referred to herein as the Remote device" orremote monitoring devices) may advantageously be positioned in remote locations such as railway lines and coastal sites, although it may also be sited in less remote locations such as industrial plants, commercial and residential buildings, and other places where security 10 monitoring is desired.
The remotely-locatable device may comprise the camera, sensing means and transmitting means in a common housing or in separate units in communication (electrically or wirelessly) with one another. A plurality of sensing means may be connected to one camera, or a i'; plurality of cameras may be connected to one sensing means. Having the camera, sensing means and transmitting means in a common housing provides a benefit of compactness and ease of installation, whereas having them in separate units provides greater operational flexibility and the ability to tailor the equipment to suit the application and environment.
20 The term event" should be interpreted broadly, to cover any incident or phenomenon detectable by appropriate sensing means. For example, detectable events include inter alla motion, human presence, sound, vibration, fluctuations in mechanical stress or strain, changes in light intensity, pressure or temperature, or combinations thereof. Hence the remotely-locatable device may be used to detect the presence of intruders or animals, 25 abnormal levels of mechanical stress or strain (e.g. on railway lines, bridges, etc.), abnormal
temperatures or pressures (e.g. in power stations or industrial machinery) , and so on. It will be appreciated by those skilled in the art that many other events may be monitored in such a manner. Although the invention will be illustrated herein primarily in the context of security monitoring apparatus for observing and responding to intruders, it is to be emphasised that it 5 is equally applicable to inter alla the types of events listed above.
Transmitting the digital image data via the server and the network to a monitoring workstation provides the advantage that the monitoring workstation may also be virtually anywhere. In a preferred embodiment of the invention the workstation is one of a plurality of 10 workstations connected to the Internet. This enables monitoring personnel to work from home, enabling disabled and housebound people to perform a useful and rewarding job.
The Internet provides an effective pre-existing network over which the image data may be transmitted, and the image data may readily be displayed though a conventional Intemet browser interface.
The provision of sensing means at the remotely-locatable device provides the advantage that images are only transmitted to the monitoring workstations when movement or human presence is detected. Under normal circumstances the remotely-locatable device is dominant and images are not transmitted. The monitoring system is event driven and does not require 20 a security person to continually monitor a given camera. Human intervention is only required when the sensing means detect an event and an image is transmitted. In this manner a single security person can oversee potentially hundreds of sites, resulting in reduced labour costs for security personnel. The monitoring workstations may even be located overseas, in countries where labour is cheap, in order to reduce costs still further.
Preferably the sensing means are responsive to one or more of:- motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain. As mentioned above, this list should not be regarded as exhaustive, and other physical phenomena (e.g. electric current, voltage etc.) 5 may also be detected using appropriate sensors.
Preferably the server is configured to request an acknowledgement that digital image data sent to the workstation has been viewed by a person at said workstation. If no acknowledgement is received, the server can direct the image data to another workstation.
10 This ensures that the disturbance or incident detected by the remotelylocatable device is observed by monitoring personnel and, if necessary, acted upon.
Preferably the remotely-locatable device is wirelessly connected to the network. This provides greatest freedom to the user, enabling the device to be located in particularly 15 remote sites and to be repositioned as desired. However, as an alternative, electrical cables may be used to connect the device to the network if the location permits.
Preferably the remotely-iocatabie device is configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), 20 satellite communication, optical communication, dialup connection using a modem. The 3G (third generation wireless) mobile telecommunication protocol is particularly well suited to this purpose.
Preferably the remotely-locatable device is adapted to communicate with other electrical 25 devices in its locality such that, on detection of motion or human presence by the sensing
means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation, said instructions being communicated via the server and the network. The other electrical devices referred to may be light bulbs, televisions and radios, for example. This feature may be employed in residential and office locations, for example, 5 and is intended to deter the intruder from proceeding with his activities. Alarms may also be activated in this manner.
Particularly preferably said other electrical devices are activated and/or controlled using X10, Bluetooth (RTM) or wireless communication. X10 is a protocol which enables devices IO connected to a mains electricity supply to receive control signals via the electricity supply itself. Preferably the camera is motorised and moveable such that its direction of view may be changed. IS Particularly preferably the camera is moveable on the instructions of a person at a monitoring workstation, said instructions being communicated via the server and the network. This enables an intruder or wrongdoer to be tracked by the camera as he moves about. Preferably the remotely-locatable device further comprises a directionally sensitive sensor or plurality of sensors, and is configured to move the camera to face the direction of a detected object or person.
( Preferably the security monitoring apparatus comprises a plurality of remotely-locatable devices at a common site, the devices comprising communication means to enable them to communicate between one another and to cause their respective cameras to capture a common incident.
Preferably the server holds or has access to a record of the cameras in use, together with data specifying the location of each camera and an appropriate response should an incident be detected by a given camera. For a given camera, preferably the server holds details of the monitoring workstations and the corresponding monitoring personnel to whom image 10 data from that camera should be sent.
Preferably the server is operable to perform periodic checks that a remotely-locatable device is functioning correctly. This means that if a camera develops a fault, the fault does not go : undetected. IS Preferably the server is operable to make adjustments to the sensitivity of sensing means if the corresponding remotely-locatable device is prone to reporting false alarms.
In accordance with a second aspect of the invention, there is provided a method of security 20 monitoring comprising the steps of: detecting an event using sensing means; operating a camera to capture image data in response to the detection by the sensing means; transmitting said image data to a server; and sending said image data from said server to a monitoring workstation via a data communication network.
