EP2898487A2 - Sicherheitsmeldenetzwerk sowie verfahren zum betrieb des sicherheitsmeldenetzwerks - Google Patents
Sicherheitsmeldenetzwerk sowie verfahren zum betrieb des sicherheitsmeldenetzwerksInfo
- Publication number
- EP2898487A2 EP2898487A2 EP13766045.2A EP13766045A EP2898487A2 EP 2898487 A2 EP2898487 A2 EP 2898487A2 EP 13766045 A EP13766045 A EP 13766045A EP 2898487 A2 EP2898487 A2 EP 2898487A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- monitoring
- network
- event
- security
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
- G08B13/19656—Network used to communicate with a camera, e.g. WAN, LAN, Internet
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19678—User interface
- G08B13/19684—Portable terminal, e.g. mobile phone, used for viewing video remotely
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19697—Arrangements wherein non-video detectors generate an alarm themselves
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/001—Alarm cancelling procedures or alarm forwarding decisions, e.g. based on absence of alarm confirmation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/009—Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/016—Personal emergency signalling and security systems
Definitions
- the invention relates to a security network with the features of the preamble of claim 1.
- Surveillance cameras are often used to monitor buildings or other large areas. In the simplest case, precisely one surveillance camera is provided in a surveillance area, the image data of which is forwarded to a monitoring center and checked there. In more complex surveillance areas, a plurality of surveillance cameras are usually installed. The image data streams of the surveillance cameras are often combined in a monitoring center and there checked by monitoring personnel.
- Document DE 10 2007 054 819 A1 which is probably the closest prior art, discloses a monitoring system with a plurality of surveillance cameras, wherein the image data streams of the surveillance cameras are optionally directed to and displayed on a plurality of monitors with the interposition of digital image processing algorithms , Furthermore, the monitoring system includes a workstation for an observer who monitors the image data streams displayed on the monitors.
- the security reporting network according to the invention - also referred to as a security network system or security network system - is suitable and / or designed to carry out a monitoring, in particular with regard to a burglary, an alarm or other criteria.
- the security reporting network includes at least one monitoring local network for a monitoring object - or in an operational state - in a monitoring object.
- a surveillance object is preferably understood to mean a monitoring area that belongs together in terms of content.
- the surveillance object is considered to be a related building complex, e.g. a hospital facility, an airport facility, a public or private building, etc. trained.
- the monitoring object has the local monitoring network installed or installed.
- the local monitoring network is a network in which the network subscribers have local addresses, in particular local IP addresses.
- the local IP addresses are local IP addresses.
- Monitoring network a router as an interface.
- the monitoring network is designed as a LAN - Local Area Network.
- the at least one local monitoring network has at least one surveillance camera as a network participant.
- the local monitoring network comprises further monitoring devices, such as e.g. Motion detector or fire detector.
- the surveillance camera includes a network interface for connection to the local surveillance network.
- the surveillance camera includes a
- the surveillance camera is designed in particular as a so-called “intelligent" surveillance camera. In the event that the evaluation according to a set of rules results in a special feature in the monitoring area, this feature is treated as an event situation (event).
- the surveillance camera is designed to output an event message - also called event messages - upon detection of the event situation. The event message is output to the surveillance network of the surveillance camera.
- the event message is defined as a message about an event, ie an event.
- the event message includes data that characterizes the event and may include any selection of the subsequent data, such as a. Time of the event (e.g., time / date), position of the event (e.g., room X), sender of the event (e.g., monitor Y), type of event (e.g.
- the surveillance camera it is possible, for example, for the surveillance camera to detect moving objects in front of a static scene background and to detect an event situation in the presence of a moving object. It is also possible that according to the rules only an event situation is detected when the moving object enters a restricted area or crosses a barrier line. Further possibilities for the detection of event situations by means of digital image processing in surveillance cameras are shown for example in the document DE 102007053812 of the applicant with further references.
- the security reporting network comprises a first network and a central security control device, wherein the local monitoring network is connected to the central security control device via the first network or can be connected, and wherein the event message is transmitted via the first network to the central security control device.
- the first network may, for example, be in the form of a public Internet, in modified embodiments the first network may also be designed as be implemented a telephone connection or other data connection.
- the first network is designed as a private network, which is provided by an ISP (Internet Service Provider).
- ISP Internet Service Provider
- the security reporting network further comprises a second network and at least one agent device which is connected to the central security control device via the second network.
- the security control device is particularly preferably designed as a server, which can be reached via the first and the second network.
- the first and second networks may be similar. However, it is preferred that the second network be implemented as an intranet so that the agent devices are also located in close proximity to the security controller.
- the security reporting network is configured to transmit the event message or an event message processed on the basis of the event message as an alarm message to the at least one agent device.
- the event message is transmitted from the surveillance camera, via the first network, via the security control device and as an alarm message, to the at least one agent device.
- the agent devices are preferably designed as workstations, in particular computer workstations, for monitoring personnel.
- Agent devices allow the alarm to be processed by the monitoring personnel.
- the security reporting network has a plurality of local monitoring networks, the majority of the local surveillance networks being assigned to different surveillance objects.
- the advantage of the invention lies in the fact that the security control device and the agent devices can be realized at any position, in particular detached from the local surveillance network.
- a plurality of local monitoring networks and consequently a plurality of monitoring objects can be managed by a central security control device and the agent devices connected thereto.
- the security network architecture makes it possible to save plant components, in particular so-called hardware, since a separate safety control device does not have to be set up for each local monitoring network.