Preferably the method further comprises sending an acknowledgement from the workstation to the server that image data sent to the workstation has been viewed by a person at said workstation. 5 Preferably the method further comprises the server sending the image data to an alternative workstation if no acknowledgement is received by the server from the workstation to which the innage data was initially sent.
Preferably the method further comprises a person at a monitoring workstation alerting 10 security personnel in the locality of a detected event or an incident (or potential incident) observed on said workstation.
Preferably the method further comprises activating and/or controlling electrical devices in the locality of a detected event or an incident (or potential incident) observed on said . 15 workstation. Particularly preferably the electrical devices are activated and/or controlled from said workstation using X10, Bluetooth (RTM) or wireless communication.
Preferably the method further comprises controlling the movement of a camera by inputting commands to a workstation, said commands being transmitted to the camera via the server 20 and the network.
Preferably the method further comprises the server alerting a person that an event has been I detected. Particularly preferably the person is alerted by the server using e-mail, paging, text-messaging or a telephone call.
Preferably the method further comprises maintaining a record on the server of cameras in use, together with data specifying the location of each camera and an appropriate response should an event be detected by the sensing means corresponding to a given camera. For a given camera, preferably the server holds details of the monitoring workstations and the S corresponding monitoring personnel to whom image data should be sent.
Preferably the method further comprises the server periodically checking that a camera is functioning correctly.
10 Preferably the method further comprises the server making adjustments to the sensitivity of sensing means if the corresponding camera is prone to reporting false alarms.
According to a third aspect of the invention there is a provided a remotely-locatable security monitoring device comprising a camera, sensing means and transmitting means, the 15 remotely-locatable device being operable, on the detection of an event by the sensing means, to transmit digital image data captured by the camera to a remote server or a remote workstation. As mentioned previously, the remotely-locatable device may comprise the camera, sensing 20 means and transmitting means in a common housing or in separate units in communication (electrically or wirelessly) with one another. A plurality of sensing means may be connected to one camera, or a plurality of cameras may be connected to one sensing means.
( Preferably the sensing means are responsive to one or more of:- motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain.
5 Preferably the transmitting means are wireless.
Preferably the remotely-locatable security monitoring device is configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), satellite communication, optical communication, dialup connection using a modem.
Preferably the remotely-locatable security monitoring device is adapted to communicate with other electrical devices in its locality such that, on detection of an event by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation.
IS Particularly preferably the remotely-locatable security monitoring device further comprises communication means to enable it to communicate with other such remotely-locatable security monitoring devices such that, in use, a plurality of such devices proximally located can communicate with each other to cause their respective cameras to capture a common 20 incident.
According to a fourth aspect of the invention there is a provided a server operable to be connected to a digital communication network, to receive digital image data from a remotely-
locatable security monitoring device, and to transmit the digital image data to a monitoring 25 workstation in communication with the network.
( Preferably the server is configured to request an acknowledgement that digital image data sent to a workstation has been viewed by a person at said workstation.
S Preferably the server holds or has access to a record of a plurality of security monitoring devices in use, together with data specifying the location of each security monitoring device and an appropriate response should an event be detected by a given security monitoring device. 10 Preferably the server is operable to perform periodic checks that a security monitoring device is functioning correctly.
Preferably the server is operable to make adjustments to the sensitivity of a security monitoring device if it is prone to reporting false alarms.
Embodiments of the invention will now be described, by way of example, and with reference . to the drawings in which: Figure 1 iitustrates a network (e.g. the Internet) to which remote monitoring devices, a server and monitoring workstations are connected; 20 Figure 2 illustrates a remote monitoring device connected to a local electrical device (in this instance, a television) for monitoring and deterring intruders; Figure 3 illustrates two remote monitoring devices and an electrical device (a TV) installed in a common site, the monitoring devices being controlled by a local control unit and the TV being controlled by a local portal controller;
( Figure 4 illustrates a plan view and a side view of a sensor array as may be used in conjunction with a security camera; Figure 5 illustrates an arrangement of cameras and sensors which would typically be used against a wall, providing 180 degree coverage; 5 Figure 6 illustrates an arrangement of cameras and sensors suitable for use in the middle of a large compound or building, providing 360 degree coverage; Figure 7 illustrates two cameras with sensors arranged facing in opposite directions, as may be used in a narrow alley or corridor; Figure 8 illustrates a rear view of a remote monitoring device; 10 Figure 9 illustrates a front view of a remote monitoring device; and Figure 10 illustrates two remote monitoring devices in mutual communication monitoring an area common to both cameras.
Figure 1 illustrates a network of remote monitoring devices 10, 12, 14 in communication with IS monitoring workstations 26, 28, 30, 32 via a network 22 and a server 24. In a preferred embodiment of the invention the network 22 is, or at least partially comprises, the Internet.
The remote monitoring devices 10, 12, 14 may be wirelessly connected to the network 22, or may be connected by an electrical cable. In Figure 1, devices 10 and 14 are shown in 20 wireless communication with the network 22, whereas device 12 is connected by a cable.
Taking remote monitoring device 10 as an example, this has a camera 16 and a sensor 18 responsive to motion or human presence in the vicinity of the camera. Transmitting means, such as a wireless transmitter, a dialup modem, or a permanent wired connection, are also 25 provided to enable the device 10 to communicate with the network 22. A power supply is
( included in the device 10. If the device is to be installed in a remote area, then the power supply may be a battery or a solar cell. Alternatively, if the device is within reach of a mains electricity supply, then this may be used instead to provide power. Although in the Figure the monitoring device 10 is illustrated as a single unit, the various components (i.e. the 5 camera 16, the sensor 18, the transmitting means and the control circuitry) may alternatively be provided in separate units in communication (electrically or wirelessly) with one another.
Furthermore, a plurality of sensors may be connected to one camera, or a plurality of cameras may be connected to one sensor.
to Connected to the network 22 is a server 24 hosting, or in communication with, a database.
The database may be a SQL (structured query language) database.
In communication with the server 24 are a plurality of monitoring workstations 26, 28, 30, 32.
The monitoring workstations may be directly connected to the server 24, or in 15 communication with the server via the internet. In a preferred embodiment of the invention the monitoring workstations are domestic personal computers (which may be manned by disabled or housebound people) having Internet access and running Internet browser software. Data communication over the network is preferably encrypted, for example, using SSL (secure sockets layer).
In use, the remote monitoring devices are positioned where desired. If no activity is detected by the sensor, then the device is dormant. However, as shown in Figure 1 with respect to device 10, if an intruder 20 or movement of some kind is detected by the sensor 18, then the device operates its camera 16 to capture one or more images of the intruder 20.
25 These images are then transmitted to the server 24 via the network 22.
( The server 24 and its database hold details of the location of the cameras and the monitoring workstations to which the image of the intruder 20 is to be transmitted. For a given camera, a preferred monitoring workstation may be specified, along with reserve 5 workstations should the preferred one be unresponsive or unable to deal with the images transmitted from the camera. Specialist monitoring workstations may be used for specific categories of location (e.g. railways or coastlines). Because different situations will require particular actions to be taken, the monitoring personnel may need to be appropriately trained. Monitoring personnel may be trained in teams, and the server may be configured to 10 track the availability and workload of both the monitoring workstations and their personnel.
The server is preferably configured to determine which workstations are active (i.e. which workstations are on-line and logged on to the server) and hence ready to receive the images. Thus, on receiving the images from the camera 16, the server 24 transmits them to the specified workstation. In the example shown in Figure 1, the image is transmitted to workstation 26. Camera-specific response instructions may also be stored on the server and transmitted to the workstation. A person at the workstation 26 then views and assesses 20 the image and, if necessary, informs (39) security personnel 40 local to the site of the intruder 20. The security personnel 40 may be employed by the client organization (i.e. at the site of the intrusion), or they may be the police or a security company. The security personnel 40 will then respond (41) to apprehend the intruder 20. In some cases, no action may need to be taken by the monitoring personnel - for example, if the sensor was triggered 25 by an animal.
( When sending the image to the workstation, the server also requests an acknowledgement that the image has been received and considered by the person at the workstation. An automated acknowledgement may be sent from the workstation to the server to confirm that 5 the image has been received and viewed. If no such acknowledgement is received by the server within a predetermined time, then the server will select another workstation to which to send the image.
On receiving an image from a camera, the server may also alert people directly that an 10 incident has been detected. This may be done via an automated telephone call (e.g. to a mobile phone 34), or by paging or sending a text message or an e-mail message to a device such as a personal digital assistant 36. The people alerted in such a manner may be the monitoring personnel (e.g. to request them to look urgently at an image on their workstation) or the police or security personnel local to the intruder. Through knowing the location of the :5 camera from which the image originated, the server can alert people in the locality of the camera. Monitoring personnel may work in teams. Some may be based in the same room or building as one another, and hence can interact and support one another. Others based elsewhere 20 may be contacted when their assistance is required (e.g. if a primary monitor has to leave his workstation for whatever reason and is hence unavailable). Such communication between the monitoring personnel may be effected via their workstations and the server.
The images transmitted from the cameras to the workstations may take a variety of formats, 25 depending on the speed of data communication available For example, video images may
( be captured (e.g. at 640 x 480 resolution). Alternatively, still images may be transmitted.
Small or low-resolution preview images may be transmitted in the first instance and then, if the monitoring person deems it necessary, he may instruct the server to supply high-
resolution or moving video images instead.
The monitoring workstations may be used to control the remote devices. Instructions from the workstations are sent to the remote devices via the network 22 and the server 24. In particular, the cameras may be motorised, and their direction of view may thus be adjusted by the monitoring personnel by inputting instructions to their workstations. This enables a 10 monitoring person to track the movement of a potential intruder.
As shown in Figure 2, other electrical devices may also be in communication with the remote monitoring device 50, for example via the X10 protocol, or by Bluetooth (RTM) or some other wireless communication means. These other devices may be lights or domestic appliances 15 such as a television 54, and may be activated or controlled either automatically, when the remote sensor detects a potential intruder 20, or on command from a monitoring workstation if the monitoring person considers it appropriate. The activation of such appliances or lights is intended to deter the intruder from proceeding with his activities.
20 As shown in Figure 3, in a given location, a plurality of monitoring devices 58, 60 may be networked via a local controller 56. This controller (or hub) 56 is in communication with the network 22. Other electrical devices such as a television set 64 may be controlled via the controller 56, either directly or via a secondary portal controller 62. A separate portal controller may be employed for each communications protocol used to control the electrical 25 devices - e.g. one portal controller for X10 devices and one for Bluetooth (RTM).
( Alternatively a multi-portal controller may be employed that can communicate over more than one protocol.
The design of the remote monitoring devices is important in order to be able to monitor S remote locations effectively. Figure 4 shows plan and side views of an emitter/sensor array.
To achieve a 360-degree monitoring capability the sensors may be arranged around the circumference of the camera, effectively in a circle as shown in this Figure. Each sensor's field of view is similar to the camera; the narrower the field of view the greater the distance
and detail of the pictures.