- the agent devices can also be centrally organized so that agent devices and, if appropriate, the monitoring personnel operating the agent devices can be centrally organized.
- the central organization has the further advantage that e.g. Training of the monitoring personnel and further developments of the agent facility, the
- Safety control device etc. can be implemented quickly.
- the monitoring objects can also be assigned to different monitoring object types.
- Monitoring object types are the different tasks of the monitoring objects. For example, it is conceivable that via the central safety control device: police building
- the security control device comprises a management module, wherein the management module is configured to assign accounts or accounts for the different monitoring objects and / or groups of surveillance objects that can be assigned to different clients, so that the support and thus monitoring of the surveillance objects as a central service also to different Client can be offered.
- the accounts or accounts include data on the different contacts, monitoring objects, monitoring policies and other configuration data.
- the security control device comprises an event processing module for processing the incoming event messages and for outputting the alarm message or processed event messages.
- the event processing module particularly preferably uses a set of rules or the rules and regulations stored in the management module for the respective monitoring object.
- the policy includes alert rules, e.g. in terms of an arming time for the activation of the monitoring, logical linking of events etc.
- the at least one agent device is designed to process and / or evaluate the event message with user action by a monitoring personnel as a user.
- the agent device is designed to record the event message To cancel and / or verify the basis of the result of the processing / evaluation.
- the agent device is configured to request further information about the alarm message from the surveillance camera which has issued the associated event message.
- the agent device is designed to display the further information and to evaluate it with user interaction.
- the security network has at least one client device, wherein the client device is designed as a mobile terminal, in particular as a mobile phone.
- the agent device comprises a request module configured to send an alarm message and a verification request to the client device and to receive a response of the client device to the verification request.
- the verification request is a request to the user of the client device whether the alert is acknowledged or discarded as a false alarm.
- the request module forms an integral part of
- Agents facility provision is made for the alarm message and / or the verification request to be output automatically by the request module on the basis of the alarm message and the user interaction.
- the monitoring personnel as users of the at least one agent device, can include a user of the client device, in particular of the mobile telephone, in the verification of alarm situations.
- the monitoring personnel can secure themselves and avoids superfluous interventions, which can be very costly depending on the intervention partner (fire brigade, police, etc.).
- Surveillance personnel can stop the alarm faster and with greater reliability.
- an end user as a user of the client device and receiver of the alarm message as well as the verification request feels integrated into the process and thus confirmed in the security system.
- the sending of the alarm message and the verification request can be triggered by user interaction.
- this embodiment is not a parallel signal path, wherein an alarm notification is sent both to the agent device and to the client device, but to a serial signal path, in particular a signal chain, wherein in the signal path first in the agent device user interaction must be done to trigger the sending of the alarm message and the verification request to the client device.
- the advantage of this embodiment is to be seen in particular in the fact that the end user receives only alarm messages and verification requests of event situations as users of the client device, which have already been pretested by user interaction in the agent device, in particular manually pretested, so that only highly relevant event situations in the form of alarm messages and Verification requests are sent to the client device.
- the alarm message contains some or all of the following data:
- the event underlying the alarm message in particular the time of the event (eg time / date), position of the event (eg room X), sender of the event (eg monitoring device Y), type of event (eg burglary, fire, moving object , Temperature rise).
- time of the event e. time / date
- position of the event e.g room X
- sender of the event e.g monitoring device Y
- type of event eg burglary, fire, moving object , Temperature rise.
- the client device is designed to send verification information to the agent device in response to the verification request.
- the reaction occurs with user interaction by the end user.
- the client device on a software, in particular an app, which is programmatically designed to display on a screen of the client device a selection of Verosentworten and by the Let end users select. For example, three different verification responses are displayed on the screen of the client device, which are selectable by touch-screen or other man-machine interface and sent as verification information to the agent device.
- the security reporting network is particularly preferably designed to send the verification request from the agent device via the second network to the security control device and subsequently from the security control device via the third network to the client device.
- the third network may be of the same kind as the first network or the second network, but may in particular also be a telephone connection.
- the transmission of the verification request and / or the alarm message via the so-called push notification technology of smartphones takes place as a training of mobile phones.
- the use of push notification technology has the advantage that the user of the client device does not need to have the corresponding software or app constantly activated, but that the software or app must be activated by the push notification service of the client device if required , in particular at the entrance of the push notification is activated.
- the surveillance camera is configured to output monitoring image information for a monitoring event.
- the monitoring image information comprises one or more surveillance images, wherein the surveillance images have a quality level.
- the quality level may preferably refer to a resolution of the surveillance images, and the quality level may relate to a compression of the surveillance images.
- the quality level can be influenced by the spatial resolution, grayscale resolution of the pixels, color step, grayscale or black-and-white representation, size of the image section.
- the security reporting network is designed to
- the surveillance image information is transmitted from the surveillance camera, via the first network, over the
- the transmission is performed such that first image data for displaying the monitoring event is loaded in a first display manner in the agent device.
- the first image data is thus sufficient to represent the monitoring event in the first display mode on the user equipment. It is suggested as an optional supplement that the
- Security network is formed that automatically and / or independently further monitoring image information is loaded to the monitoring event, so that second image data for displaying the monitoring event are loaded in a second display mode, the second image data more information content and / or a larger amount of data than the first image data ,
- the supplement is based on the consideration that the transmitting networks are often bandwidth-limited. In particular, in the case of long transmission paths, it is to be expected that at least one serial-arranged data transmission section has only a small bandwidth, so that those necessary for the display of the monitoring event
- Monitoring image information may not be arbitrarily large.
- the invention proposes that initially the first image data is loaded into the user device in order to display the monitoring event with a low information content and / or a small amount of data.
- This step can be implemented quickly so that the monitoring event can be displayed promptly on the user device.
- further monitoring image information is loaded so that second image data is present in the user equipment, the second image data allowing a second type of display providing more details about the image
- the second image data is independent or separate from the first image data.
- the first image data is independent or separate from the first image data.
- Image data to create the second image data in this way is
- the second image data has a larger number of monitoring images than the first
- Image data For Particularly preferably, it is provided that the first image data represent only one single image and the second image data show a video sequence, in particular a clip, ie a sequence of temporally successive image data.
- the single image can be displayed on the user device first and very quickly. While that
- the video sequence has a higher information content, but at the same time one larger amount of data.
- a single image in jpg compression with a size of 20 KB, for example, within a time of one second is transmitted as the first image data.
- a video sequence is transmitted, which represents, for example, 5 seconds before and after the event and which, for example, a size between 100 and
- the transmission - especially at low transmission bandwidth - the second image data is for example 5 to 30 minutes. Due to the progressive information structure of the security network is preferably achieved that the user at any time depending on the bandwidth of the interposed
- the second image data has a greater resolution and / or a smaller compression than the first image data.
- monitoring images can distinguish the image data in terms of the quality level, that is to say in particular with regard to the resolution and / or the strength of the compression. It is assumed that the accuracy of the image data and thus the quality level will decrease as a result of greater compression.
- the security reporting network can be configured such that further quality levels are loaded onto image data.
- the (n) th image data has more information content and / or a larger amount of data than the (n-1) th image data.
- the surveillance image information from the surveillance camera to the user device are successively loaded until they are there in the highest possible resolution.
- third image data to comprise the original data of the monitoring event of the surveillance camera.
- Embodiment can thus be provided that in a first type of display Still picture is shown; as soon as the transmission of the still image has ended, the further monitoring image information for the second type of display, in particular in the form of a video sequence, is automatically reloaded. As soon as the second image data is complete, the still image is automatically exchanged for the video sequence, so that the monitoring personnel or the user can operate a forward and reverse run around the monitoring event. As soon as the loading of the further monitoring image information for the second display mode has ended, further monitoring image information for the third display type is reloaded.
- the third type of display relates to the original data and therefore has the largest amount of data and the highest quality. Once the original data is loaded, the second type of display is automatically exchanged for the third type of display so that the surveillance personnel or the user can now operate in forward and reverse run at a high quality.
- the security network comprises the client device or a further client device.
- the client device is designed as a mobile phone, in particular as a smartphone.
- the mobile telephone comprises a screen on which image data can be displayed.
- the mobile phone is in particular connected via a public telephone network data technology or connectable.
- the client device includes at least one sensor for receiving environmental data.
- the sensor is designed in particular as a camera, in particular as a video camera, or as a microphone.
- the environment data are image data of the environment of the client device or recordings of acoustic signals in the environment of the client device.
- the client device comprises at least one input device for inputting commands.
- the input device can be designed as one or more mechanical or virtual control buttons, as a touch-sensitive screen or as a voice input device for inputting acoustic commands.
- the client device further comprises a control device, which is designed program-technically and / or circuit-wise, in response to an input of at least one start command as one of the commands to record environmental data from an event situation - event situation - with the sensor to record or continue recording and the environment data in to submit the security reporting network.
- the control device thus interprets the start command as a trigger for recording or continuing the recording of the environment data from the event situation.
- software in particular an app, is installed on the client device, which converts the said functions and the following functions programmatically.
- the event situation is, in particular, an ambient state that makes a message to the security reporting network meaningful.
- the event situation may be, for example, the detection of strangers in a surveillance area or the outbreak of a fire.
- the start command is designed as a quick start command, wherein after entering the quick start command, a mobile event message is sent to the security reporting network.
- the environmental data of the event situation are recorded or further recorded and transmitted simultaneously or with a short time offset less than 5 seconds, preferably less than 3 seconds and in particular less than 1 second in the security network.
- the environmental data of the event situation are transmitted to the security reporting network together with the mobile event message.
- the three actions are carried out automatically or automatically, in particular in a time interval of less than 5 s, preferably less than 3 s and in particular less than 1 s:
- the mobile event message is defined as a message about the event situation.
- the mobile event message includes event data that characterize the event situation and may include any selection of the following data, such as time of the event situation (eg time / date), position of the event situation (eg GPS coordinates of the client device with an integrated GPS sensor), Sender of the event message (eg client device Y / phone number), type of event situation (eg burglary, fire, moving object, temperature increase).
- the detection of the event situation is not performed by an evaluation, but by the user of the client device.
- a mobile event message and, secondly, the current environment data of the event situation are recorded via the quick start command and at the same time or as quickly as possible transmitted to the security reporting network.
- the short time offset is largely due to technical considerations, since it is often necessary to buffer the environment data to transfer environmental data. It is also possible that the environment data is compressed to speed up the transmission, also from this approach results in a short time offset.
- the advantage of the development is that the user with the client device at the same time a mobile event message, e.g. as an emergency call, along with the
- Environment data of the event situation in the security network can transmit. It is not necessary for an evaluation device to automatically analyze the environmental data first. As a result, the mobile event message together with the surrounding data can be fed into the security reporting network more quickly, which is advantageous, for example, if the user subsequently comes into a distressed situation.