With motorised cameras, when a sensor is triggered, the camera may be configured to turn to that position and start filming or capturing images for a few seconds. Where the target triggers two adjacent sensors the camera will stop between them (and this may be used to halve the number of sensors needed). Alternatively there may be an array of cameras IS covering the required field of view. In this case individual cameras may be added or
subtracted according to the conditions of the site. Figures 5, 6 and 6 show examples of possible arrangements of cameras and sensors. Although in Figure 6 eight cameras are used to cover the full 360 degrees, the number of cameras could be increased to sixteen or more. Figure 8 illustrates arear view of a remote monitoring device 70, showing a connector 72 for connection to a local controller (e.g. 56 in Figure 3). The front of the device, as shown in Figure 9, incorporates the camera lens 74 and the sensor 76. The sensor may be passive infrared or another light source, that triggers when there is a movement within its field of
25 view.
Inter-camera communication At the same time as transmitting pictures to the server, the active camera may also communicate with any adjacent cameras, which will turn towards its location and take further 5 pictures, sending them to the server at the same time. In such cases, the system uses its emitter/sensor in a dual role, first to detect an intruder and secondly as means for inter-
camera communication. Communication between cameras may also be achieved using Bluetooth (RTM), laser, X10 or other alternative technology. When the cameras need to communicate, the communication will be between the emitter on one camera and the sensor 10 on the other. This will be in the form of a pulsed signal, arranged such that the emitting camera is not mistaken for an intruder.
As shown in Figure 10, when two cameras 80, 82 detect an intruder 88 there will be a cross-
over point of the emitter beams, that can be used to operate other devices 90 close to the IS location of the intruder, using the signalling mode of the emitter. These other devices could be lighting, dye spray, locks, alarms, electrical appliances, and so on.
Installation and setup of new monitoring hardware When a customer purchases a camera, they may give details of where the system is to be 20 located (this may include a local map) and what to do in the event of an unwanted intrusion.
These details will be maintained by the server/database.
When the primary camera is first switched on, it contacts the server, notifies the system of its activation and provide its location or coordinates. The server will recognise the camera and 25 obtain relevant details from the camera, together with a picture from the camera.
( The server then selects a monitoring person (or another surveillance organization as agreed with the customer) to perform the initial set-up.
5 Initial set-up of cameras When a monitoring person receives notification of a new camera installation they can take direct control of it, via their workstation, and adjust the vertical position (up/down) of the camera and the sensor level to avoid spurious alarms caused by cats etc. They monitoring person can also check the other cameras in the installation and select the most appropriate 10 secondary pictures to take when an adjacent camera is triggered.
Camera communication Cameras in the system may be configured to communicate with each other and to ensure that they remain active. In the event of a camera failing or otherwise being damaged, the 15 other local cameras may be configured to make regular sweeps of the affected area, until the affected camera is back in action.
As described above, the remote camera unit may also be configured to communicate with other devices (e.g. via Bluetooth (RTM), laser, dialup, radio or X10) to activate lighting, 20 locks, alarms, etc. Automatic camera tracking Cameras may track either with a multi-lens setup or a motorised lens using directional sensors. When the sensor detects a target, a primary camera will turn to the required 25 direction or activate the appropriate camera and capture images. At the same time it can
communicate with other cameras in the system to track to the same direction and to take additional photos to pick up other useful information such as nearby parked cars.
The tracking facility means that a narrow angle lens can be used rather than a wide angle 5 lens, which allows the pictures taken to be high definition.
Because the angle between two or more cameras in a system detecting a target is known, using the coordinates of the cameras it is possible to determine the exact position of the intruder, and this in turn may allow some other action to be made possible. Global 10 positioning technology may be used to determine the location of the cameras.
Home based monitoring With the example of monitoring personnel viewing images and controlling cameras via the Internet, the monitoring workstation can be situated anywhere in the world where adequate i: costeffective Internet communication exists.
On receiving a photo, the monitor acknowledges receipt, determines whether the incident is real or a false alarm and take appropriate action. An automated response may be used (e.g. using text messaging, e-mail, etc.) or alternatively manual action may be taken, such as 20 alerting local authorities or the client, etc. The monitoring person may remotely operate the camera to enable further investigation of the situation.
Camera control In the case where a monitoring person takes control of a camera system, they can manually 25 adjust the direction of the camera and operate any lighting or devices that are in
( communication with the system. They are also able to adjust the individual sensors to avoid false alarms caused by passing cats etc. The server 5 The server is preferably configured such that it: À Maintains a list of client cameras, including location maps and response instructions.
À Maintains the allocation of monitors to clients, ensuring adequate cover.
À Checks camera connections periodically.
À Maintains a history of each camera.
10 À Connects a monitoring workstation to the appropriate camera in the case of an event.
The workstation may be selected dependent on availability and the training of the person there.
À Can make adjustments to the camera sensors when high incidents of false alarms are reported.
The server may also contact the response unit (e.g. 40 in Figure 1) directly, if no monitoring workstation is available to deal with the matter.
., Summary
20 A preferred embodiment of the invention comprises a remote monitoring device incorporating mobile phone technology and a camera, and a monitoring workstation in communication with the remote monitoring device via the Internet.
With traditional monitoring systems, one or more persons watch banks of screens, looking 25 for suspicious behaviour. These systems are suitable for the high street or areas of high
( activity. However, they are expensive to operate and are fixed into location. It is difficult to move either the monitoring location or the cameras themselves.
However, in accordance with a preferred embodiment of the invention, a compact camera, 5 computer and 3G mobile phone transmitter/receiver may be employed that is self sufficient in power and requires no cables. This makes it easy to install or move to different locations as the need demands. The camera is able to track a target through 270-360 degrees using sensors and where two or more units are installed, communicate with each other so that they can point in the same direction to pick up other information or protect each other from 10 tampering or theft. The monitoring is done over the Internet.