- the client device also makes it possible to issue the mobile event message with high process reliability without having to rely on an evaluation device correctly evaluating the environment data and recognizing the event situation. In particular, it is possible for the user of the
- Client device discovered an event situation based on human intuition, however, the evaluation device does not recognize these due to the evaluation algorithms. As a result of the immediate dispatch of the mobile event message together with the surrounding data, the security of the user in dangerous situations is possibly even increased.
- the quick start command is designed as a wipe command on a touch screen as the input device.
- the wipe command is defined such that it can not be caused by accidental contact.
- the wipe command is defined with at least one change of direction.
- a large L must be drawn on the screen or the wipe command even with two or three changes of direction, e.g. how to enter a U or a W
- the quick start command can be implemented as a "swype" input, with more than two, three, four or five positions having to be traversed on the touch-sensitive screen with one continuous movement, the positions of three consecutive points not being up lie on a common line.
- this design ensures that the quick start command can not be accidentally entered.
- the quick start command is entered by a separate, separate button (emergency call button).
- This embodiment has the advantage that the probability of incorrect entries is further reduced, but it is not possible in this embodiment to use commercially available mobile phones.
- the mobile event message is preferably similar in terms of data technology or even identical to the event message.
- the event message is defined as a message about an event, ie an event.
- the event processing module of the security control device is designed to process the incoming event messages and the incoming mobile event messages and - depending on a set of rules - to output an alarm message. It is a particular advantage of the embodiment that event messages and mobile event messages can be processed similarly by the security control device. With this architecture, it is thus possible to integrate the client device as a further monitoring device in terms of data technology analogous to the other monitoring devices in the security network.
- Another object of the invention relates to a method having the features of claim 13.
- Figure 1 is a schematic block diagram of a security network as an embodiment of the invention
- FIGS. 2a, b, c show a schematic flow diagram for explaining the
- FIGS. 3a, b, c show a schematic flowchart for illustrating the generation of the monitoring image information for the progressive information structure
- Figure 4 is an exemplary representation of an alarm message on a
- Figure 5 is a schematic block diagram of a security reporting network as a further embodiment of the invention.
- FIG. 6 is a schematic block diagram of a security network as a further embodiment of the invention. Identical or corresponding components, sizes, signals, etc. are each provided with the same or corresponding reference numerals in the figures.
- FIG. 1 shows a schematic block diagram of a security reporting network 1 as an exemplary embodiment of the invention.
- the security reporting network 1 comprises a plurality of local monitoring networks 2, which are installed in different monitoring objects 3.
- Each of the local monitoring networks 2 is designed as a local network and defines one or at least one local domain.
- the local monitoring network 2 is z. B. realized as a LAN or as a WLAN.
- Each of the network subscribers in the local monitoring network 2 has a local IP address.
- the local monitoring network 2 has an interface 4 to a first network 5, wherein before the interface 4, a router 6 is interposed.
- the local monitoring network 2 is an exclusively private network and the first network 5 is an Tier 3 or Tier 2 or Tier 1 network.
- Each of the local surveillance networks 2 comprises at least one surveillance camera 7, which is designed to monitor a surveillance area 8 in the surveillance object 3.
- the monitoring objects 3 are spatially independent of each other and can be positioned, for example, at a distance greater than 10 km, 20 km or greater than 50 km from each other. It may be monitoring objects 3 from different companies as the client. These are treated with different accounts or accounts in security reporting network 1. They may also be monitoring objects 3 of different types. Thus, it is possible that a monitoring object 3 is an airport, another monitoring object 3 is a railway station, another monitoring object 3 is a warehouse, etc. In the security reporting network 1 any monitoring objects 3 are added.
- the monitoring objects 3 are to be understood in particular as logical units.
- the surveillance cameras 7 each have a network interface 9, via which the surveillance cameras in the local surveillance network 2 can communicate.
- the surveillance cameras 7 are designed as intelligent surveillance cameras 7, which each comprise a data processing device 10 and a local memory device 11.
- the surveillance cameras 7 are designed to process the recorded surveillance images in the data processing device 10 by means of digital image processing and to store surveillance images in the local memory device 11.
- the surveillance cameras 7 comprise a set of rules 12 with alarm rules, so that the surveillance cameras 7, after analysis of the surveillance images by the data processing device 10, can deliver an event message E to the local surveillance network 2.
- the first network 5 is based on the Internet protocol and may be designed as a public Internet in a first alternative embodiment.
- the first network 5 is designed as a private IP network, wherein all interfaces 4 of the first network 5 are assigned exclusively to the private IP network and the private IP network is in particular separated from the public Internet by data technology.
- the first network 5 may also be configured as a local area network (LAN) or as a wide area network (WAN).
- LAN local area network
- WAN wide area network
- the first network 5 implements a secure TCP connection.
- the security reporting network 1 comprises an in particular central or global security control device 13, which is e.g. is designed as a server or as a server farm.
- the safety control device 13 is connected via one of the interfaces 4 to the first network 5 and thus to the local monitoring networks 2 of the different monitoring objects 3.
- the safety control device 13 comprises a management module 14, an event processing module 15, a database for event and sensor data 16, an archive 17 for surveillance images of the surveillance camera 7 and an infrastructure management module 26 for the registration of the monitoring devices, in particular the surveillance cameras 7.
- the management module 14 is designed to manage different clients with different monitoring objects 3.
- the principals are, in particular, companies that are economically or legally independent and that use the security reporting network 1 to monitor their surveillance objects 3.
- the monitoring objects 3 to be monitored and the configuration data of the local monitoring networks 2 of the monitoring objects 3 are thus stored in the management module 14 for each client.
- data for monitoring the monitored objects 3 are stored, such as alarm and notification rules, contact persons, contact person details, such as e-mail, telephone number, address, etc.
- the management module 14 allows any monitoring objects 3 of new or existing clients flexible in the Security network 1 to integrate.
- the safety control device 13 further comprises the event processing module 15, which processes and evaluates the event messages E of the surveillance cameras 7 or the subsequently described mobile event messages MUE according to a set of rules.
- the event processing module 15 accesses the alarm rules in the management module 14, in which they are defined individually and / or on a per-client basis for each surveillance object 3.
- the alarm rules include, for example, an arming schedule for monitoring, logical linking of events, execution of multiple actions, etc.
- the event processing module 15 outputs a processed event message as alarm message A as a result of the processing.
- the safety control device 13 includes the database 16 for storage and logging of all events and sensor data.
- the security control device 13 the archive 17 for original surveillance images, but for reasons of memory not all surveillance images, but only surveillance images, which are associated with an event, are stored in the archive 17.
- the safety control device 13 is connected via a second network 18 with one or more agent devices 19 via an output interface 20 data technology.
- the second network 18 may correspond to the first network 5.
- the second network 18 it is possible for the second network 18 to be embodied as an intranet or as another variant of the first network 5. However, it can also be designed as a private IP network.
- the agent devices 19 in their entirety form a control center 21 or a monitoring center.
- a plurality of such agent devices 19 are usually arranged so that the control center 21 can be scaled as a function of the number and the size of the monitoring objects 3.
- the agent devices 19 are designed in particular as workstations for monitoring personnel 22.
- the agent devices 19 receive the event message E or the event message E 'processed via the event processing module 15 or the alarm message A, the messages E, ⁇ ', A being displayed on the agent devices 19 so that they are transmitted by the monitoring personnel 22 can be edited.
- the agent devices 19 are designed to implement different procedures in the processing by the monitoring personnel 22.
- the supervisor 22 cancels the message E, ⁇ ', A if it is judged by the supervisor 22 to be a false alarm. Furthermore, it is possible that the message E, ⁇ ', A is verified as an alarm, wherein after the alarm verification by the monitoring personnel 22, an external alarm is triggered either via the control center 21 or the safety control device 13. Thirdly, it is possible that the agent devices 19 make it possible to request or automatically reload further information from the surveillance cameras 7 to the message E, ⁇ ', A.
- the safety control device 13 has another
- Output interface 23 which is connected to a third network 24 is.
- the third network 24 may be similar in nature to the first network 5 and the second network 18, but may in particular also be a telephone connection or a wireless connection.
- client devices 25 Via the third network 24, a plurality of client devices 25 can be reached, which are designed, for example, as mobile phones / smart phones (in general mobile terminal).
- the agent device 19 receives in addition to the event message E, E 'or the alarm message A monitoring image information to the monitoring event. This results in a field of tension, since on the one hand the
- Monitoring image information should be transmitted as quickly as possible, so that an event message / alarm message can be processed by the agent devices 19 as soon as possible.
- the monitoring image information should be as accurate as possible so that the evaluation by the monitoring personnel 22 on the agent device 19 is as precise as possible.
- a progressive information transmission of monitoring image information from the surveillance camera 7 to the agent device 19 or - with the same motivation - to the client devices 25 is selected.
- FIGS. 2 a, b, c show in a schematic way the transmission of the
- monitoring image information It can be seen in FIG. 2a that, starting from the surveillance camera 7, monitoring image information in a first quality level Q1 is transmitted to the security control device 13 via the first network 5. From there, the monitoring image information Q1 is optionally forwarded to the agent devices 19 or to the client devices 25, specifically via the second network 18 or the third network 24.
- the monitoring image information of the first quality level Q1 comprises first image data which is used to display the monitoring event in a first
- the first type of display is a still image display and the first image data is a single image, eg in a jpg format, of the surveillance event.
- a jpeg file has a file size of 30 to 50 kB and can be transmitted quickly even with low network bandwidths. It is thus possible for the monitoring event in the first display mode to be displayed already after a period of less than 5 seconds, for example within one second, from the initiation of the monitoring event in the first display mode.
- Figure 4 is a diagrammatic representation of the screen 27 of a monitor of one of the agent devices 19.
- the screen 27 shows an alarm message A, with data in the upper area relating to the alarm message A, e.g. the date, the time, the address of the alarm-triggering device, are shown.
- data in the upper area relating to the alarm message A e.g. the date, the time, the address of the alarm-triggering device.
- Monitoring image information of the first quality level Q1 is displayed on the left side as a still image as the first display type.
- a low resolution / high compression video sequence is already present in the background as further monitoring image information in a second quality level Q2 User device 19 or the client device 25 transmitted.
- the further monitoring image information allows the representation of the monitoring event as a video sequence or a clip, for example providing a range of +/- 5 seconds around the actual monitoring event.
- the still image is exchanged for the video sequence as the second display mode, so that the monitoring personnel 22 from that moment on, to analyze the monitoring scene at the monitoring event time point more accurately.