The essential difference between the two systems is that the traditional system requires constant surveillance or recording. However, the system in accordance with the present invention is event driven, and in normal circumstances would be dormant, switching on only i5 when the sensors trigger it into operation. It is ideal for areas in which human traffic is rare and is likely to be undesirable. This means that one monitoring person can look after many hundreds of cameras.
. Images taken by the remote cameras are sent to a server on the Internet, which forwards the 20 images to one or more monitoring workstations (which may be home-based). Other forms of communication used may include SMS text messaging and automatic voice calling. The server checks that the images have been responded to within a predetermined time. If no response has been received then the server will resend the images to other monitors.
These other monitors can be predefined, or automated based on the locality of the camera 25 (which may make use of the GPS co-ordinates of the camera).
( The monitors may be managed by the server in teams, so that situations needing specific responses are properly provided for, by virtue of the monitoring personnel being suitably trained. s The server may keep a history of each monitored site and provide a site map (e.g. using MapPoint - a software facility that uses GPS to provide local area maps) to the monitoring person, thereby detailing the location of the activated camera.
10 Examples of potential surveillance sites and applications À Railway embankments, where an intruder may place an obstruction on the railway line. À Customs and excise, where there is a need to keep watch on a remote area of coastline or port boundary, where drug smuggling or unlawful immigration may occur.
i; À Seaport and airport perimeters.
À Airport hangers, where a human presence could be suspicious.
À Police observation of a house in which drug dealing is taking place.
À Remote sites in which terrorists are known to operate.
À Commercial and residential sites.
20 À A company's research and development department (for out-of-hours monitoring).
À To provide cheap overnight cover for conventional CCTV surveillance.
À Other phenomena which may be monitored, using appropriate sensors, include abnormal levels of mechanical stress or strain (e.g. on railway lines, bridges, etc.) and abnormal temperatures or pressures (e.g. in power stations or industrial 25 machinery).
Claims (45)
1. Security monitoring apparatus comprising: a remotely-locatable device comprising a camera, sensing means and transmitting means, the remotelylocatable device being operable, on the detection of an event by 5 the sensing means, to transmit digital image data captured by the camera; and a server connected to a digital communication network and in communication with receiving means, the receiving means being operable to receive digital image data transmitted by the remotely-locatable device, and the server being configured to transmit the digital image data to a monitoring workstation in communication with the I O network.
2. Security monitoring apparatus as claimed in Claim 1, wherein the sensing means are
responsive to one or more of:- motion, human presence, heat, sound, vibration, ,. temperature, light intensity, pressure, mass, weight, force, mechanical stress or 5 mechanical strain.
3. Security monitoring apparatus as claimed in Claim 1 or Claim 2, wherein the server is configured to request an acknowledgement that digital image data sent to the workstation has been viewed by a person at said workstation.
4. Security monitoring apparatus as claimed in any preceding Claim, wherein the workstation is one of a plurality of workstations.
5. Security monitoring apparatus as claimed in any preceding Claim, wherein the network comprises the Internet and the workstations are personal computers connected to the Internet.
5
6. Security monitoring apparatus as claimed in any preceding Claim, wherein the remotely-locatable device is wirelessly connected to the network.
7. Security monitoring apparatus as claimed in any preceding Claim, wherein the remotely-locatable device is configured to transmit image data using a technique to taken from a group comprising: wireless mobile telephony, Biuetooth (RTM), satellite communication, optical communication, dialup connection using a modem.
8. Security monitoring apparatus as claimed in any preceding Claim, wherein the remotely-locatable device is adapted to communicate with other electrical devices in S its locality such that, on detection of motion or human presence by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation, said instructions being communicated via the server and the network.
20
9. Security monitoring apparatus as claimed in Claim 8, wherein said other electrical devices are activated and/or controlled using X10, Bluetooth (RTM) or wireless communication.
10. Security monitoring apparatus as claimed in any preceding Claim, wherein the 25 camera is motorised and moveable such that its direction of view may be changed.
(
11. Security monitoring apparatus as claimed in Claim 10, wherein the camera is moveable on the instructions of a person at a monitoring workstation, said instructions being communicated via the server and the network.
s
12. Security monitoring apparatus as claimed in Claim 10 or Claim 11, wherein the remotely-locatable device further comprises a directionally sensitive sensor or plurality of sensors, and is configured to move the camera to face the direction of a detected object or person.
13. Security monitoring apparatus as claimed in any preceding Claim, comprising a plurality of remotely-locatable devices at a common site, the devices comprising communication means to enable them to communicate between one another and to cause their respective cameras to capture a common incident.
!5
14. Security monitoring apparatus as claimed in any preceding Claim wherein the server holds or has access to a record of the cameras in use, together with data specifying the location of each camera and an appropriate response should an incident be detected by a given camera.
15. Security monitoring apparatus as claimed in Claim 14 wherein, for a given camera, the server holds details of the monitoring workstations and the corresponding monitoring personnel to whom image data from that camera should be sent.
(
16. Security monitoring apparatus as claimed in any preceding Claim, wherein the server is operable to perform periodic checks that a remotelylocatable device is functioning correctly. 5
17. Security monitoring apparatus as claimed in any preceding Claim, wherein the server is operable to make adjustments to the sensitivity of sensing means if the corresponding remotely-locatable device is prone to reporting false alarms.
18. A method of security monitoring comprising the steps of: 10 detecting an event using sensing means; operating a camera to capture image data in response to the detection by the sensing means; transmitting said image data to a server; and sending said image data from said server to a monitoring workstation via a data !5 communication network.
19. A method as claimed in Claim 18 further comprising sending an acknowledgement from the workstation to the server that image data sent to the workstation has been viewed by a person at said workstation.
20. A method as claimed in Claim 19 further comprising the server sending the image data to an alternative workstation if no acknowledgement is received by the server from the workstation to which the image data was initially sent.
21. A method as claimed in any of Claims 18 to 20, further comprising a person at a monitoring workstation alerting security personnel in the locality of a detected event or an incident (or potential incident) observed on said workstation.
S
22. A method as claimed in any of Claims 18 to 21, further comprising activating and/or controlling electrical devices in the locality of a detected event or an incident (or potential incident) observed on said workstation.
23. A method as claimed in Claim 22 wherein the electrical devices are activated and/or 10 controlled from said workstation using X10, Bluetooth (RTM) or wireless communication.
24. A method as claimed in any of Claims 18 to 23, further comprising controlling the movement of a camera by inputting commands to a workstation, said commands being transmitted to the camera via the server and the network.
25. A method as claimed in any of Claims 18 to 24, further comprising the server alerting a person that an event has been detected.
20
26. A method as claimed in Claim 25, wherein the person is alerted by the server using e-mail, paging, text-messaging or a telephone call.
27. A method as claimed in any of Claims 18 to 26 further comprising maintaining a record on the server of cameras in use, together with data specifying the location of
( each camera and an appropriate response should an event be detected by the sensing means corresponding to a given camera.
28. A method as claimed in Claim 27 wherein, for a given camera, the server further 5 holds details of the monitoring workstations and the corresponding monitoring personnel to whom image data should be sent.
29. A method as claimed in any of Claims 18 to 28 further comprising the server periodically checking that a camera is functioning correctly.
30. A method as claimed in any of Claims 18 to 29 further comprising the server making adjustments to the sensitivity of sensing means if the corresponding camera is prone to reporting false alarms.
S
31. A remotely-locatable security monitoring device comprising a camera, sensing means and transmitting means, the remotely-locatable device being operable, on the detection of an event by the sensing means, to transmit digital image data captured by the camera to a remote server or a remote workstation.
20
32. A remotely-locatable security monitoring device as claimed in Claim 31, wherein the sensing means are responsive to one or more of:motion, human presence, heat, sound, vibration, temperature, light intensity, pressure, mass, weight, force, mechanical stress or mechanical strain.
33. A remotely-locatable security monitoring device as claimed in Claim 31 or Claim 32, wherein the transmitting means are wireless.
34. A remotely-locatable security monitoring device as claimed in any of Claims 31 to 33, 5 configured to transmit image data using a technique taken from a group comprising: wireless mobile telephony, Bluetooth (RTM), satellite communication, optical communication, dialup connection using a modem.
35. A remotely-locatable security monitoring device as claimed in any of Claims 31 to 34, 10 adapted to communicate with other electrical devices in its locality such that, on detection of an event by the sensing means, the other electrical devices may be activated and/or controlled on instructions from a monitoring workstation.
36. A remotely-locatable security monitoring device as claimed in any of Claims 31 to 35, S further comprising communication means to enable it to communicate with other such remotely-locatable security monitoring devices such that, in use, a plurality of such devices proximally located can communicate with each other to cause their respective cameras to capture a common incident.
20
37. A server operable to be connected to a digital communication network, to receive digital image data from a remotely-locatable security monitoring device, and to transmit the digital image data to a monitoring workstation in communication with the network.
38. A server as claimed in Claim 37, configured to request an acknowledgement that digital image data sent to a workstation has been viewed by a person at said workstation. 5
39. A server as claimed in Claim 37 or Claim 38, holding or having access to a record of a plurality of security monitoring devices in use, together with data specifying the location of each security monitoring device and an appropriate response should an event be detected by a given security monitoring device.
10
40. A server as claimed in any of Claims 37 to 39, operable to perform periodic checks that a security monitoring device is functioning correctly.
41. A server as claimed in any of Claims 37 to 40, operable to make adjustments to the sensitivity of a security monitoring device if it is prone to reporting false alarms.
!
42. Security monitoring apparatus substantially as herein described with reference to and as illustrated in any combination of the accompanying drawings.
43. A method of security monitoring substantially as herein described with reference to 20 and as illustrated in any combination of the accompanying drawings.
44. A remotely-locatable security monitoring device substantially as herein described with reference to and as illustrated in any combination of the accompanying drawings.
(
45. A server substantially as herein described with reference to and as illustrated in any combination of the accompanying drawings.