- the video sequence has a file size of a few 100 KB, so that the image data for the second display mode are available even with low transmission bandwidths within a few minutes, in particular less than 5 minutes.
- the image data for the second display mode are available even with low transmission bandwidths within a few minutes, in particular less than 5 minutes.
- Monitoring image information Q3 downloaded in a third quality level, which corresponds to the original data of the monitoring event.
- the transmission of the monitoring image information Q3 of the third quality level may take more than a few minutes due to the large amount of data, for example, more than 5 MB, so that they are available only after some time.
- the monitoring image information Q3 in the third quality level can, for example, be archived or used for proof in a legal proceeding.
- FIGS. 3 a, b, c illustrate the generation of the monitoring image information in the different quality levels Q1, Q2, Q3 in a schematic representation.
- the surveillance camera 7 is shown, which initially records the surveillance images in a raw data format R.
- the image data can be coded with minimal or no loss of quality.
- the coding is carried out according to the standard mpeg4 and / or H.264.
- monitoring image information Q1, Q2, Q3 are created.
- the surveillance camera 7 forms a transcoder device.
- the security reporting network 1 has a device for determining or estimating the available or usable data transmission rates between the surveillance camera 7 and the agent device 19 or client device 25 as user devices. For example, the device can estimate the available or usable data transmission rate based on a fill level of an output buffer of the surveillance camera 7. If the output buffer has a high level, it is assumed that the data transfer rate is low because the level can not be reduced. If, on the other hand, the level is low, this indicates a high data transmission rate, since the output buffer can be emptied faster than can be filled with new data.
- the security reporting network 1 and in particular the surveillance camera 7 are designed to select a quality level or to adjust the quality levels as a function of the available or usable data transmission rate.
- FIG. 5 shows a schematic representation of the security reporting network 1 and its processes during the processing of a monitoring event.
- FIG. 5 illustrates one possible embodiment of the security reporting network 1.
- an event message E is sent from the associated local surveillance network 2 to the security control device 13, as already explained in connection with FIG.
- the event message E is processed by the event processing module 15, which sends an alarm message A to the control center 21, in particular to one of the agent devices 19, depending on the rules.
- the alarm message A is processed by the monitoring personnel 22 in a particular predetermined or stored workflow.
- a verification request V by a request module 33 of the agent device 19 is triggered.
- This verification request V runs again via the security control device 13 and is transmitted from there together with an alarm message 28 to one of the client devices 25.
- the first and third networks 5, 24 are formed as a LAN / WAN. The transmission of both the event message E, as well as the verification request V and the alarm message 28 via secure TCP connections.
- the alarm message 28 or the verification request V are designed as a so-called push notification.
- the push notifications are messages that are displayed or reported on the client device 25 directly and without user interaction.
- the alarm message 28 and / or the verification request V include continuing
- the time of the event is transmitted to the surveillance camera 7, time of acceptance of the alarm message A in the control center 21, the triggering device, the monitoring object 3, a video image or a video sequence and / or an audio.
- a typical area of application for one of the verification requests V is when a person has been spotted in the surveillance object 3 but the surveillance staff 22 can not clearly determine whether it is an intruder or a known person.
- the supervisor 22 may receive further instructions from a user of the
- the verification request V provides a selection of multiple verification responses VA.
- the verification responses VA are optionally formed as part of the verification request V or on the
- Client device 25 is provided.
- a corresponding software or app is installed on the client device 25, in particular as a mobile telephone.
- 25 different choices are displayed on the client device by means of software buttons.
- User 29 of client device 25 selects a response from the choices, e.g. False alarm or alarm case, etc.
- the selected verification response VA is sent via the same signal path back to the security control device 13 and / or the control center 21, in particular the triggering agent device 19.
- Safety control device 13 or the agent device 19 evaluates the alarm message A according to the verification response of the user 29.
- a confirmation dialog to be displayed on the client device 25, such as:
- the verification response VA of the user 29 is sent to the agent device 19 and thus to the monitoring personnel 22.
- the verification request V expires and the supervisor 22 must assess or reset the alarm in a conventional manner.
- FIG. 6 shows the security reporting network 1 in a variant as a further exemplary embodiment.
- the security reporting network 1 in FIG. 6 has the security control device 13, at least one local surveillance network 2, the control center 21 and at least one client device 25.
- the different components of the security reporting network 1 are data-technologically connected via a LAN / WAN as the first, the second and the third network 5, 18, 24.
- the LAN / WAN in Figure 6 or in the previous figures may also be designed as the public Internet.
- FIG. 6 serves to illustrate the functionality of a mobile user event of the client device 25.
- the client device 25 is designed as a mobile telephone and - at least in a serial intermediate section when connected to the LAN / WAN 5, 18, 24 - over the mobile network data technically connected to the security network 1.
- the client device 25 comprises at least one sensor 30, which is designed as a connected or integrated camera, in particular a video camera. With the sensor 30, it is possible to record environmental data D in the form of monitoring image information or image data from the environment of the client device 25. Furthermore, the client device 25 comprises an input device 31, which allows commands to be input to the client device 25. In this embodiment, the input device 31 is formed as a touch-sensitive screen. In addition, the client device 25 has a control device 32, which implements that, in response to an input from a quick start command into the input device 31, environmental data D is recorded with the sensor 30 or a recording is continued. The environment data D together with a mobile event message MUE in the
- Security reporting network 1 transmitted and continued in the safety control device 13 for further processing.