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0213866A GB2389978A (en) | 2002-06-17 | 2002-06-17 | Event-triggered security monitoring apparatus |
| PCT/GB2003/002467 WO2003107293A1 (en) | 2002-06-17 | 2003-06-09 | Security monitoring apparatus and method |
| AU2003244779A AU2003244779A1 (en) | 2002-06-17 | 2003-06-09 | Security monitoring apparatus and method |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GB0213866A GB2389978A (en) | 2002-06-17 | 2002-06-17 | Event-triggered security monitoring apparatus |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| GB0213866D0 GB0213866D0 (en) | 2002-07-31 |
| GB2389978A true GB2389978A (en) | 2003-12-24 |
Family
ID=9938715
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| GB0213866A Withdrawn GB2389978A (en) | 2002-06-17 | 2002-06-17 | Event-triggered security monitoring apparatus |
Country Status (3)
| Country | Link |
|---|---|
| AU (1) | AU2003244779A1 (en) |
| GB (1) | GB2389978A (en) |
| WO (1) | WO2003107293A1 (en) |
Cited By (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1564700A1 (en) * | 2004-02-11 | 2005-08-17 | Sensormatic Electronics Corporation | System and method for remote access to security event information |
| EP1643471A1 (en) * | 2004-09-29 | 2006-04-05 | Thomas Grellner | Surveillance system and camera thereto |
| GB2420044A (en) * | 2004-11-03 | 2006-05-10 | Pedagog Ltd | Viewing remotely captured images across a data network |
| GB2397960B (en) * | 2003-01-30 | 2006-10-25 | Jian Zhang | A method for the real-time monitoring and transmission of a visual domestic safeguard system |
| EP1720143A3 (en) * | 2005-04-14 | 2007-08-29 | American Research & Technology | On-line security management system |
| GB2417636B (en) * | 2003-05-06 | 2007-09-26 | Realnetworks Inc | Multi-purpose video surveillance |
| US7363543B2 (en) | 2002-04-30 | 2008-04-22 | International Business Machines Corporation | Method and apparatus for generating diagnostic recommendations for enhancing process performance |
| WO2008088203A1 (en) * | 2006-11-24 | 2008-07-24 | Global Sight, S.A. De C.V. | Systems for remote and digital data transmission and location by satellite from mobile or fixed terminals with urban surveillance cameras for face recognition, gunshot detector, capturing of public safety personnel and missing or kidnapped persons and citizens' alarm, stolen vehicles, electronic fine issuance and fine colle |
| WO2010116364A1 (en) * | 2009-04-05 | 2010-10-14 | Tadsec Advanced Homeland Security Technologies Ltd | A security management system and method |
| WO2013034849A1 (en) * | 2011-09-09 | 2013-03-14 | France Veille Eurl | Method of community surveillance |
| EP2840558A3 (en) * | 2013-08-09 | 2015-08-19 | LG Electronics, Inc. | Electronic device communicating with external cameras |
| CN108780598A (en) * | 2016-01-25 | 2018-11-09 | 林仁泽 | Social safety net's system with portable lamp for wireless disaster detection and crime prevention |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2874776A1 (en) * | 2004-09-01 | 2006-03-03 | Sygetis Sarl | Intrusion validating method for e.g. enterprise, involves converting visual information to obtain processed information that is in format readable by terminal, which is then connected to remote server to allow user to validate intrusion |
| NO20045666D0 (en) * | 2004-12-27 | 2004-12-27 | Tor Helgesen | Alarm unit and control systems that call or send a message to a subscriber terminal when triggered |
| DE102006010955B3 (en) * | 2006-03-03 | 2007-10-04 | Siemens Ag | Method for visually monitoring a room area |
| KR20160014242A (en) * | 2014-07-29 | 2016-02-11 | 삼성전자주식회사 | Method and device for mapping location of sensor and event operation with monitoring device |
| US9871830B2 (en) * | 2014-10-07 | 2018-01-16 | Cisco Technology, Inc. | Internet of things context-enabled device-driven tracking |
| GB2562251A (en) * | 2017-05-09 | 2018-11-14 | Zircon Software Ltd | System and method for detecting unauthorised personnel |
Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2064189A (en) * | 1979-11-09 | 1981-06-10 | Ascotts Ltd | Surveillance System |
| CA2228679A1 (en) * | 1998-02-04 | 1999-08-04 | Gridzero Technologies Inc. | Surveillance systems |
| WO2001013637A1 (en) * | 1999-08-12 | 2001-02-22 | Honeywell Limited | System and method for digital video management |
| US6271752B1 (en) * | 1998-10-02 | 2001-08-07 | Lucent Technologies, Inc. | Intelligent multi-access system |
| GB2364460A (en) * | 2000-05-02 | 2002-01-23 | Ford Global Tech Inc | Web-based video conference system for remote fault diagnosis |
| US20020030738A1 (en) * | 2000-06-01 | 2002-03-14 | Moreinis Joseph Daniel | Web based monitoring system |
| US6385772B1 (en) * | 1998-04-30 | 2002-05-07 | Texas Instruments Incorporated | Monitoring system having wireless remote viewing and control |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2325548B (en) * | 1997-05-21 | 2001-02-14 | Richard Parviz Nabavi | Improvements in and relating to security alarm systems and their controllers |
| US6215519B1 (en) * | 1998-03-04 | 2001-04-10 | The Trustees Of Columbia University In The City Of New York | Combined wide angle and narrow angle imaging system and method for surveillance and monitoring |
| US7124427B1 (en) * | 1999-04-30 | 2006-10-17 | Touch Technologies, Inc. | Method and apparatus for surveillance using an image server |
| US6281790B1 (en) * | 1999-09-01 | 2001-08-28 | Net Talon Security Systems, Inc. | Method and apparatus for remotely monitoring a site |
| US20020005894A1 (en) * | 2000-04-10 | 2002-01-17 | Foodman Bruce A. | Internet based emergency communication system |
| US6400265B1 (en) * | 2001-04-24 | 2002-06-04 | Microstrategy, Inc. | System and method for monitoring security systems by using video images |