- the functionality of the mobile user event allows the user 29 via the quick start command as a command combination both the recording of
- Environment data D and the sending of the mobile event message MUE and the transmission of the environment data D to start are performed in a narrow time interval of less than 5 seconds or less than 2 seconds.
- the recording of the environment data is continued immediately and the event message immediately discontinued.
- the transmission of the environmental data D takes place immediately, in particular only with a time offset that is technically conditioned.
- a possible application of the mobile user event functionality is the entrainment of the client device 25 by a mobile surveillance personnel (not shown).
- the client device 25 is activated by the quick start command and on the one hand, the mobile event message MUE and on the other hand, the environment data D feeds into the security network. These data are forwarded to the safety control device 13 and optionally to the control center 21.
- the mobile event messages MUE are further processed in the same way as the event messages E. This extends the
- Client device 25 the security network 1 to a mobile monitoring device, which fits seamlessly into the software architecture.
- the quick start command can be designed, for example, as a wipe command on the input device 31 designed as a touch-sensitive screen.
- a verification request V is sent to the same or another client device 25 in order to achieve on-site verification.
- FIG. 1 For a description of the verification request, reference is made to FIG.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Multimedia (AREA)
- Human Computer Interaction (AREA)
- Computer Security & Cryptography (AREA)
- Alarm Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102012217127.4A DE102012217127A1 (de) | 2012-09-24 | 2012-09-24 | Sicherheitsmeldenetzwerk sowie Verfahren zum Betrieb des Sicherheitsmeldenetzwerks |
PCT/EP2013/069630 WO2014044825A2 (de) | 2012-09-24 | 2013-09-20 | Sicherheitsmeldenetzwerk sowie verfahren zum betrieb des sicherheitsmeldenetzwerks |
Publications (1)
Publication Number | Publication Date |
---|---|
EP2898487A2 true EP2898487A2 (de) | 2015-07-29 |
Family
ID=49230757
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP13766045.2A Ceased EP2898487A2 (de) | 2012-09-24 | 2013-09-20 | Sicherheitsmeldenetzwerk sowie verfahren zum betrieb des sicherheitsmeldenetzwerks |
Country Status (5)
Country | Link |
---|---|
US (1) | US20150287302A1 (de) |
EP (1) | EP2898487A2 (de) |
CN (1) | CN105103204B (de) |
DE (1) | DE102012217127A1 (de) |
WO (1) | WO2014044825A2 (de) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IN2015CH04425A (de) * | 2015-08-24 | 2015-09-04 | Wipro Ltd | |
DE102016113591A1 (de) * | 2016-07-22 | 2018-01-25 | Hubertus Platt | Verfahren zur Übertragung von Notfallinformationen |
DE112016007460A5 (de) | 2016-11-21 | 2019-08-14 | Robert Bosch Gmbh | Anzeigevorrichtung für eine überwachungsanlage eines überwachungsbereiches und überwachungsanlage mit der anzeigevorrichtung |
WO2018091112A1 (de) * | 2016-11-21 | 2018-05-24 | Robert Bosch Gmbh | Überwachungsvorrichtung zur überwachung eines überwachungsbereichs und überwachungsmodul für die überwachungsvorrichtung |
US20190347915A1 (en) * | 2018-05-11 | 2019-11-14 | Ching-Ming Lai | Large-scale Video Monitoring and Recording System |
US11176383B2 (en) * | 2018-06-15 | 2021-11-16 | American International Group, Inc. | Hazard detection through computer vision |
US11799736B2 (en) * | 2019-12-27 | 2023-10-24 | Digital Guardian Llc | Systems and methods for investigating potential incidents across entities in networked environments |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080284580A1 (en) * | 2007-05-16 | 2008-11-20 | Honeywell International, Inc. | Video alarm verification |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8520068B2 (en) * | 1999-07-20 | 2013-08-27 | Comcast Cable Communications, Llc | Video security system |
CN1163855C (zh) * | 1999-12-28 | 2004-08-25 | 时军 | 城市安全信息监控报警服务系统 |
CN2802874Y (zh) * | 2005-07-11 | 2006-08-02 | 北京讯飞信息技术有限公司 | 一种传感器网络视频监控系统 |
US7956735B2 (en) * | 2006-05-15 | 2011-06-07 | Cernium Corporation | Automated, remotely-verified alarm system with intrusion and video surveillance and digital video recording |
DE102007053812A1 (de) | 2007-11-12 | 2009-05-14 | Robert Bosch Gmbh | Konfigurationsmodul für ein Videoüberwachungssystem, Überwachungssystem mit dem Konfigurationsmodul, Verfahren zur Konfiguration eines Videoüberwachungssystems sowie Computerprogramm |
DE102007054819A1 (de) | 2007-11-16 | 2009-05-20 | Robert Bosch Gmbh | Überwachungssystem mit Zustandserfassungsmodul, Verfahren zur Selbstüberwachung eines Beobachters sowie Computerprogramm |
US8937658B2 (en) * | 2009-10-15 | 2015-01-20 | At&T Intellectual Property I, L.P. | Methods, systems, and products for security services |
CN201601789U (zh) * | 2010-01-15 | 2010-10-06 | 上海市浦东新区保安服务总公司 | 一种联动报警视频监控综合信息集中管理系统 |
CN102457710B (zh) * | 2010-10-25 | 2013-10-30 | 深圳中兴力维技术有限公司 | 一种3g无线视频监控系统及其视频监控方法 |
US8494481B1 (en) * | 2011-11-02 | 2013-07-23 | Amazon Technologies, Inc. | Mobile alarm device |
-
2012
- 2012-09-24 DE DE102012217127.4A patent/DE102012217127A1/de not_active Withdrawn
-
2013
- 2013-09-20 CN CN201380059993.3A patent/CN105103204B/zh active Active
- 2013-09-20 US US14/430,394 patent/US20150287302A1/en not_active Abandoned
- 2013-09-20 EP EP13766045.2A patent/EP2898487A2/de not_active Ceased
- 2013-09-20 WO PCT/EP2013/069630 patent/WO2014044825A2/de active Application Filing
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080284580A1 (en) * | 2007-05-16 | 2008-11-20 | Honeywell International, Inc. | Video alarm verification |
Non-Patent Citations (1)
Title |
---|
See also references of WO2014044825A2 * |
Also Published As
Publication number | Publication date |
---|---|
DE102012217127A1 (de) | 2014-03-27 |
WO2014044825A2 (de) | 2014-03-27 |
CN105103204A (zh) | 2015-11-25 |
WO2014044825A3 (de) | 2014-05-15 |
US20150287302A1 (en) | 2015-10-08 |
CN105103204B (zh) | 2019-03-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2014044825A2 (de) | Sicherheitsmeldenetzwerk sowie verfahren zum betrieb des sicherheitsmeldenetzwerks | |
DE112016006300T5 (de) | Vorrichtung zur Überwachung unbeaufsichtigter Objekte, mit derselben ausgestattetes System zur Überwachung unbeaufsichtigter Objekte und Verfahren zur Überwachung unbeaufsichtigter Objekte | |
DE112016006894T5 (de) | Überwachungskamera in einem Netzwerk zur Verbesserung der situationsabhängigen Erkenntnisse eines Benutzers | |
CH712948A2 (de) | Verfahren zur Überwachung von Personen mittels einem Audioüberwachungssystem. | |
DE202016009203U1 (de) | Anordnung zur Optimierung des Informationsaustausches bei Notrufen | |
EP3830807A1 (de) | Computerimplementiertes verfahren, softwareprogramm und vorrichtung zur aufforderung einer bildung einer einsatzgasse | |
WO2014090819A2 (de) | Überwachungsanlage für einen überwachungsbereich, verfahren sowie computerprogramm | |
EP3697711A1 (de) | Verfahren zur überwachung einer aufzugskabine | |
EP2269178A1 (de) | Verfahren zum melden einer notfallsituation per mobile datenkommunikation an eine datenbank | |
EP3304509A1 (de) | Verfahren, vorrichtung und system zur übermittlung und differenzierung von verfassungszuständen beim auslösen eines alarms | |
EP3732850B1 (de) | Echtzeit-kollaborations-plattform und verfahren zum ausgeben von mediaströmen über ein echtzeit-ansagesystem | |
EP2898486B1 (de) | Sicherheitsmeldenetzwerk mit alarmbenachrichtigungs- und alarmverifizierungsfunktion sowie verfahren | |
DE102014105937B4 (de) | Überwachungssystem und Überwachungsverfahren | |
DE102015222458A1 (de) | Verfahren, Einrichtung und System zur Überwachung eines Fahrzeugs und Fahrzeug | |
DE202018003909U1 (de) | Anordnung für IP basierte Rettungsprozesse bei Notrufen | |
DE102015225042B4 (de) | Anwenderendgerät, Fortbewegungsmittel und Verfahren zur Durchführung einer Videoübertragung mittels einer Drahtloskommunikationsverbindung | |
EP4179456A1 (de) | System zur überwachung des betriebs eines schiffs | |
DE102008050119A1 (de) | Brandmeldeanlage | |
DE102012217129A1 (de) | Sicherheitsmeldenetzwerk mit progressivem Informationsaufbau sowie Verfahren | |
EP1762994B1 (de) | Intelligente Überwachungskamera | |
DE202011110315U1 (de) | System zur Aufnahme, Auswertung, Speicherung, Aufbereitung, Übertragung und/oder Darstellung von Vitalfunktionswerten | |
DE102012217145A1 (de) | Sicherheitsmeldenetzwerk mit Voralarmanfragemodul sowie Verfahren | |
AT516051B1 (de) | Überwachungseinrichtung mit einer Bildauswerteeinrichtung für Kameras in einem Switch | |
WO2018015550A2 (de) | Verfahren zur übertragung von notfallinformationen | |
DE19858555A1 (de) | Verfahren und Leitzentrale zur Videofernüberwachung von insbesondere Wohnungen und Büros |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 20150424 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20170925 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
APBK | Appeal reference recorded |
Free format text: ORIGINAL CODE: EPIDOSNREFNE |
|
APBN | Date of receipt of notice of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA2E |
|
APBR | Date of receipt of statement of grounds of appeal recorded |
Free format text: ORIGINAL CODE: EPIDOSNNOA3E |
|
APAK | Date of receipt of statement of grounds of an appeal modified |
Free format text: ORIGINAL CODE: EPIDOSCNOA3E |
|
APAF | Appeal reference modified |
Free format text: ORIGINAL CODE: EPIDOSCREFNE |
|
RAP1 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ROBERT BOSCH GMBH |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R003 |
|
APBT | Appeal procedure closed |
Free format text: ORIGINAL CODE: EPIDOSNNOA9E |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN REFUSED |
|
18R | Application refused |
Effective date: 20230126 |