-
2002
- 2002-06-17 GB GB0213866A patent/GB2389978A/en not_active Withdrawn
-
2003
- 2003-06-09 AU AU2003244779A patent/AU2003244779A1/en not_active Abandoned
- 2003-06-09 WO PCT/GB2003/002467 patent/WO2003107293A1/en not_active Ceased
Patent Citations (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| GB2064189A (en) * | 1979-11-09 | 1981-06-10 | Ascotts Ltd | Surveillance System |
| CA2228679A1 (en) * | 1998-02-04 | 1999-08-04 | Gridzero Technologies Inc. | Surveillance systems |
| US6385772B1 (en) * | 1998-04-30 | 2002-05-07 | Texas Instruments Incorporated | Monitoring system having wireless remote viewing and control |
| US6271752B1 (en) * | 1998-10-02 | 2001-08-07 | Lucent Technologies, Inc. | Intelligent multi-access system |
| WO2001013637A1 (en) * | 1999-08-12 | 2001-02-22 | Honeywell Limited | System and method for digital video management |
| GB2364460A (en) * | 2000-05-02 | 2002-01-23 | Ford Global Tech Inc | Web-based video conference system for remote fault diagnosis |
| US20020030738A1 (en) * | 2000-06-01 | 2002-03-14 | Moreinis Joseph Daniel | Web based monitoring system |
Cited By (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7363543B2 (en) | 2002-04-30 | 2008-04-22 | International Business Machines Corporation | Method and apparatus for generating diagnostic recommendations for enhancing process performance |
| GB2397960B (en) * | 2003-01-30 | 2006-10-25 | Jian Zhang | A method for the real-time monitoring and transmission of a visual domestic safeguard system |
| GB2417636B (en) * | 2003-05-06 | 2007-09-26 | Realnetworks Inc | Multi-purpose video surveillance |
| EP1564700A1 (en) * | 2004-02-11 | 2005-08-17 | Sensormatic Electronics Corporation | System and method for remote access to security event information |
| EP1643471A1 (en) * | 2004-09-29 | 2006-04-05 | Thomas Grellner | Surveillance system and camera thereto |
| GB2420044B (en) * | 2004-11-03 | 2009-04-01 | Pedagog Ltd | Viewing system |
| GB2420044A (en) * | 2004-11-03 | 2006-05-10 | Pedagog Ltd | Viewing remotely captured images across a data network |
| EP1720143A3 (en) * | 2005-04-14 | 2007-08-29 | American Research & Technology | On-line security management system |
| WO2008088203A1 (en) * | 2006-11-24 | 2008-07-24 | Global Sight, S.A. De C.V. | Systems for remote and digital data transmission and location by satellite from mobile or fixed terminals with urban surveillance cameras for face recognition, gunshot detector, capturing of public safety personnel and missing or kidnapped persons and citizens' alarm, stolen vehicles, electronic fine issuance and fine colle |
| WO2010116364A1 (en) * | 2009-04-05 | 2010-10-14 | Tadsec Advanced Homeland Security Technologies Ltd | A security management system and method |
| WO2013034849A1 (en) * | 2011-09-09 | 2013-03-14 | France Veille Eurl | Method of community surveillance |
| FR2980023A1 (en) * | 2011-09-09 | 2013-03-15 | France Veille Eurl | COMMUNITY MONITORING PROCESS |
| EP2840558A3 (en) * | 2013-08-09 | 2015-08-19 | LG Electronics, Inc. | Electronic device communicating with external cameras |
| CN108780598A (en) * | 2016-01-25 | 2018-11-09 | 林仁泽 | Social safety net's system with portable lamp for wireless disaster detection and crime prevention |
| EP3407315A4 (en) * | 2016-01-25 | 2019-09-18 | In Taek Lim | Social safety network system having portable light for both wireless disaster fire detection and crime prevention |
| RU2734161C2 (en) * | 2016-01-25 | 2020-10-13 | Ин Тэк ЛИМ | Public safety network system equipped with portable lights for wireless fire detection and crime prevention |
Also Published As
| Publication number | Publication date |
|---|---|
| GB0213866D0 (en) | 2002-07-31 |
| AU2003244779A1 (en) | 2003-12-31 |
| WO2003107293A1 (en) | 2003-12-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| GB2389978A (en) | Event-triggered security monitoring apparatus | |
| CA2623501C (en) | Security monitoring arrangement and method using a common field of view | |
| US20090122144A1 (en) | Method for detecting events at a secured location | |
| EP1547036B1 (en) | Automatic detection and monitoring of perimeter physical movement | |
| US6970183B1 (en) | Multimedia surveillance and monitoring system including network configuration | |
| JPH11154292A (en) | Integrated warning system | |
| CN102419883A (en) | Monitoring method and system for monitoring defense area | |
| US20040036596A1 (en) | Security system and methods | |
| US20070139192A1 (en) | Sensor unit having a network video camera | |
| KR100440786B1 (en) | Remote digital video recording and emergency-monitoring system | |
| JP3843733B2 (en) | Security monitoring system using communication network | |
| JP4620218B2 (en) | Home security system | |
| KR20080076201A (en) | Mobile security system by omnidirectional camera | |
| JP2003223603A (en) | Centralized management system to prevent abnormal situations at business sites | |
| KR20030012948A (en) | Internet-based Access-control System using cabled or radio network | |
| KR102283434B1 (en) | System for Operating SOS Emergency Bell with IP Camera | |
| KR101597154B1 (en) | An apparatus for security system using dual wireless modules | |
| KR100880428B1 (en) | Ubiquitous policing system | |
| JP2002183845A (en) | Security equipment | |
| KR100609735B1 (en) | Unmanned remote video surveillance device using internet network | |
| KR200296224Y1 (en) | The guard camera system attaching a sensor | |
| CN208014114U (en) | A kind of light curtain door and window alarm system | |
| JP7538588B2 (en) | Fire alarm system | |
| GB2451291A (en) | Portable video surveillance system | |
| EP4560600A1 (en) | Security monitoring systems and methods |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |