EP4092643B1 - A security monitoring system - Google Patents
A security monitoring system Download PDFInfo
- Publication number
- EP4092643B1 EP4092643B1 EP21174825.6A EP21174825A EP4092643B1 EP 4092643 B1 EP4092643 B1 EP 4092643B1 EP 21174825 A EP21174825 A EP 21174825A EP 4092643 B1 EP4092643 B1 EP 4092643B1
- Authority
- EP
- European Patent Office
- Prior art keywords
- token
- video camera
- response
- system controller
- security monitoring
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012544 monitoring process Methods 0.000 title claims description 93
- 230000033001 locomotion Effects 0.000 claims description 72
- 230000004044 response Effects 0.000 claims description 64
- 230000004913 activation Effects 0.000 claims description 31
- 238000000034 method Methods 0.000 claims description 30
- 238000009434 installation Methods 0.000 claims description 18
- 238000001514 detection method Methods 0.000 claims description 13
- 238000004891 communication Methods 0.000 claims description 12
- 230000005540 biological transmission Effects 0.000 description 30
- 230000008569 process Effects 0.000 description 14
- 230000015654 memory Effects 0.000 description 10
- 238000010586 diagram Methods 0.000 description 7
- 230000009471 action Effects 0.000 description 5
- 238000013459 approach Methods 0.000 description 4
- 230000001960 triggered effect Effects 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 239000011521 glass Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012552 review Methods 0.000 description 2
- 230000035945 sensitivity Effects 0.000 description 2
- 208000032953 Device battery issue Diseases 0.000 description 1
- 241000269400 Sirenidae Species 0.000 description 1
- 230000003213 activating effect Effects 0.000 description 1
- 238000007792 addition Methods 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000009849 deactivation Effects 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 238000005265 energy consumption Methods 0.000 description 1
- 238000005562 fading Methods 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000000284 resting effect Effects 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 230000002618 waking effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19697—Arrangements wherein non-video detectors generate an alarm themselves
Definitions
- the present invention relates to a security monitoring system for monitoring premises, a video camera for use with such a system and methods of configuring and operating such a monitoring system.
- Security monitoring systems for monitoring premises typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events.
- Such systems include sensors to detect the opening and closing of doors and windows, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones.
- Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected.
- Such installations typically include a control unit (which may also be termed a central unit), generally mains powered, that is coupled to the sensors, detectors, cameras, etc.
- nodes and which processes received notifications and determines a response.
- the central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit.
- the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered.
- a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a Central Monitoring Station (CMS) where, typically, human operators manage the responses required by different alarm and notification types.
- CMS Central Monitoring Station
- the central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system and the nature of the detected events.
- the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station.
- the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.
- While security monitoring systems are normally developed to protect premises, such as houses or apartments, some installations include one or more cameras, typically video cameras, arranged to monitor external spaces such as terraces, gardens and forecourts.
- the (video) camera is associated with one or more movement sensors, the camera and the movement sensor(s) being arranged to cover a common surveillance area.
- movement within the monitored surveillance area triggers the movement sensor, turning on the camera and alerting the central unit which in turn may signal an alarm condition to a central monitoring station.
- Embodiments of the invention provide potential solutions to the problems, in systems with external surveillance areas, of false alarms being triggered by authorised persons.
- a security monitoring system including: a system controller; a video camera, coupled to a motion sensor, arranged to monitor a surveillance area; a portable token storing a token ID; the video camera being configured on receipt of a motion detection signal from the motion sensor to send an alert to the system controller; the system controller being configured in an armed state, on receipt of an alert from the video camera, to start an event timer and to send an instruction to the video camera to broadcast a token activation signal, the instruction including an event identifier;
- the video camera and motion sensor may be arranged to survey a surveillance area and the video camera configured to broadcast the token activation signal as a radio signal having an effective range that does not extend significantly beyond the surveillance area.
- the portable token includes a processor coupled to a token movement sensor, and the token is configured to respond to token activation signals only if the processor determines that the token is moving.
- the portable token includes a wake on radio receiver, and the video camera is configured to broadcast token activation signals as wake on radio signals to which the token is responsive.
- the portable token may be configured to include RSSI data in its response to the token activation signal from the video camera, and the system controller may be configured to use the RSSI data included in the token response in determining whether to trust the received response. Furthermore, the system controller may be configured to regard the token response as invalid if the RSSI data included in the token response suggest that the response has come from outside the usual range of radio signals from the camera.
- radio frequency transceivers of the portable token, the video camera and the system controller are configured to operate in the industrial, scientific and medical, ISM, radio bands.
- the video camera is configured, on instruction from the system controller to transmit video images captured by the video camera using Wi-Fi.
- the system controller is optionally configured, in an armed state, to disarm the security monitoring system if both comparisons provide a match.
- system controller may be configured in an armed state, if both comparisons provide a match, to disarm the security monitoring system only in respect of the monitoring of the surveillance area.
- the video camera for use in a security monitoring system according to any variant of the first aspect, the video camera including an image sensor, a radio frequency transmitter, a radio frequency receiver, and a processor operatively connected to the image sensor, the radio frequency transmitter and the radio frequency receiver, the processor being configured, on receipt of a motion trigger signal from a motion sensor to: transmit, using the radio frequency transmitter, a flag signal to the system controller of the security monitoring system; in response to receiving, via the radio frequency receiver, an instruction from the controller to cause the radio frequency transmitter to transmit a token activation signal.
- the token activation signal is a wake on radio signal.
- the motion sensor is part of the video camera.
- the video camera's radio frequency transmitter and radio frequency receiver are configured to operate within the industrial, scientific and medical, ISM, radio bands, such as the 868 MHz band.
- a video camera according to the second aspect may further comprise an RF transmitter configured to transmit Wi-Fi signals, and the video camera's processor may be configured, on instruction from the controller of a security installation to activate the RF transmitter to transmit via Wi-Fi video images captured by the video camera.
- a method of configuring a security monitoring system comprising: providing a system controller; a remote video camera coupled to a motion sensor; and a portable token storing a token ID;
- a method of operating a security monitoring system including: a system controller;
- FIG. 1 is an overview of a security monitoring system according to a first aspect of the invention.
- the Figure shows a rough plan view of a domestic dwelling 110, which may be a building such as a house or a secured space, such as an apartment, in a building and which is protected by a security monitoring system 100.
- the dwelling has a front door 120, in a doorway that is a main entrance giving access to the protected interior of the dwelling.
- the door 120 is fitted with a door sensor 130 to detect the opening of the door.
- the door sensor 130 is typically, but not necessarily, a magnetically triggered switch which is fitted to the opening side of the door, opposite to the hinge side. It will be appreciated that the door sensor is an example of a detector to detect the breaching of the entrance represented by the doorway.
- the breaching of an entrance may also be detected using a motion sensor such as a PIR sensor, a video camera or other image sensor, a floor-mounted pressure sensor, or some other contact or non-contact sensor, any of which may be used to detect the breaching of an entrance into a building, garden, farm, etc., and which may therefore generate an alarm trigger signal to indicate the breaching of a monitored entrance.
- a motion sensor such as a PIR sensor, a video camera or other image sensor, a floor-mounted pressure sensor, or some other contact or non-contact sensor, any of which may be used to detect the breaching of an entrance into a building, garden, farm, etc., and which may therefore generate an alarm trigger signal to indicate the breaching of a monitored entrance.
- the door sensor 130 includes an RF transmitter, not shown, that transmits an entry violation signal to a central unit 140 of the monitoring system 100 in the event that the door is opened.
- a disarm node 150 is mounted on a wall.
- the disarm node 150 has a user interface, including a touch screen or keypad to receive a user input to disarm the system, and a radio frequency transmitter, not shown, to transmit, in consequence of the user input, a disarm instruction to the control unit 140.
- a similar disarm node 160 is also mounted on a wall of the kitchen near to a back door 170 which also gives access to the protected interior of the dwelling.
- the dwelling is also provided with Windows, 180, and these are provided with one or more sensors to detect window opening, glass breakage, tampering or the like.
- the security installation 100 also includes an exterior monitoring camera, here a video camera, 50 with which is associated to transceiver 55 and a movement detector, such as a PIR detector 60.
- a movement detector such as a PIR detector 60.
- the movement detector 60 and the video camera 50 are mounted to survey a monitored area, in this case a back garden associated with the domestic dwelling hundred and 10. The back garden being accessible through a garden gate 70.
- the owner or occupier of the domestic dwelling 110 may, for example keep removable valuables, such as scooter 80, in the back garden, and the exterior monitoring camera can help protect such removable valuables.
- the exterior monitoring camera 50 is not secured to the structure of the domestic dwelling 110, but rather is mounted remotely so that it can better survey both the rear exterior of the property and also the back garden.
- the video camera 50 is activated in the event that the movement detector 60 detects movement, for example when the garden gate 70 is opened and someone enters the garden.
- the video camera 50 uses the transceiver 55 to communicate with the central unit 140.
- the central unit may be configured to enter an alarm state and, for example, communicate with a remote central monitoring station 190 wirelessly, or with a wired connection, for example via the Internet 195.
- the central unit 140 may instruct the video camera 50 to transmit images using the transceiver 55, and then forward the images to the central monitoring station for review. Upon review at the central monitoring station, you may be decided to dispatch security personnel and/or raise an alarm with the police.
- the present disclosure provides methods and apparatus to reduce the risk of such accidental triggering of alarm conditions.
- FIG. 2 illustrates schematically the major elements of a camera 50 (here a video camera) according to an aspect of the disclosure.
- the camera includes a camera module 200 that includes an image sensor and a lens.
- the camera module 200 is controlled by a processor 210, which includes RAM memory 215.
- Operatively coupled to the processor 210 is a further memory arrangement 220 for long term storage of program data and image data (although these may of course be stored in separate memories).
- the camera 50 is powered by a battery power supply 230.
- a photovoltaic arrangement 240 may be provided to provide supplementary power and to charge a rechargeable battery within the battery power supply.
- the processor 210 is also operatively coupled to the camera's RF transceiver 55.
- two transceivers 55' and 55" are provided, and at least one of these transceivers uses the industrial, scientific and medical (ISM) radio bands, and RF transceivers is configured to provide Wi-Fi functionality.
- the two transceivers may be identical, or one may support ISM while the other supports Wi-Fi.
- RF communication between the central unit and the nodes (including cameras 50), detectors and sensors of security monitoring systems according to embodiments of the invention use the industrial, scientific, and medical (ISM) radio bands, such as in Europe the 868MHz band. Within the 868 MHz band are several sub-bands dedicated to "non-specific SRD" which are of interest.
- a transceiver 55 preferably uses Wi-Fi to transmit the data provided there is sufficient battery charge and sufficient available bandwidth.
- Each of the transceivers has an associated antenna arrangement.
- Figure 2 also shows the motion sensor 60, which may be a PIR sensor, incorporated within the camera 50 and operatively coupled to the processor. Also shown are an optional microphone 250 and loudspeaker 260, both of which are operatively coupled to the processor 210. The loudspeaker may be used to provide feedback to an authorised user, as will be discussed later, and to enable communications from the central monitoring station 190 to be heard in the vicinity of the camera 50. Finally, the camera may include an indicator light 265, to provide optical feedback under the control of the processor 210. Of course, the camera may also be associated with an infrared or other light source, not shown, for use in illuminating the monitored area and effectively improving the quality of images obtained by the camera 50.
- the motion sensor 60 which may be a PIR sensor, incorporated within the camera 50 and operatively coupled to the processor.
- an optional microphone 250 and loudspeaker 260 both of which are operatively coupled to the processor 210.
- the loudspeaker may be used to provide feedback to an authorised user, as
- Figure 3 shows schematically shows the main components of various devices of the security monitoring system and that may be involved in arming and, more particularly, disarming the system, specifically the main elements of the central unit 140, and disarm node 150, and a key fob or token 370.
- the central unit 140 includes a processor 300 with an associated memory 310 which stores, among other things, identities for the key fobs that are registered to the system, identities for the door sensors and disarm nodes of the system together with an association between each disarm node and the door sensor for the access door closest to the relevant disarm node. These identities and associations are stored in a database 315 within the memory 310.
- the central unit includes at least one RF transceiver 320, with associated antenna 322, for communication with the various nodes and sensors of the monitoring system. Typically, there will be a second transceiver 330 as shown, also with an associated antenna 332, for communication with the central monitoring station 190, as a backup or alternative to a wired data connection to the Internet via a network interface 340.
- the antennas of the various transceivers will typically all be internal to the central unit.
- the processor 300 is connected to, and controls, the memory 310, transceivers 320, 330 and the network interface 335.
- the central unit generally draws power from the domestic power supply (generally referred to as a mains power supply) which feeds a power supply 336 within or associated with the central unit.
- the central unit also includes a backup battery power supply which automatically becomes operational in the event that the external power supply fails.
- the internal battery power supply is based on rechargeable cells 337 that are kept continuously topped up by the power supply 350.
- the central unit may also include a user interface 325, including a display 326, a keypad or keyboard 327, a loudspeaker 328, and a microphone 329.
- the keypad or keyboard may be a provided by making the display a touch-sensitive display, or as a unit distinct from the display.
- the central unit may be arranged to accept through the keypad or keyboard a code or codes to arm and disarm the system.
- the central unit may also include a near field communication (NFC) antenna and a corresponding NFC chip or equivalent circuitry which can be used, for example, to detect the presence of a "disarm dongle" provided to the user of the system and which can communicate with the central unit using Near Field Communication.
- NFC near field communication
- the key fobs may also be provided with an NFC antenna and chip or equivalent circuitry, so that they can be used as "disarm dongles" with the central unit and with NFC-enabled disarm nodes.
- the disarm node 150 includes a processor 350 with an associated memory 351 that stores an ID of the disarm node.
- the disarm node also includes a user interface 352 comprising indicators, e.g. LEDs, 353, a keypad, 354, and optionally a display 355 which may be present instead of or in addition to the LED indicators.
- a transceiver 360 with an associated antenna 361 (which will typically be internal, rather than external as illustrated), is controlled by the processor 350, and is used for communicating with the central unit 140 and the key fob 370.
- the transceiver 360 will typically be configured to operate in the 868MHz ISM bands (or equivalent available ISM bands in countries outside Europe).
- the disarm node includes a battery power supply 362, and in general this will be the only power supply as typically it is preferred not to have to connect disarm nodes to the mains power supply.
- a loudspeaker 363 is provided so that audible messages and instructions can be given to a user at the disarm node. These audible messages and instructions may be automated ones, generated by the central unit or by the disarm node itself, but additionally the loudspeaker 363 can be used to relay messages from a central monitoring station 190.
- the disarm node may also store audio files for these messages and instructions on its internal memory, to avoid problems caused by use of a low-bandwidth channel (e.g., an 868MHz RF channel) between the central unit and the disarm node.
- a low-bandwidth channel e.g., an 868MHz RF channel
- a disarm node storing such audio files may then receive instructions from the central unit to play out particular messages, and do so using the stored audio files.
- the loudspeaker may be used to provide a disarm success or failure message.
- the disarm node may also store audio files for these messages and instructions on its internal memory, to avoid problems caused by the use of a low-bandwidth channel (e.g. an 868MHz RF channel) between the central unit and the disarm node.
- a disarm node storing such audio files may then receive instructions from the central unit to play out particular messages and do so using the stored audio files.
- the disarm node also includes a microphone 364 to permit a user at the disarm node to hold a conversation with a human operative in, for example, a central monitoring station 190, or even with the emergency services - for example if patched through by the central monitoring station.
- the disarm node may not include a microphone but a co-located external microphone provided to enable a user to speak to operatives in the Central Monitoring Station or the emergency services.
- the disarm node 150 is secured to the building protected by the security monitoring system, for example attached to an internal wall at a height convenient for user operation - for example fixed at a height between 1 metre and 1.5 metres from the floor.
- the system is arranged to permit the system to be armed and disarmed from a disarm node.
- the disarm node also includes a Near Field Communication antenna and chip 365 to enable a disarm dongle, such as an NFC-enabled fob, to be used to disarm or arm the system by bringing the dongle within a few centimetres of the disarm node - e.g., by bringing the fob into contact with the disarm node.
- the disarm node may also be configured to encrypt its radio transmissions, and to decrypt received signals, so that secure communications with the central unit are possible.
- the encryption may be based on a secret shared between the central unit 140 and the disarm node 150.
- the key fob 370 includes a processor 375, with an associated memory 376 that stores an identifier for the fob, a transceiver 377, and a battery 378 that provides power to the processor and the transceiver.
- Transceiver 377 is typically a conventional polling transceiver designed for low power consumption. Such a polling transceiver, when in a resting state, periodically powers just the front end of its receiver circuit to listen for polling signals. If a polling signal is detected, possibly subject to some power level minimum, the rest of the receiver circuit is energised to receive transmissions. Such a polling transceiver may listen for no more than about 100 - 125 ms each second, unless polling signals are detected.
- the transceiver of whatever kind, is controlled by the processor and enables radio communication with the central unit 140, the disarm node 150 and the transceiver 55 of camera 50.
- the key fob also includes a motion sensor 379, such as an accelerometer, which is used to determine whether the key fob is being carried by someone or whether it is stationary. E.g. whether it has been deposited inside the house. may also include one or more buttons 380 which a user can use to issue commands or responses.
- the key fob may also include one or more visual indicators 385, for example one or more LEDs, to indicate a status, to confirm a button press, or the like.
- a single multi-coloured indicator such as an LED, may be used to provide multiple different indications while keeping component count low and enabling the key fob dimensions to be made compact.
- the key fob may also include one or both of a loudspeaker and a haptic transducer 390 for providing user feedback.
- the key fob is preferably configured to encrypt its radio transmissions, and to decrypt received signals, so that secure communications with the central unit are possible.
- the encryption may be based on a secret shared between the central unit and the key fob.
- Figure 4 is a simplified schematic sequence diagram illustrating a method according to an aspect of the invention. In particular, it illustrates in a simplified way how a security monitoring system according to an aspect of the invention responds when an authorised person (someone carrying a registered key fob 370) enters a zone monitored by external security monitoring camera 50.
- a security monitoring system e.g. house
- the occupant opens the garden gate 70 and enters the area monitored by the security monitoring camera 50.
- the opening of the garden gate 70 triggers, 400, the motion detector 60 associated with the camera 50, causing a motion trigger signal to be supplied to the processor 210 of the camera.
- the processor 210 then activates one of the transceivers 55 to transmit, 410, a motion trigger signal to the central unit 140.
- the central unit 140 starts, 420, an outdoor entry timer.
- the central unit 140 also transmits, 430, a start wake on radio instruction to the camera 50.
- the camera 50 uses one of its transceivers 55 to transmit, 440, a low power out of band wake up signal whose strength is sufficient to wake up any key fob 370 that is within the monitored area.
- the occupant is carrying a key fob 370, her key fob wakes up and transmits, 450, a signal including the fob ID (which can be considered to be the start of a Login cycle).
- the signal from the key fob is received by the central unit 140, and if the fob ID is registered with the central unit 140, the central unit pauses, 460, the outdoor entry timer.
- the outdoor entry timer may be paused for (in effect extended by) a configurable period chosen to be long enough to accommodate the usual coming and going of an occupier. For example, if the occupier keeps a bicycle in the back garden, the paused period should be long enough to enable the occupier to unlock her bicycle, stow the lock, don her helmet, and leave the garden shutting the gate behind her. This period might be of the order of one or two minutes. Meanwhile, the security monitoring system remains armed - so that opening a door or window, for example, will trigger the usual armed away response from the central unit. After the expiry of the paused period, the central unit may revert to its usual armed state, so that subsequently detected motion in the monitored area will again cause the central unit to start an outdoor entry timer.
- the central unit 140 may be configured to disarm the security monitoring system at step 460 - so that, for example, if the fob-carrying occupier were to enter the house from the back garden through the back door 170, the monitoring system would not generate an alarm. If this behaviour is programmed into the central unit 140 then it is preferred for the relevant disarm node, here 160, to respond to the detection by the sensor 130 of the opening of the back door 170 by providing some kind of audible or visual indication signifying that the security monitoring system was disarmed as the result of the occupier's presence in the back garden having been detected by virtue of their registered fob.
- the disarm node could voice a welcome back message confirming that "the monitoring system was armed but that it had been disarmed when we recognised you in the back garden".
- a further option would be to configure the central unit to re-arm the system (to its previous armed state) in the event that no entry is attempted to the house within a certain period after the disarming of the system, and no motion has been detected in the monitored area for a certain time. In this way, if the occupier had just entered the back garden to take her bicycle or scooter and then left, the premises would once again by protected by the security monitoring system.
- the security monitoring installation may include plural external cameras 50, each with its own respective monitored area, and the central unit can be configured to disarm the monitoring system, or suspend the outdoor entry timer, only in respect of the monitored area within which a key fob 370 has responded to a wake on radio wake up signal. If the system is configured to disarm just in respect of the relevant monitored area, it may be configured to re-arm the monitoring system in respect of the previously disarmed monitored area following a period of no motion triggers being received from the relevant camera 50.
- Figure 5 is a sequence diagram showing, by way of contrast, what happens when an unauthorised intruder enters the area monitored by security monitoring camera 50.
- the intruder triggers the motion detector 60 associated with the camera 50, causing a motion trigger signal to be supplied, 500, to the processor 210 of the camera.
- the processor then activates one of the transceivers 55 to transmit, 510, a motion trigger signal to the central unit 140.
- the central unit 140 On receiving the motion trigger signal from camera 50, the central unit 140 starts, 520, an outdoor entry timer.
- the central unit 140 also transmits, 530, a start wake on radio instruction to the camera 50.
- the camera 50 On receiving the start wake on radio instruction, the camera 50 uses one of its transceivers 55 to transmit, 540, a low-power, out of band wake up signal. Because the intruder is not carrying an authorised key fob 370, no response is received to the wake on radio signal, and consequently the outdoor entry timer expires. On expiry, 550, of the outdoor entry timer, the central unit 140 determines an alarm event, notifies the central monitoring station 190, and instructs the camera 50 to start transmitting image data which may be supplied to the central monitoring station 190. The central unit 140 may also trigger a siren or other alarm indicator at the premises and/or may trigger announcements, for example, from the speaker of the camera 50 to advise the intruder that they have been spotted.
- Figure 6 is a timing diagram showing the sequence of events and actions of the various elements of the security system that characterise a method, according to an embodiment of the invention, of suspending an outdoor entry timer when the presence of an authorised user is detected.
- the diagram concerns the operations of the entrance breach detector - e.g., the camera 50 including movement detector 60, the central unit 140, and the portable authentication device 370.
- the method starts, 599, with the security monitoring system in an armed away state (the described method could equally be performed with the system in an armed at home status, but generally the issue of owner-induced false alarms caused by unintentional triggering of external monitored areas arises when systems are in the armed away state) at 599.
- the motion sensor senses an event, for example the opening of the garden gate, in the monitored external area, and this results in the camera's processor 210 causing an RF transceiver 55 of the camera to transmit an entry violation message.
- This entry violation message which includes the camera's ID, is received at a transceiver of the control unit 140.
- the central unit 140 starts, at 610, an entry period timer, which is set for the duration of the period within which a disarm process needs to be completed before the control unit causes the system to enter an alarm condition - for example in the range 20 to 90 seconds (a period set based on the time needed for an occupant/user to disarm the arm - possibly including unlocking the back door, entering the house, and using the disarm node.
- the central unit identifies the detector that transmitted the motion detection message (which can be considered a form of entry violation message) from the camera ID contained in the received message.
- the central unit 140 includes the ID code for that camera in a message which it transmits, at 620, to the camera 50 to cause the camera to transmit, at 630, a beacon signal or polling signal to wake up the transceiver in any portable authentication device (or at least any portable authentication device which is moving or which has not had its transceiver shut down following a period of non-movement) within the vicinity of the targeted camera 50, and preferably includes a special identifier to be included in the beacon signal or polling signal, and details of a packet countdown (to be described later) to be used.
- the special identifier will typically be a random or pseudo random number whose value changes at each use.
- the portable authentication device 370 listens for beacon signals on one or more channels whose parameters are known to each of the portable authentication devices - for example by having been pre-programmed, but more preferably having been communicated to the or each portable authentication device when that portable authentication device first registered with the central unit (although of course the central unit could periodically update these parameters through an exchange of messages with the portable authentication device(s)).
- the characteristics of the beacon or polling signal transmitted by the camera 50 are preferably chosen to make the effective range of the beacon signal small - preferably of the order of a few metres, e.g.
- the transceiver 377 of a portable authentication device 370 that is within a few metres of the camera 50 (and that is not currently in a shut-down state following a period of non-movement as determined based on signals from the motion sensor 379) detects, 640, the beacon signal and wakes up.
- the transceiver 377 receives and decodes the beacon signal, retrieving the special identifier (if used).
- the controller 375 of the portable authentication device 370 then causes the transceiver 377 of the portable authentication device to transmit, at 650, a message including the portable authentication device ID and the special identifier (if used) to the central unit 140.
- the central unit 140 checks that the special identifier (if used) is valid (meaning that it is one issued within the current period of the outdoor entry timer) and also checks to see whether the portable authentication device ID corresponds to one registered with the central unit. If both checks are passed (if a special identifier is being used), the central unit at 660, may suspend the system if the message from the portable authentication device 370, containing the portable authentication device id and the special identifier (if used), was received before expiry of the outdoor entry timer. The control unit 140 may also at this stage send, 670, a further message to the camera 50 to cause the camera to provide, 680, a notification of the fact that the presence of an authorised key fob 370 has been detected and that the outdoor entry period timer has been suspended.
- the camera may activate an appropriate indicator light 265 and/or provide a "Welcome" sound or announcement through the loudspeaker 260.
- the camera 50 may also be instructed to send, 685, a further message to the portable authentication device 370 to cause the fob to generate, 690, a signal indicating successful recognition - for example, by illuminating an indicator on the portable authentication device, making an announcement or sound, or vibrating in a characteristic way.
- the disarm request message sent by the portable authentication device 370 to the control unit 140 may also include a report on the RSSI levels of messages received by the portable authentication device 370 from the camera 50, and the control unit 140 may use the information about measured RSSI levels in such a report in determining whether or not to trust the received disarm request - i.e. whether to disregard the disarm request as invalid on the basis that it is likely to have come from a rogue actor (outside the usual range of the camera) rather than from an authorised user within range of the camera.
- the control unit identifies 140 an alarm state. If the system is backed up by a central monitoring station (CMS) 190, the central unit 140 will send a status change message to the CMS 190, typically with the identifier of the camera that first indicated movement (as an example of an entrance breach) event. The CMS 190 may then cause the central unit 140 to activate the camera (plus possibly other video cameras) or other image capture devices, audio capture devices, etc. and provide data feeds from these to the CMS 190. The CMS may also invoke human intervention as appropriate.
- CMS central monitoring station
- FIG. 7 is a flow chart illustrating one possible process for a portable authentication device 370 according to an embodiment of the invention to determine whether to respond to a received transmission.
- the portable authentication device receives an RF transmission at its transceiver (the transceiver not having been shut down following a determination that the portable authentication device is stationary).
- the portable authentication device determines whether the received transmission is a disarm instruction - that is, including a disarm transmission identifier of some kind, for example being a wake beacon (for example, from a camera 50 as previously described) or disarm success or failure message. If the determination is negative, i.e., it is not a disarm instruction, the process moves to step 1200.
- step 1300 the movement status of the portable authentication device 370 is checked. If the portable authentication device is determined to be stationary, the process moves to step 1400. If the portable authentication device is configured to shut down its transceiver following a period of non-movement, when the fob 370 is deemed to be stationary, the portable authentication device will subsequently not receive any RF transmission (until after the portable authentication device is detected as having moved again) and hence this process does not take place. But if the portable authentication device is determined to be moving, at 1600, the process proceeds to step 1800.
- the processor 375 determines whether the portable authentication device 370 should be deemed to be stationary, for example by checking a count (or some other measure of elapsed time) since the portable authentication device was last determined to be moving. If the count is less than a predetermined threshold count, the portable authentication device 370 is determined, 1500, to be a "live" portable authentication device which can be used to provide a disarm instruction to the central unit (that is, the portable authentication device is not deemed to be stationary), and the process proceeds to step 1800. If the portable authentication device is deemed to be stationary, then no disarm message will be transmitted by the portable authentication device 370, and the process ends at 1700.
- the period of inactivity that is accepted as indicating that a portable authentication device 370 is "live” may be set differently in different installations, but typically this period will be no more than about 60 seconds. A cut off at 30 seconds will often be long enough for most users, although for system installations where the occupants or users of the secured space are elderly or infirm 30 seconds may not be long enough. Preferably the cut off period is kept relatively short, at no more than a minute or so.
- step 1300 If at step 1300 the portable authentication device is determined to be moving 1600, the process proceeds to step 1800.
- the portable authentication device generates a transmission message that includes the portable authentication device ID, and the disarm transmission identifier (if used), and such other parameters as the system requires (for example, a report of measured RSSI).
- the portable authentication device may be programmed simply to read the transmission and act on the contents, or to check for a certain flag or flags and to respond differently based on the flag(s) determined to be present.
- the monitoring system may be so arranged that the portable authentication device 370 is configured to receive an instruction other than a disarm instruction via the transceiver, including a flag, from the control unit to perform an action; and wherein in the event that the other instruction includes the flag, the processor is configured to cause the portable authentication device to perform the instructed action whether or not, when the instruction is received, the portable authentication device is determined to be stationary.
- Portable authentication devices 370 configured in this way can be activated by an RF signal, from the control unit or from a disarm node, enabling the status of all portable authentication devices in range to be checked and/or updated. It would also be possible to perform an audit of all the portable authentication devices in range of, say, the central unit. If such a portable authentication device 370 were to include one or more of a visual indicator 385, an audio transducer 390, a haptic transducer 390, and were further configured to generate an output using one or more of these when so instructed by a received instruction including the flag, a mislaid portable authentication device could be made to announce itself.
- Portable authentication devices 370 may be configured to listen for instructions related to hands free disarm (including transmissions from external cameras 50 as previously described) only on a particular channel or channels, with given frequency and given modulation, but to listen to another channel or channels on a different frequency and possibly with different modulation for other kinds of instructions.
- Disarm instructions received from a disarm node do not typically contain a portable authentication device ID - because, if more than one portable authentication device is registered with the central unit, it cannot be assumed which if any portable authentication device is being carried by the person who opened the door whose opening has been sensed. But other message may be targeted to a particular portable authentication device or to a group of portable authentication devices that is a subset of all the registered portable authentication devices. Consequently, a portable authentication device according to embodiments of the invention may also be arranged to check the contents of received messages for the presence of that portable authentication device's ID. In this way, the control unit 140 can target an individual portable authentication device 370 or group of portable authentication devices.
- a "announce myself” message could be transmitted by the central unit flagged with the ID of the particular portable authentication device that has been mislaid. If other portable authentication devices receive the message, they do not respond to it, because it is flagged as an "announce myself” message and does not contain their ID. Whereas the missing portable authentication device sees that the message is flagged as an "announce myself” message, recognises its own ID, and announces its presence using one or more of its inbuilt indicators (for example one or more LEDs, or providing a haptic announcement - by "buzzing" or vibrating).
- monitoring systems will not be configured to transmit only disarm messages to portable authentication devices, but will also be configured to send other types of messages to portable authentication devices 370.
- a portable authentication device In systems that do only send portable authentication devices 370 disarm messages, a portable authentication device just needs to recognise a received message as a disarm message and respond with the disarm transmission identifier (if used) and the portable authentication device ID (although, as will be explained later, portable authentication devices may be required to perform RSSI measurements and include these, or a report based on these, as part of the response).
- a central unit may be configured to instruct the portable authentication device involved in a hands free disarm event to provide a disarm success indicator on a successful disarm event.
- Such an instruction will preferably include the ID of the portable authentication device that transmitted the disarm request to the central unit (the portable authentication device ID having been included in that disarm request).
- Messages may be sent to portable authentication devices 370 at least from the control unit (of which, in some systems, there may be more than one), disarm nodes 150, and external monitoring cameras 50. Where there are multiple message types, they may be labelled Disarm Message, Group, and Targeted - labels which can be considered to be class flags. If finer granularity is required, a further level of flags may be provided - so that a message type is indicated by a primary flag (Disarm Message, Group, or Targeted), and (at least for Group and Targeted) a secondary flag that indicates the specific message type within the class. Alternatively, a single level of flags may be provided, with typically multiple flags for each of the Group and Targeted classes.
- the sub-band between 869.7 and 870Mhz is particularly interesting for use when transmitting short-range beaconing signals from the disarm nodes because it provides a relatively wide channel, the beacon channel, which allows the use of a high data rate, e.g. 250 kbit/s, which is helpful in reducing the effective range of the beacon signal.
- the effective radiated power ceiling of 5mW also poses no significant constraint for this application.
- this sub-band between 869.7 and 870Mhz is the preferred frequency band for the short-range transmissions from the disarm node - and which are used for communication with portable authentication devices, e.g., for the transmission of wake up messages.
- a sensor that detects the breaching of an entrance transmits an alarm trigger signal, including a sensor identifier, that is detected by the control unit.
- the control unit recognises the sensor identifier and uses this to retrieve the identifier for the disarm node that is associated with the relevant sensor.
- the control unit then transmits a message, which may be a wake up message, including the relevant disarm node identifier which has the effect of causing the relevant disarm node to listen for signals from fobs (portable identification devices).
- the control unit then transmits a fob wake up signal receivable by any fob adjacent any of the disarm nodes.
- Any fob that receives the fob wake up signal from the control unit then responds by transmitting a response signal, including its own identifier, that is only detectable by a disarm node within no more than about 2 metres of the fob (using appropriately selected transmission characteristics of power, data rate, etc. to ensure a short effective transmission range).
- a disarm node receiving the fob response signal then transmits a signal, including the fob identifier, to the control unit which then determines whether the fob identifier is for a registered fob. In this way only the disarm node whose identifier was included in the transmission from the control unit detects the fob response.
- the disarm node may be configured to generate an alarm trigger signal that is transmitted to the control unit in response to receiving an entrance breach signal from a sensor configured to detect the breaching of an entrance to the building or secured space. That is, the sensor transmits a signal in respect of a detected breach, which signal is received by the associated disarm node rather than by the control unit.
- the control unit transmits a fob wake up signal receivable by any fob adjacent any of the disarm nodes. Any fob that receives the fob wake up signal from the control unit then responds by transmitting a response signal, including its own identifier, that is only detectable by a disarm node within no more than about 2 metres of the fob.
- a disarm node receiving the fob response signal then transmits a signal, including the fob identifier, to the control unit which then determines whether the fob identifier is for a registered fob. In this way only the disarm node whose identifier was included in the transmission from the control unit detects the fob response.
- this approach is less preferred than the alternatives already mentioned, because if the signal from the sensor detecting the breach of an entrance is only received by the control unit through the disarm node, rather than directly, the security of the system is reduced - the disarm node becomes a point of weakness, because if it is disabled or its signals blocked in some way by a bad actor, the control unit will not receive any alarm trigger signal in respect of the breach.
- anti-tampering features in the disarm node, such as sensors to detect and report on attempts to open the disarm node, and possible also implementing a "heartbeat" function in which the disarm node periodically "checks-in” with the control unit - the failure of the control unit to receive the heartbeat, or the reception of a tamper message from the disarm node causing the control unit to determine an alarm condition which is reported to the central monitoring station (if present) and to provide alarm signals (audio and optical) through the alarm installation - as well as sending reports to the user's phone - email, as appropriate.
- Such extra security features may also be present in disarm nodes according to any of the other embodiments and variants.
- Achieving effective battery life of nodes and sensors in alarm and monitoring systems is a constant concern, because battery failure disables the relevant node or sensor, which can lead to loss of security, and battery replacement may involve a site visit by the system supplier - which is expensive and inconvenient.
- loss of battery power means that the portable authentication device stops working, which is inconvenient for the user, and the cause of the failure may not be apparent to the user so that the user may require a site visit to identify and fix the problem. Consequently, we are interested in reducing power consumption in all of the battery powered components of the system, including the portable authentication device. For this reason the use of a wake on radio receiver in the portable authentication device is attractive although acceptable battery life can also be obtained using a more conventional radio receiver that periodically wakes to listen (poll) for beacon signals.
- a first detection stage of the transceiver of the portable authentication device may be used to perform a first step which involves just checking an RSSI level.
- the transceiver in the portable authentication device may perform periodically a brief RSSI check polling the beacon channel, using just the RF front end of the transceiver, for example for a first period of less than a few milliseconds, preferably a fraction of a millisecond, e.g. around 0.5 milliseconds, and then revert to its rest state if the sensed RSSI level is below some pre-set threshold.
- the portable authentication device listens for a brief period for a synch word from the disarm node - for example for a second period of a few milliseconds, for example for less than 10 milliseconds, e.g. 5ms. If no synch word is detected, the transceiver reverts to its rest state. But if a synch word is detected, the transceiver starts the full radio receiver which remains powered up, for example for a third period of between say 8 to 16ms, for example 10ms, to receive the full wake up packet. Each packet will typically last of the order of 220 ⁇ s, and the disarm node may transmit for 2 to 4 seconds, e.g.
- RSSI detection can be achieved by activating just front end components of the transceiver, avoiding the need to power up all of the transceiver. If the detected RSSI level is below a threshold, the portable authentication device determines that there is unlikely to be valid data available and halts its RSSI check until the next cycle.
- the cycle period determines the length of time for which the disarm node needs to transmit its beacon and also sets a lower bound on how quickly hands-free disarm is likely to occur on average.
- the portable authentication device wake up interval which is controlled by a clock in the portable authentication device, will typically be chosen based on the duration of the disarm node beacon.
- a portable authentication device wake up interval of one second would provide a good likelihood that a f portable authentication device within range of a broadcasting disarm node would be able to wake and retrieve the necessary information from the beacon signal.
- a portable authentication device wake up of interval (period between polling events) of 2 seconds will often be frequent enough when the disarm node is configured to transmit its beacon signal for 3 seconds.
- the portable authentication device wake up interval can conveniently be set at between a quarter and two thirds of the beacon duration.
- a shorter relative cycle time is not technically problematic, but it is likely to use proportionally more battery power and hence shorten battery life commensurately.
- the cycle time could be more than one half of the beacon duration, provided the system enables the portable authentication device to capture the beacon quickly after wake up, so that the necessary special ID (if used) can be recovered by the portable authentication device.
- the disarm node transmits a beacon signal, on the beacon channel, which preferably includes the special codeword (shown as ID in Figure 8 ) received from the control unit for this hands free disarm event.
- the beacon signal will be made up of a sequence of packets, each beginning with a preamble, followed by a synch word, then an identifier which is the special ID from the central unit.
- each packet includes a countdown value, the countdown value decreasing by one in each subsequent packet (to zero in the final packet of the sequence) and indicating the number of packets until the end of the sequence of packets.
- the beacon signal is recognised as such by the portable authentication device, because it is the only message of that kind with the relevant format in that channel, causing the portable authentication device to transmit a response including the special codeword (special I.D.).
- the portable authentication device By including sequence information in the beacon from the disarm node, it becomes possible for the portable authentication device to determine when the beacon transmission will end. Using this information, the portable authentication device can delay transmitting its response to the central unit until after the disarm node has finished transmitting - so that it is easier for the central unit to detect the response from the portable authentication device without local interference. This means that portable authentication device transmit power can be kept low, prolonging the life of the portable authentication device's battery, while still enabling the control unit to receive the portable authentication device 's response. In addition, when the portable authentication device captures beacon packets, it can calculate how long it will be before the sequence ends. If the captured packets are early in the sequence, the portable authentication device can "snooze" or power down while waiting for the sequence to end, and then wake again in order to transmit its response to the central unit just after the sequence ends.
- the portable authentication device will listen to multiple packets to be able to use statistics to get a reliable RSSI figure, and may report on the RSSI figure for each of the packets detected.
- the portable authentication device controller 375 may use movement information from the portable authentication device's built-in movement sensor 379 to control the polling by the portable authentication device's transceiver 377. That is, polling may be suspended in the event that the processor deems that the portable authentication device is stationary - e.g. if movement sensor detects no movement, and the processor determines that a count since the portable authentication device was last determined to be moving is more than a predetermined threshold count, the portable authentication device is deemed to be stationary and polling may be suspended completely or the frequency of polling reduced (the preferred option, since that means that "lost" portable authentication devices can be made to announce themselves when they next poll).
- the frequency of polling may be reduced to between a half and a twentieth, or less, of the usual frequency.
- the processor determines that the portable authentication device is still moving, or has recently been moving (so that the portable authentication device is not deemed to be stationary)
- the usual polling frequency is maintained.
- the processor of the portable authentication device may be configured to cease generating the running count of the time since the portable authentication device was last in motion after the count of the time since the fob was last in motion reaches the predetermined threshold value, as this can reduce portable authentication device energy consumption, which is good for improving battery life.
- the radio beacon In order to reduce the effective range of the radio beacon, it is transmitted from the disarm node at a low power (e.g. -20dBm or less) with a high data rate (for example, 250kbps or more, say 400 kbps) and with a low modulation index, to give an effective range of no more than about 5 metres.
- a suboptimal modulation index we achieve three things: quickly send a lot of packets, reduce sensitivity to decrease range and to fit inside the given spectrum.
- Sensitivity is in the range of around -90dBm at this settings and we try to be in line of sight, meaning that the distance from the transmitter is given as the fading of the channel with distance, using the Friis formula .
- Encryption for example based on shared keys, is preferably used for all transmissions from and to the control unit in each of the embodiments of the invention.
- the portable authentication device may include in the response message sent to the control unit details of the results of RSSI determinations made by the portable authentication device.
- the disarm node may be configured to send a series of wake up messages upon being prompted by the control unit to send a disarm instruction, preferably including a unique disarm transmission identifier, to the portable authentication device .
- the portable authentication device may be configured to determine the RSSI level of each of the messages of the series that are received from the disarm node.
- the portable authentication device may be configured to include in the disarm request sent to the central unit a report based on the determined RSSI levels.
- the portable authentication device may be configured to send a summary of the RSSI levels measured, such as the number of messages/packets measured or measured above a certain level, maximum RSSI level, average RSSI level, etc.
- RSSI data can be used by the system to reduce the susceptibility of the system to "relay attacks” of the type used to fool passive entry systems (PES) of cars.
- PES passive entry systems
- the portable authentication device would report RSSI values as, for example, max/min values, and an average, and the central unit may hold factory pre-set values for a "real" disarm, and/or these may be supplemented or replaced with real world values obtained during commissioning/testing of the system.
- the disarm node(s) could include a list of registered portable authentication devices and for the disarm node(s) rather than the control unit to perform the check of authentication device identity on receipt of the authentication devices response to the wake up signal/beacon.
- the disarm node would, on successful authentication transmit an alarm deactivation message to the control unit.
- Such an approach would of course require that the control unit update the disarm node(s) with additions and deletions to the list of registered authentication devices. This is a less preferred approach because of the need for the increased burden of keeping up to date lists in both the control unit and the disarm node(s).
- any disarm transmission identifier or event ID has been generated by the central unit and then transmitted to a disarm node for inclusion in a wake up message from the disarm node
- the disarm node could itself generate a disarm transmission identifier or event ID and either provide this to the central unit for the central unit to check any received fob transmission for the presence of the correct disarm transmission identifier or event ID or itself check any received fob transmission for the presence of the correct disarm transmission identifier or event ID and transmit the result of the check to the central unit.
- disarm transmission identifier or event ID it is preferable for the disarm transmission identifier or event ID to be generated and checked by the central unit, rather than devolving either or both these functions to a disarm node, because this reduces the risk of a bad actor adopting the guise of a disarm node to fool the system.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Alarm Systems (AREA)
Description
- The present invention relates to a security monitoring system for monitoring premises, a video camera for use with such a system and methods of configuring and operating such a monitoring system.
- Security monitoring systems for monitoring premises, often referred to as alarm systems, typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events. Commonly such systems include sensors to detect the opening and closing of doors and windows, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones. Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected. Such installations typically include a control unit (which may also be termed a central unit), generally mains powered, that is coupled to the sensors, detectors, cameras, etc. ("nodes"), and which processes received notifications and determines a response. The central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit. Similarly, for ease of installation and to improve security, the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered.
- As an alternative to self-contained systems, a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a Central Monitoring Station (CMS) where, typically, human operators manage the responses required by different alarm and notification types. In such centrally monitored systems, the central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system and the nature of the detected events. In such a configuration, the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station. Again, in such installations the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.
- While security monitoring systems are normally developed to protect premises, such as houses or apartments, some installations include one or more cameras, typically video cameras, arranged to monitor external spaces such as terraces, gardens and forecourts. Typically, in such installations the (video) camera is associated with one or more movement sensors, the camera and the movement sensor(s) being arranged to cover a common surveillance area. When the system is armed, movement within the monitored surveillance area triggers the movement sensor, turning on the camera and alerting the central unit which in turn may signal an alarm condition to a central monitoring station.
- Such external monitoring arrangements are a frequent source of false alarms, triggered by owners/occupiers of the protected premises who forget that the external area is monitored. False alarms can be expensive for system operators as they may require security personnel to be dispatched, and they can also annoy owners/occupiers so that they become dissatisfied with the system provider. Frequent false alarms may also lead to the owner/occupier leaving the monitoring systems unarmed - with the potential risk that real security breaches will not be detected by the security monitoring system.
- It would be desirable to be able to reduce or even eliminate this problem while still retaining a high level of security.
- Embodiments of the invention provide potential solutions to the problems, in systems with external surveillance areas, of false alarms being triggered by authorised persons.
- Background prior art can be found in
US 2014/139678 A1 ,US 2016/035198 A1 ,US 2014/136701 A1 andUS 2003/062997 A1 . - According to a first aspect, there is provided a security monitoring system including: a system controller; a video camera, coupled to a motion sensor, arranged to monitor a surveillance area; a portable token storing a token ID; the video camera being configured on receipt of a motion detection signal from the motion sensor to send an alert to the system controller; the system controller being configured in an armed state, on receipt of an alert from the video camera, to start an event timer and to send an instruction to the video camera to broadcast a token activation signal, the instruction including an event identifier;
- the video camera further being configured to, on receipt of the instruction from the system controller, broadcast a token activation signal including the event identifier; the portable token being configured to respond to receipt of a token activation signal from the video camera by broadcasting a response including the token ID and the event identifier;
- the system controller further being configured: on receipt of a response from the token to:
- compare the event identifier included in the response with the event identifier included in the instruction to the video camera; compare the token ID included in the response with one or more stored token IDs; and to suspend the event timer if both comparisons provide a match;
- if either no response is received or one or both comparisons do not provide a match, to determine an alarm event on expiry of the event timer.
- The video camera and motion sensor may be arranged to survey a surveillance area and the video camera configured to broadcast the token activation signal as a radio signal having an effective range that does not extend significantly beyond the surveillance area.
- Optionally, the portable token includes a processor coupled to a token movement sensor, and the token is configured to respond to token activation signals only if the processor determines that the token is moving.
- Preferably, the portable token includes a wake on radio receiver, and the video camera is configured to broadcast token activation signals as wake on radio signals to which the token is responsive.
- The portable token may be configured to include RSSI data in its response to the token activation signal from the video camera, and the system controller may be configured to use the RSSI data included in the token response in determining whether to trust the received response. Furthermore, the system controller may be configured to regard the token response as invalid if the RSSI data included in the token response suggest that the response has come from outside the usual range of radio signals from the camera.
- Preferably, radio frequency transceivers of the portable token, the video camera and the system controller are configured to operate in the industrial, scientific and medical, ISM, radio bands.
- Preferably, the video camera is configured, on instruction from the system controller to transmit video images captured by the video camera using Wi-Fi.
- The system controller is optionally configured, in an armed state, to disarm the security monitoring system if both comparisons provide a match.
- Alternatively, the system controller may be configured in an armed state, if both comparisons provide a match, to disarm the security monitoring system only in respect of the monitoring of the surveillance area.
- According to a second aspect, there is provided video camera for use in a security monitoring system according to any variant of the first aspect, the video camera including an image sensor, a radio frequency transmitter, a radio frequency receiver, and a processor operatively connected to the image sensor, the radio frequency transmitter and the radio frequency receiver, the processor being configured, on receipt of a motion trigger signal from a motion sensor to: transmit, using the radio frequency transmitter, a flag signal to the system controller of the security monitoring system; in response to receiving, via the radio frequency receiver, an instruction from the controller to cause the radio frequency transmitter to transmit a token activation signal.
- Preferably, the token activation signal is a wake on radio signal. Optionally, the motion sensor is part of the video camera.
- Preferably, the video camera's radio frequency transmitter and radio frequency receiver are configured to operate within the industrial, scientific and medical, ISM, radio bands, such as the 868 MHz band.
- A video camera according to the second aspect may further comprise an RF transmitter configured to transmit Wi-Fi signals, and the video camera's processor may be configured, on instruction from the controller of a security installation to activate the RF transmitter to transmit via Wi-Fi video images captured by the video camera.
- According to a third aspect, there is provided a method of configuring a security monitoring system, the method comprising: providing a system controller; a remote video camera coupled to a motion sensor; and a portable token storing a token ID;
- the video camera being configured on receipt of a motion detection signal from the motion sensor to send an alert to the system controller; the system controller being configured, on receipt of an alert from the video camera, to start an event timer and to send an instruction to the video camera to broadcast a token activation signal, the instruction including an event identifier; the video camera further being configured to, on receipt of the instruction from the system controller, broadcast a token activation signal including the event identifier;
- the portable token being configured to respond to receipt of a token activation signal from the video camera by broadcasting a response including the token ID and the event identifier;
- the system controller further being configured: on receipt of a response from the token to: compare the event identifier included in the response with the event identifier included in the instruction to the video camera; compare the token ID included in the response with one or more stored token IDs; and to suspend the event timer if both comparisons provide a match; if either no response is received or one or both comparisons do not provide a match, to determine an alarm event on expiry of the event timer.
- According to a fourth aspect, there is provided a method of operating a security monitoring system, the security monitoring system including: a system controller;
- a video camera, coupled to a motion sensor, arranged to monitor a surveillance area; and
- a portable token storing a token ID; the method comprising: monitoring the surveillance area using the video camera and motion sensor; on receipt by the video camera of a motion detection signal from the motion sensor sending an alert to the system controller;
- on receipt of an alert from the video camera, the system controller starting an event timer and sending an instruction to the video camera to broadcast a token activation signal, the instruction including an event identifier; the video camera, on receipt of the instruction from the system controller, broadcasting a token activation signal including the event identifier;
- the portable token responding to receipt of the token activation signal from the video camera by broadcasting a response including the token ID and the event identifier; the system controller: on receipt of a response from the token, comparing the event identifier included in the response with the event identifier included in the instruction to the video camera;
- comparing the token ID included in the response with one or more stored token IDs; and
- suspending the event timer if both comparisons provide a match; if either no response is received or one or both comparisons do not provide a match, determining an alarm event on expiry of the event timer.
- Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings, in which:
-
Figure 1 is a schematic drawing showing a stylised building with an external space which is monitored by a security monitoring system according to an embodiment of the invention; -
Figure 2 is a schematic drawing showing major elements of a camera 50 (here a video camera) according to an aspect of the disclosure; -
Figure 3 schematically shows the main components of various devices of a security monitoring system; -
Figure 4 is a simplified schematic sequence diagram illustrating a method according to an aspect of the invention; -
Figure 5 is another sequence diagram illustrating what happens when an unauthorised intruder enters the area monitored by security monitoring camera; -
Figure 6 is a timing diagram showing the sequence of events and actions of the various elements of the security system that characterise a method, according to an embodiment of the invention; -
Figure 7 is a flow chart illustrating one possible process for aportable authentication device 370 according to an embodiment of the invention; and -
Figure 8 is a simplified schematic illustrating 2-stage detection. -
Figure 1 is an overview of a security monitoring system according to a first aspect of the invention. The Figure shows a rough plan view of adomestic dwelling 110, which may be a building such as a house or a secured space, such as an apartment, in a building and which is protected by a security monitoring system 100. The dwelling has afront door 120, in a doorway that is a main entrance giving access to the protected interior of the dwelling. Thedoor 120 is fitted with adoor sensor 130 to detect the opening of the door. Thedoor sensor 130 is typically, but not necessarily, a magnetically triggered switch which is fitted to the opening side of the door, opposite to the hinge side. It will be appreciated that the door sensor is an example of a detector to detect the breaching of the entrance represented by the doorway. It will also be appreciated that the breaching of an entrance may also be detected using a motion sensor such as a PIR sensor, a video camera or other image sensor, a floor-mounted pressure sensor, or some other contact or non-contact sensor, any of which may be used to detect the breaching of an entrance into a building, garden, farm, etc., and which may therefore generate an alarm trigger signal to indicate the breaching of a monitored entrance. - The
door sensor 130 includes an RF transmitter, not shown, that transmits an entry violation signal to acentral unit 140 of the monitoring system 100 in the event that the door is opened. Inside the dwelling, close to thefront door 120, a disarmnode 150 is mounted on a wall. The disarmnode 150 has a user interface, including a touch screen or keypad to receive a user input to disarm the system, and a radio frequency transmitter, not shown, to transmit, in consequence of the user input, a disarm instruction to thecontrol unit 140. A similar disarmnode 160 is also mounted on a wall of the kitchen near to aback door 170 which also gives access to the protected interior of the dwelling. The dwelling is also provided with Windows, 180, and these are provided with one or more sensors to detect window opening, glass breakage, tampering or the like. - The security installation 100 also includes an exterior monitoring camera, here a video camera, 50 with which is associated to transceiver 55 and a movement detector, such as a
PIR detector 60. Although thetransceiver 55 and themovement detector 60 are shown as mounted outside the casing of thevideo camera 50, commonly both the transceiver and the movement detector will be integrated into the camera and enclosed within the video cameras casing. Themovement detector 60 and thevideo camera 50 are mounted to survey a monitored area, in this case a back garden associated with the domestic dwelling hundred and 10. The back garden being accessible through agarden gate 70. The owner or occupier of thedomestic dwelling 110 may, for example keep removable valuables, such asscooter 80, in the back garden, and the exterior monitoring camera can help protect such removable valuables. In the example shown to theexterior monitoring camera 50 is not secured to the structure of thedomestic dwelling 110, but rather is mounted remotely so that it can better survey both the rear exterior of the property and also the back garden. Thevideo camera 50 is activated in the event that themovement detector 60 detects movement, for example when thegarden gate 70 is opened and someone enters the garden. Upon activation, thevideo camera 50 uses thetransceiver 55 to communicate with thecentral unit 140. If the security monitoring system is in an armed state, the central unit may be configured to enter an alarm state and, for example, communicate with a remotecentral monitoring station 190 wirelessly, or with a wired connection, for example via theInternet 195. Thecentral unit 140 may instruct thevideo camera 50 to transmit images using thetransceiver 55, and then forward the images to the central monitoring station for review. Upon review at the central monitoring station, you may be decided to dispatch security personnel and/or raise an alarm with the police. - Unfortunately, it is easy for an occupier of the dwelling to arm the security monitoring system prior to exiting the dwelling, and then to open the
back gate 70 to retrieve thescooter 80, forgetting that by entering the back garden after having armed the security monitoring system she will trigger an alarm condition. The present disclosure provides methods and apparatus to reduce the risk of such accidental triggering of alarm conditions. -
Figure 2 illustrates schematically the major elements of a camera 50 (here a video camera) according to an aspect of the disclosure. The camera includes acamera module 200 that includes an image sensor and a lens. Thecamera module 200 is controlled by aprocessor 210, which includesRAM memory 215. Operatively coupled to theprocessor 210 is afurther memory arrangement 220 for long term storage of program data and image data (although these may of course be stored in separate memories). Thecamera 50 is powered by abattery power supply 230. Optionally, aphotovoltaic arrangement 240 may be provided to provide supplementary power and to charge a rechargeable battery within the battery power supply. - The
processor 210 is also operatively coupled to the camera'sRF transceiver 55. In the example shown twotransceivers 55' and 55" are provided, and at least one of these transceivers uses the industrial, scientific and medical (ISM) radio bands, and RF transceivers is configured to provide Wi-Fi functionality. The two transceivers may be identical, or one may support ISM while the other supports Wi-Fi. Preferably, RF communication between the central unit and the nodes (including cameras 50), detectors and sensors of security monitoring systems according to embodiments of the invention use the industrial, scientific, and medical (ISM) radio bands, such as in Europe the 868MHz band. Within the 868 MHz band are several sub-bands dedicated to "non-specific SRD" which are of interest. When thecamera 50 has image data, especially video image data, to send to thecentral unit 140, atransceiver 55 preferably uses Wi-Fi to transmit the data provided there is sufficient battery charge and sufficient available bandwidth. Each of the transceivers has an associated antenna arrangement. -
Figure 2 also shows themotion sensor 60, which may be a PIR sensor, incorporated within thecamera 50 and operatively coupled to the processor. Also shown are anoptional microphone 250 andloudspeaker 260, both of which are operatively coupled to theprocessor 210. The loudspeaker may be used to provide feedback to an authorised user, as will be discussed later, and to enable communications from thecentral monitoring station 190 to be heard in the vicinity of thecamera 50. Finally, the camera may include anindicator light 265, to provide optical feedback under the control of theprocessor 210. Of course, the camera may also be associated with an infrared or other light source, not shown, for use in illuminating the monitored area and effectively improving the quality of images obtained by thecamera 50. -
Figure 3 shows schematically shows the main components of various devices of the security monitoring system and that may be involved in arming and, more particularly, disarming the system, specifically the main elements of thecentral unit 140, and disarmnode 150, and a key fob ortoken 370. - The
central unit 140 includes aprocessor 300 with an associatedmemory 310 which stores, among other things, identities for the key fobs that are registered to the system, identities for the door sensors and disarm nodes of the system together with an association between each disarm node and the door sensor for the access door closest to the relevant disarm node. These identities and associations are stored in adatabase 315 within thememory 310. The central unit includes at least oneRF transceiver 320, with associatedantenna 322, for communication with the various nodes and sensors of the monitoring system. Typically, there will be asecond transceiver 330 as shown, also with an associatedantenna 332, for communication with thecentral monitoring station 190, as a backup or alternative to a wired data connection to the Internet via a network interface 340. The antennas of the various transceivers will typically all be internal to the central unit. Theprocessor 300 is connected to, and controls, thememory 310,transceivers network interface 335. The central unit generally draws power from the domestic power supply (generally referred to as a mains power supply) which feeds a power supply 336 within or associated with the central unit. The central unit also includes a backup battery power supply which automatically becomes operational in the event that the external power supply fails. The internal battery power supply is based onrechargeable cells 337 that are kept continuously topped up by thepower supply 350. The central unit may also include auser interface 325, including adisplay 326, a keypad orkeyboard 327, aloudspeaker 328, and amicrophone 329. The keypad or keyboard may be a provided by making the display a touch-sensitive display, or as a unit distinct from the display. The central unit may be arranged to accept through the keypad or keyboard a code or codes to arm and disarm the system. The central unit may also include a near field communication (NFC) antenna and a corresponding NFC chip or equivalent circuitry which can be used, for example, to detect the presence of a "disarm dongle" provided to the user of the system and which can communicate with the central unit using Near Field Communication. The key fobs may also be provided with an NFC antenna and chip or equivalent circuitry, so that they can be used as "disarm dongles" with the central unit and with NFC-enabled disarm nodes. - The disarm
node 150 includes aprocessor 350 with an associatedmemory 351 that stores an ID of the disarm node. The disarm node also includes auser interface 352 comprising indicators, e.g. LEDs, 353, a keypad, 354, and optionally adisplay 355 which may be present instead of or in addition to the LED indicators. Atransceiver 360, with an associated antenna 361 (which will typically be internal, rather than external as illustrated), is controlled by theprocessor 350, and is used for communicating with thecentral unit 140 and thekey fob 370. Thetransceiver 360 will typically be configured to operate in the 868MHz ISM bands (or equivalent available ISM bands in countries outside Europe). The disarm node includes abattery power supply 362, and in general this will be the only power supply as typically it is preferred not to have to connect disarm nodes to the mains power supply. Aloudspeaker 363 is provided so that audible messages and instructions can be given to a user at the disarm node. These audible messages and instructions may be automated ones, generated by the central unit or by the disarm node itself, but additionally theloudspeaker 363 can be used to relay messages from acentral monitoring station 190. The disarm node may also store audio files for these messages and instructions on its internal memory, to avoid problems caused by use of a low-bandwidth channel (e.g., an 868MHz RF channel) between the central unit and the disarm node. A disarm node storing such audio files may then receive instructions from the central unit to play out particular messages, and do so using the stored audio files. For example, the loudspeaker may be used to provide a disarm success or failure message. The disarm node may also store audio files for these messages and instructions on its internal memory, to avoid problems caused by the use of a low-bandwidth channel (e.g. an 868MHz RF channel) between the central unit and the disarm node. A disarm node storing such audio files may then receive instructions from the central unit to play out particular messages and do so using the stored audio files. Conveniently, the disarm node also includes amicrophone 364 to permit a user at the disarm node to hold a conversation with a human operative in, for example, acentral monitoring station 190, or even with the emergency services - for example if patched through by the central monitoring station. As an alternative, the disarm node may not include a microphone but a co-located external microphone provided to enable a user to speak to operatives in the Central Monitoring Station or the emergency services. Preferably, the disarmnode 150 is secured to the building protected by the security monitoring system, for example attached to an internal wall at a height convenient for user operation - for example fixed at a height between 1 metre and 1.5 metres from the floor. - The system is arranged to permit the system to be armed and disarmed from a disarm node. The disarm node also includes a Near Field Communication antenna and
chip 365 to enable a disarm dongle, such as an NFC-enabled fob, to be used to disarm or arm the system by bringing the dongle within a few centimetres of the disarm node - e.g., by bringing the fob into contact with the disarm node. - The disarm node may also be configured to encrypt its radio transmissions, and to decrypt received signals, so that secure communications with the central unit are possible. The encryption may be based on a secret shared between the
central unit 140 and the disarmnode 150. - The
key fob 370 includes aprocessor 375, with an associatedmemory 376 that stores an identifier for the fob, atransceiver 377, and abattery 378 that provides power to the processor and the transceiver.Transceiver 377 is typically a conventional polling transceiver designed for low power consumption. Such a polling transceiver, when in a resting state, periodically powers just the front end of its receiver circuit to listen for polling signals. If a polling signal is detected, possibly subject to some power level minimum, the rest of the receiver circuit is energised to receive transmissions. Such a polling transceiver may listen for no more than about 100 - 125 ms each second, unless polling signals are detected.
The transceiver, of whatever kind, is controlled by the processor and enables radio communication with thecentral unit 140, the disarmnode 150 and thetransceiver 55 ofcamera 50. The key fob also includes amotion sensor 379, such as an accelerometer, which is used to determine whether the key fob is being carried by someone or whether it is stationary. E.g. whether it has been deposited inside the house. may also include one ormore buttons 380 which a user can use to issue commands or responses. The key fob may also include one or morevisual indicators 385, for example one or more LEDs, to indicate a status, to confirm a button press, or the like. A single multi-coloured indicator, such as an LED, may be used to provide multiple different indications while keeping component count low and enabling the key fob dimensions to be made compact. The key fob may also include one or both of a loudspeaker and ahaptic transducer 390 for providing user feedback. - The key fob is preferably configured to encrypt its radio transmissions, and to decrypt received signals, so that secure communications with the central unit are possible. The encryption may be based on a secret shared between the central unit and the key fob.
-
Figure 4 is a simplified schematic sequence diagram illustrating a method according to an aspect of the invention. In particular, it illustrates in a simplified way how a security monitoring system according to an aspect of the invention responds when an authorised person (someone carrying a registered key fob 370) enters a zone monitored by externalsecurity monitoring camera 50. - Let us imagine that an occupant of a premises (e.g. house) monitored by a security monitoring system according to an embodiment of the invention arms the system and then leaves the house, but then wants to collect her bicycle or scooter from the back garden. The occupant opens the
garden gate 70 and enters the area monitored by thesecurity monitoring camera 50. The opening of thegarden gate 70 triggers, 400, themotion detector 60 associated with thecamera 50, causing a motion trigger signal to be supplied to theprocessor 210 of the camera. Theprocessor 210 then activates one of thetransceivers 55 to transmit, 410, a motion trigger signal to thecentral unit 140. On receiving the motion trigger signal fromcamera 50, thecentral unit 140 starts, 420, an outdoor entry timer. Thecentral unit 140 also transmits, 430, a start wake on radio instruction to thecamera 50. On receiving the start wake on radio instruction, thecamera 50 uses one of itstransceivers 55 to transmit, 440, a low power out of band wake up signal whose strength is sufficient to wake up anykey fob 370 that is within the monitored area. Because the occupant is carrying akey fob 370, her key fob wakes up and transmits, 450, a signal including the fob ID (which can be considered to be the start of a Login cycle). The signal from the key fob is received by thecentral unit 140, and if the fob ID is registered with thecentral unit 140, the central unit pauses, 460, the outdoor entry timer. The outdoor entry timer may be paused for (in effect extended by) a configurable period chosen to be long enough to accommodate the usual coming and going of an occupier. For example, if the occupier keeps a bicycle in the back garden, the paused period should be long enough to enable the occupier to unlock her bicycle, stow the lock, don her helmet, and leave the garden shutting the gate behind her. This period might be of the order of one or two minutes. Meanwhile, the security monitoring system remains armed - so that opening a door or window, for example, will trigger the usual armed away response from the central unit. After the expiry of the paused period, the central unit may revert to its usual armed state, so that subsequently detected motion in the monitored area will again cause the central unit to start an outdoor entry timer. - Alternatively, the
central unit 140 may be configured to disarm the security monitoring system at step 460 - so that, for example, if the fob-carrying occupier were to enter the house from the back garden through theback door 170, the monitoring system would not generate an alarm. If this behaviour is programmed into thecentral unit 140 then it is preferred for the relevant disarm node, here 160, to respond to the detection by thesensor 130 of the opening of theback door 170 by providing some kind of audible or visual indication signifying that the security monitoring system was disarmed as the result of the occupier's presence in the back garden having been detected by virtue of their registered fob. For example, the disarm node could voice a welcome back message confirming that "the monitoring system was armed but that it had been disarmed when we recognised you in the back garden". A further option would be to configure the central unit to re-arm the system (to its previous armed state) in the event that no entry is attempted to the house within a certain period after the disarming of the system, and no motion has been detected in the monitored area for a certain time. In this way, if the occupier had just entered the back garden to take her bicycle or scooter and then left, the premises would once again by protected by the security monitoring system. - The security monitoring installation according to embodiments of the invention may include plural
external cameras 50, each with its own respective monitored area, and the central unit can be configured to disarm the monitoring system, or suspend the outdoor entry timer, only in respect of the monitored area within which akey fob 370 has responded to a wake on radio wake up signal. If the system is configured to disarm just in respect of the relevant monitored area, it may be configured to re-arm the monitoring system in respect of the previously disarmed monitored area following a period of no motion triggers being received from therelevant camera 50. -
Figure 5 is a sequence diagram showing, by way of contrast, what happens when an unauthorised intruder enters the area monitored bysecurity monitoring camera 50. On entering the monitored area, the intruder triggers themotion detector 60 associated with thecamera 50, causing a motion trigger signal to be supplied, 500, to theprocessor 210 of the camera. The processor then activates one of thetransceivers 55 to transmit, 510, a motion trigger signal to thecentral unit 140. On receiving the motion trigger signal fromcamera 50, thecentral unit 140 starts, 520, an outdoor entry timer. Thecentral unit 140 also transmits, 530, a start wake on radio instruction to thecamera 50. On receiving the start wake on radio instruction, thecamera 50 uses one of itstransceivers 55 to transmit, 540, a low-power, out of band wake up signal. Because the intruder is not carrying an authorisedkey fob 370, no response is received to the wake on radio signal, and consequently the outdoor entry timer expires. On expiry, 550, of the outdoor entry timer, thecentral unit 140 determines an alarm event, notifies thecentral monitoring station 190, and instructs thecamera 50 to start transmitting image data which may be supplied to thecentral monitoring station 190. Thecentral unit 140 may also trigger a siren or other alarm indicator at the premises and/or may trigger announcements, for example, from the speaker of thecamera 50 to advise the intruder that they have been spotted. -
Figure 6 is a timing diagram showing the sequence of events and actions of the various elements of the security system that characterise a method, according to an embodiment of the invention, of suspending an outdoor entry timer when the presence of an authorised user is detected. The diagram concerns the operations of the entrance breach detector - e.g., thecamera 50 includingmovement detector 60, thecentral unit 140, and theportable authentication device 370. - The method starts, 599, with the security monitoring system in an armed away state (the described method could equally be performed with the system in an armed at home status, but generally the issue of owner-induced false alarms caused by unintentional triggering of external monitored areas arises when systems are in the armed away state) at 599. At 600 the motion sensor senses an event, for example the opening of the garden gate, in the monitored external area, and this results in the camera's
processor 210 causing anRF transceiver 55 of the camera to transmit an entry violation message. This entry violation message, which includes the camera's ID, is received at a transceiver of thecontrol unit 140. - The
central unit 140 starts, at 610, an entry period timer, which is set for the duration of the period within which a disarm process needs to be completed before the control unit causes the system to enter an alarm condition - for example in the range 20 to 90 seconds (a period set based on the time needed for an occupant/user to disarm the arm - possibly including unlocking the back door, entering the house, and using the disarm node. The central unit identifies the detector that transmitted the motion detection message (which can be considered a form of entry violation message) from the camera ID contained in the received message. Thecentral unit 140 includes the ID code for that camera in a message which it transmits, at 620, to thecamera 50 to cause the camera to transmit, at 630, a beacon signal or polling signal to wake up the transceiver in any portable authentication device (or at least any portable authentication device which is moving or which has not had its transceiver shut down following a period of non-movement) within the vicinity of the targetedcamera 50, and preferably includes a special identifier to be included in the beacon signal or polling signal, and details of a packet countdown (to be described later) to be used. The special identifier will typically be a random or pseudo random number whose value changes at each use. Theportable authentication device 370 listens for beacon signals on one or more channels whose parameters are known to each of the portable authentication devices - for example by having been pre-programmed, but more preferably having been communicated to the or each portable authentication device when that portable authentication device first registered with the central unit (although of course the central unit could periodically update these parameters through an exchange of messages with the portable authentication device(s)). The characteristics of the beacon or polling signal transmitted by thecamera 50 are preferably chosen to make the effective range of the beacon signal small - preferably of the order of a few metres, e.g. no more than 5 metres (but of course depending upon the extent of the monitored area and the range over which an authorised person is likely to roam) for detection by aportable authentication device 370, so that it will only be effective in waking aportable authentication device 370 in the immediate vicinity of thecamera 50. These characteristics will be discussed in more detail later. - The
transceiver 377 of aportable authentication device 370 that is within a few metres of the camera 50 (and that is not currently in a shut-down state following a period of non-movement as determined based on signals from the motion sensor 379) detects, 640, the beacon signal and wakes up. Thetransceiver 377 receives and decodes the beacon signal, retrieving the special identifier (if used). Thecontroller 375 of theportable authentication device 370 then causes thetransceiver 377 of the portable authentication device to transmit, at 650, a message including the portable authentication device ID and the special identifier (if used) to thecentral unit 140. - The
central unit 140 checks that the special identifier (if used) is valid (meaning that it is one issued within the current period of the outdoor entry timer) and also checks to see whether the portable authentication device ID corresponds to one registered with the central unit. If both checks are passed (if a special identifier is being used), the central unit at 660, may suspend the system if the message from theportable authentication device 370, containing the portable authentication device id and the special identifier (if used), was received before expiry of the outdoor entry timer. Thecontrol unit 140 may also at this stage send, 670, a further message to thecamera 50 to cause the camera to provide, 680, a notification of the fact that the presence of an authorisedkey fob 370 has been detected and that the outdoor entry period timer has been suspended. For example, the camera may activate an appropriate indicator light 265 and/or provide a "Welcome" sound or announcement through theloudspeaker 260. Thecamera 50 may also be instructed to send, 685, a further message to theportable authentication device 370 to cause the fob to generate, 690, a signal indicating successful recognition - for example, by illuminating an indicator on the portable authentication device, making an announcement or sound, or vibrating in a characteristic way. - As will be described later, the disarm request message sent by the
portable authentication device 370 to thecontrol unit 140 may also include a report on the RSSI levels of messages received by theportable authentication device 370 from thecamera 50, and thecontrol unit 140 may use the information about measured RSSI levels in such a report in determining whether or not to trust the received disarm request - i.e. whether to disregard the disarm request as invalid on the basis that it is likely to have come from a rogue actor (outside the usual range of the camera) rather than from an authorised user within range of the camera. - At 695, if no appropriate message is received from a
portable authentication device 370 within the outdoor entry timer and no appropriate disarm credentials are received before expiry of the outdoor entry timer, the control unit identifies 140 an alarm state. If the system is backed up by a central monitoring station (CMS) 190, thecentral unit 140 will send a status change message to theCMS 190, typically with the identifier of the camera that first indicated movement (as an example of an entrance breach) event. TheCMS 190 may then cause thecentral unit 140 to activate the camera (plus possibly other video cameras) or other image capture devices, audio capture devices, etc. and provide data feeds from these to theCMS 190. The CMS may also invoke human intervention as appropriate. -
Figure 7 is a flow chart illustrating one possible process for aportable authentication device 370 according to an embodiment of the invention to determine whether to respond to a received transmission. At 1000 the portable authentication device receives an RF transmission at its transceiver (the transceiver not having been shut down following a determination that the portable authentication device is stationary). As a first step, 1100, the portable authentication device determines whether the received transmission is a disarm instruction - that is, including a disarm transmission identifier of some kind, for example being a wake beacon (for example, from acamera 50 as previously described) or disarm success or failure message. If the determination is negative, i.e., it is not a disarm instruction, the process moves to step 1200. - If the determination is positive, the process proceeds to step 1300 in which the movement status of the
portable authentication device 370 is checked. If the portable authentication device is determined to be stationary, the process moves to step 1400. If the portable authentication device is configured to shut down its transceiver following a period of non-movement, when thefob 370 is deemed to be stationary, the portable authentication device will subsequently not receive any RF transmission (until after the portable authentication device is detected as having moved again) and hence this process does not take place. But if the portable authentication device is determined to be moving, at 1600, the process proceeds to step 1800. - At
step 1400, theprocessor 375 determines whether theportable authentication device 370 should be deemed to be stationary, for example by checking a count (or some other measure of elapsed time) since the portable authentication device was last determined to be moving. If the count is less than a predetermined threshold count, theportable authentication device 370 is determined, 1500, to be a "live" portable authentication device which can be used to provide a disarm instruction to the central unit (that is, the portable authentication device is not deemed to be stationary), and the process proceeds to step 1800. If the portable authentication device is deemed to be stationary, then no disarm message will be transmitted by theportable authentication device 370, and the process ends at 1700. - The period of inactivity that is accepted as indicating that a
portable authentication device 370 is "live" may be set differently in different installations, but typically this period will be no more than about 60 seconds. A cut off at 30 seconds will often be long enough for most users, although for system installations where the occupants or users of the secured space are elderly or infirm 30 seconds may not be long enough. Preferably the cut off period is kept relatively short, at no more than a minute or so. - If at
step 1300 the portable authentication device is determined to be moving 1600, the process proceeds to step 1800. - At
step 1800, the portable authentication device generates a transmission message that includes the portable authentication device ID, and the disarm transmission identifier (if used), and such other parameters as the system requires (for example, a report of measured RSSI). - At
step 1200, when the transmission is determined not to be a disarm instruction, the portable authentication device may be programmed simply to read the transmission and act on the contents, or to check for a certain flag or flags and to respond differently based on the flag(s) determined to be present. So, for example, the monitoring system may be so arranged that theportable authentication device 370 is configured to receive an instruction other than a disarm instruction via the transceiver, including a flag, from the control unit to perform an action; and wherein in the event that the other instruction includes the flag, the processor is configured to cause the portable authentication device to perform the instructed action whether or not, when the instruction is received, the portable authentication device is determined to be stationary.Portable authentication devices 370 configured in this way can be activated by an RF signal, from the control unit or from a disarm node, enabling the status of all portable authentication devices in range to be checked and/or updated. It would also be possible to perform an audit of all the portable authentication devices in range of, say, the central unit. If such aportable authentication device 370 were to include one or more of avisual indicator 385, anaudio transducer 390, ahaptic transducer 390, and were further configured to generate an output using one or more of these when so instructed by a received instruction including the flag, a mislaid portable authentication device could be made to announce itself. Of course, this approach would only work with all portable authentication devices if they were either not configured to shut down their transceivers following a period of non-movement, or if none of them had shut down their transceiver when the RF signal from the control unit or disarm node was transmitted. -
Portable authentication devices 370 according to the invention may be configured to listen for instructions related to hands free disarm ( including transmissions fromexternal cameras 50 as previously described) only on a particular channel or channels, with given frequency and given modulation, but to listen to another channel or channels on a different frequency and possibly with different modulation for other kinds of instructions. - Disarm instructions received from a disarm node do not typically contain a portable authentication device ID - because, if more than one portable authentication device is registered with the central unit, it cannot be assumed which if any portable authentication device is being carried by the person who opened the door whose opening has been sensed. But other message may be targeted to a particular portable authentication device or to a group of portable authentication devices that is a subset of all the registered portable authentication devices. Consequently, a portable authentication device according to embodiments of the invention may also be arranged to check the contents of received messages for the presence of that portable authentication device's ID. In this way, the
control unit 140 can target an individualportable authentication device 370 or group of portable authentication devices. For example, in the event that a portable authentication device has been mislaid, a "announce myself" message could be transmitted by the central unit flagged with the ID of the particular portable authentication device that has been mislaid. If other portable authentication devices receive the message, they do not respond to it, because it is flagged as an "announce myself" message and does not contain their ID. Whereas the missing portable authentication device sees that the message is flagged as an "announce myself" message, recognises its own ID, and announces its presence using one or more of its inbuilt indicators (for example one or more LEDs, or providing a haptic announcement - by "buzzing" or vibrating). - In general, monitoring systems according to embodiments of the invention will not be configured to transmit only disarm messages to portable authentication devices, but will also be configured to send other types of messages to
portable authentication devices 370. In systems that do only sendportable authentication devices 370 disarm messages, a portable authentication device just needs to recognise a received message as a disarm message and respond with the disarm transmission identifier (if used) and the portable authentication device ID (although, as will be explained later, portable authentication devices may be required to perform RSSI measurements and include these, or a report based on these, as part of the response). But in systems where there are additional message types, message types will typically fall into two classes: targeted messages that are targeted at a subset of one or more of all the registered portable authentication devices, that include one or more portable authentication device IDs, and in respect of which a reaction is sought only from the portable authentication device(s) having an ID included in the message; and group or general messages, in respect of which a reaction is sought from any portable authentication device that receives the message - and which therefore do not need to include a portable authentication device ID (and which hence will generally not include any portable authentication device ID). For example, a central unit may be configured to instruct the portable authentication device involved in a hands free disarm event to provide a disarm success indicator on a successful disarm event. Such an instruction will preferably include the ID of the portable authentication device that transmitted the disarm request to the central unit (the portable authentication device ID having been included in that disarm request). - Messages may be sent to
portable authentication devices 370 at least from the control unit (of which, in some systems, there may be more than one), disarmnodes 150, andexternal monitoring cameras 50. Where there are multiple message types, they may be labelled Disarm Message, Group, and Targeted - labels which can be considered to be class flags. If finer granularity is required, a further level of flags may be provided - so that a message type is indicated by a primary flag (Disarm Message, Group, or Targeted), and (at least for Group and Targeted) a secondary flag that indicates the specific message type within the class. Alternatively, a single level of flags may be provided, with typically multiple flags for each of the Group and Targeted classes. - Within the 868/869 MHz band in Europe, the sub-band between 869.7 and 870Mhz is particularly interesting for use when transmitting short-range beaconing signals from the disarm nodes because it provides a relatively wide channel, the beacon channel, which allows the use of a high data rate, e.g. 250 kbit/s, which is helpful in reducing the effective range of the beacon signal. The effective radiated power ceiling of 5mW also poses no significant constraint for this application. For these reasons, this sub-band between 869.7 and 870Mhz is the preferred frequency band for the short-range transmissions from the disarm node - and which are used for communication with portable authentication devices, e.g., for the transmission of wake up messages.
- Although, for the reasons just given, we prefer to transmit the beacons from the disarm node closest to the entrance which gave rise to the alarm trigger signal, alternatives are possible.
- For example, a sensor that detects the breaching of an entrance transmits an alarm trigger signal, including a sensor identifier, that is detected by the control unit. The control unit recognises the sensor identifier and uses this to retrieve the identifier for the disarm node that is associated with the relevant sensor. The control unit then transmits a message, which may be a wake up message, including the relevant disarm node identifier which has the effect of causing the relevant disarm node to listen for signals from fobs (portable identification devices). The control unit then transmits a fob wake up signal receivable by any fob adjacent any of the disarm nodes. Any fob that receives the fob wake up signal from the control unit then responds by transmitting a response signal, including its own identifier, that is only detectable by a disarm node within no more than about 2 metres of the fob (using appropriately selected transmission characteristics of power, data rate, etc. to ensure a short effective transmission range). A disarm node receiving the fob response signal then transmits a signal, including the fob identifier, to the control unit which then determines whether the fob identifier is for a registered fob. In this way only the disarm node whose identifier was included in the transmission from the control unit detects the fob response.
- As a further alternative, the disarm node may be configured to generate an alarm trigger signal that is transmitted to the control unit in response to receiving an entrance breach signal from a sensor configured to detect the breaching of an entrance to the building or secured space. That is, the sensor transmits a signal in respect of a detected breach, which signal is received by the associated disarm node rather than by the control unit. The control unit then transmits a fob wake up signal receivable by any fob adjacent any of the disarm nodes. Any fob that receives the fob wake up signal from the control unit then responds by transmitting a response signal, including its own identifier, that is only detectable by a disarm node within no more than about 2 metres of the fob. A disarm node receiving the fob response signal then transmits a signal, including the fob identifier, to the control unit which then determines whether the fob identifier is for a registered fob. In this way only the disarm node whose identifier was included in the transmission from the control unit detects the fob response. However, this approach is less preferred than the alternatives already mentioned, because if the signal from the sensor detecting the breach of an entrance is only received by the control unit through the disarm node, rather than directly, the security of the system is reduced - the disarm node becomes a point of weakness, because if it is disabled or its signals blocked in some way by a bad actor, the control unit will not receive any alarm trigger signal in respect of the breach. For this reason, it would be desirable to include anti-tampering features in the disarm node, such as sensors to detect and report on attempts to open the disarm node, and possible also implementing a "heartbeat" function in which the disarm node periodically "checks-in" with the control unit - the failure of the control unit to receive the heartbeat, or the reception of a tamper message from the disarm node causing the control unit to determine an alarm condition which is reported to the central monitoring station (if present) and to provide alarm signals (audio and optical) through the alarm installation - as well as sending reports to the user's phone - email, as appropriate. Such extra security features may also be present in disarm nodes according to any of the other embodiments and variants.
- Achieving effective battery life of nodes and sensors in alarm and monitoring systems is a constant concern, because battery failure disables the relevant node or sensor, which can lead to loss of security, and battery replacement may involve a site visit by the system supplier - which is expensive and inconvenient. For a portable authentication device, loss of battery power means that the portable authentication device stops working, which is inconvenient for the user, and the cause of the failure may not be apparent to the user so that the user may require a site visit to identify and fix the problem. Consequently, we are interested in reducing power consumption in all of the battery powered components of the system, including the portable authentication device. For this reason the use of a wake on radio receiver in the portable authentication device is attractive although acceptable battery life can also be obtained using a more conventional radio receiver that periodically wakes to listen (poll) for beacon signals.
- One way of reducing portable authentication device power consumption during the wake up process is for the portable authentication device to use 2-stage detection, an example of which is illustrated in
Figure 8 . A first detection stage of the transceiver of the portable authentication device may be used to perform a first step which involves just checking an RSSI level. For example, the transceiver in the portable authentication device may perform periodically a brief RSSI check polling the beacon channel, using just the RF front end of the transceiver, for example for a first period of less than a few milliseconds, preferably a fraction of a millisecond, e.g. around 0.5 milliseconds, and then revert to its rest state if the sensed RSSI level is below some pre-set threshold. If the sensed RSSI level is above threshold, the portable authentication device listens for a brief period for a synch word from the disarm node - for example for a second period of a few milliseconds, for example for less than 10 milliseconds, e.g. 5ms. If no synch word is detected, the transceiver reverts to its rest state. But if a synch word is detected, the transceiver starts the full radio receiver which remains powered up, for example for a third period of between say 8 to 16ms, for example 10ms, to receive the full wake up packet. Each packet will typically last of the order of 220µs, and the disarm node may transmit for 2 to 4 seconds, e.g. for 3 seconds - meaning that the portable authentication device should be able to receive 20 to 30 packets. Clearly, the choice of duration for the various periods is a trade-off between power consumption, user experience and accuracy - but the timings given represent a reasonable compromise as a starting point to be adjusted as necessary. - RSSI detection can be achieved by activating just front end components of the transceiver, avoiding the need to power up all of the transceiver. If the detected RSSI level is below a threshold, the portable authentication device determines that there is unlikely to be valid data available and halts its RSSI check until the next cycle. The cycle period determines the length of time for which the disarm node needs to transmit its beacon and also sets a lower bound on how quickly hands-free disarm is likely to occur on average. The portable authentication device wake up interval, which is controlled by a clock in the portable authentication device, will typically be chosen based on the duration of the disarm node beacon. For example, if the disarm node transmits its beacon for 2 seconds, then a portable authentication device wake up interval of one second would provide a good likelihood that a f portable authentication device within range of a broadcasting disarm node would be able to wake and retrieve the necessary information from the beacon signal. A portable authentication device wake up of interval (period between polling events) of 2 seconds will often be frequent enough when the disarm node is configured to transmit its beacon signal for 3 seconds. The portable authentication device wake up interval can conveniently be set at between a quarter and two thirds of the beacon duration. By having the portable authentication device check the RSSI for a very brief period, for example a few milliseconds, at each polling event, good battery life can generally be obtained. A shorter relative cycle time is not technically problematic, but it is likely to use proportionally more battery power and hence shorten battery life commensurately. The cycle time could be more than one half of the beacon duration, provided the system enables the portable authentication device to capture the beacon quickly after wake up, so that the necessary special ID (if used) can be recovered by the portable authentication device.
- The disarm node transmits a beacon signal, on the beacon channel, which preferably includes the special codeword (shown as ID in
Figure 8 ) received from the control unit for this hands free disarm event. Typically, the beacon signal will be made up of a sequence of packets, each beginning with a preamble, followed by a synch word, then an identifier which is the special ID from the central unit. Preferably, each packet includes a countdown value, the countdown value decreasing by one in each subsequent packet (to zero in the final packet of the sequence) and indicating the number of packets until the end of the sequence of packets. - The beacon signal is recognised as such by the portable authentication device, because it is the only message of that kind with the relevant format in that channel, causing the portable authentication device to transmit a response including the special codeword (special I.D.).
- By including sequence information in the beacon from the disarm node, it becomes possible for the portable authentication device to determine when the beacon transmission will end. Using this information, the portable authentication device can delay transmitting its response to the central unit until after the disarm node has finished transmitting - so that it is easier for the central unit to detect the response from the portable authentication device without local interference. This means that portable authentication device transmit power can be kept low, prolonging the life of the portable authentication device's battery, while still enabling the control unit to receive the portable authentication device 's response. In addition, when the portable authentication device captures beacon packets, it can calculate how long it will be before the sequence ends. If the captured packets are early in the sequence, the portable authentication device can "snooze" or power down while waiting for the sequence to end, and then wake again in order to transmit its response to the central unit just after the sequence ends.
- The portable authentication device will listen to multiple packets to be able to use statistics to get a reliable RSSI figure, and may report on the RSSI figure for each of the packets detected.
- As a refinement, the portable
authentication device controller 375 may use movement information from the portable authentication device's built-inmovement sensor 379 to control the polling by the portable authentication device'stransceiver 377. That is, polling may be suspended in the event that the processor deems that the portable authentication device is stationary - e.g. if movement sensor detects no movement, and the processor determines that a count since the portable authentication device was last determined to be moving is more than a predetermined threshold count, the portable authentication device is deemed to be stationary and polling may be suspended completely or the frequency of polling reduced (the preferred option, since that means that "lost" portable authentication devices can be made to announce themselves when they next poll). For example, the frequency of polling may be reduced to between a half and a twentieth, or less, of the usual frequency. Conversely, if the processor determines that the portable authentication device is still moving, or has recently been moving (so that the portable authentication device is not deemed to be stationary), the usual polling frequency is maintained. The processor of the portable authentication device may be configured to cease generating the running count of the time since the portable authentication device was last in motion after the count of the time since the fob was last in motion reaches the predetermined threshold value, as this can reduce portable authentication device energy consumption, which is good for improving battery life. - In order to reduce the effective range of the radio beacon, it is transmitted from the disarm node at a low power (e.g. -20dBm or less) with a high data rate (for example, 250kbps or more, say 400 kbps) and with a low modulation index, to give an effective range of no more than about 5 metres. By using a suboptimal modulation index we achieve three things: quickly send a lot of packets, reduce sensitivity to decrease range and to fit inside the given spectrum. We limit the output power from the disarm node to limit range. To make it harder to receive from a greater distance we have a high data rate and low modulation index. However the main reason is not the poor link budget but the speed. The higher the bitrate the more packets can be used for estimation. Sensitivity is in the range of around -90dBm at this settings and we try to be in line of sight, meaning that the distance from the transmitter is given as the fading of the channel with distance, using the Friis formula .
- Encryption, for example based on shared keys, is preferably used for all transmissions from and to the control unit in each of the embodiments of the invention.
- As mentioned previously, a further option to improve security, which may be used with any or all of the preceding options to further enhance the security of the system, is for the portable authentication device to include in the response message sent to the control unit details of the results of RSSI determinations made by the portable authentication device. In particular, the disarm node may be configured to send a series of wake up messages upon being prompted by the control unit to send a disarm instruction, preferably including a unique disarm transmission identifier, to the portable authentication device . And the portable authentication device may be configured to determine the RSSI level of each of the messages of the series that are received from the disarm node. The portable authentication device may be configured to include in the disarm request sent to the central unit a report based on the determined RSSI levels. For example, the portable authentication device may be configured to send a summary of the RSSI levels measured, such as the number of messages/packets measured or measured above a certain level, maximum RSSI level, average RSSI level, etc.
- Inclusion of the RSSI data can be used by the system to reduce the susceptibility of the system to "relay attacks" of the type used to fool passive entry systems (PES) of cars.
- The portable authentication device would report RSSI values as, for example, max/min values, and an average, and the central unit may hold factory pre-set values for a "real" disarm, and/or these may be supplemented or replaced with real world values obtained during commissioning/testing of the system.
- Instead of the identity of the portable authentication device being checked by the control unit, it would also be possible for the disarm node(s) to include a list of registered portable authentication devices and for the disarm node(s) rather than the control unit to perform the check of authentication device identity on receipt of the authentication devices response to the wake up signal/beacon. The disarm node would, on successful authentication transmit an alarm deactivation message to the control unit. Such an approach would of course require that the control unit update the disarm node(s) with additions and deletions to the list of registered authentication devices. This is a less preferred approach because of the need for the increased burden of keeping up to date lists in both the control unit and the disarm node(s).
- Also, although as thus far described any disarm transmission identifier or event ID has been generated by the central unit and then transmitted to a disarm node for inclusion in a wake up message from the disarm node, other alternatives are of course possible. For example, the disarm node could itself generate a disarm transmission identifier or event ID and either provide this to the central unit for the central unit to check any received fob transmission for the presence of the correct disarm transmission identifier or event ID or itself check any received fob transmission for the presence of the correct disarm transmission identifier or event ID and transmit the result of the check to the central unit. In general, it is preferable for the disarm transmission identifier or event ID to be generated and checked by the central unit, rather than devolving either or both these functions to a disarm node, because this reduces the risk of a bad actor adopting the guise of a disarm node to fool the system.
Claims (20)
- A security monitoring system including:a system controller;a video camera arrangement (50), coupled to a motion sensor (60), arranged to monitor a surveillance area;a portable token (370) storing a token ID;the video camera (50) being configured on receipt of a motion detection signal from the motion sensor (60) to send an alert to the system controller;the system controller being configured in an armed state, on receipt of an alert from the video camera (50), to start an event timer and to send an instruction to the video camera (50) to broadcast a token (370) activation signal, the instruction including an event identifier;the video camera (50) further being configured to, on receipt of the instruction from the system controller, broadcast a token (370) activation signal including the event identifier;the portable token (370) being configured to respond to receipt of a token (370) activation signal from the video camera (50) by broadcasting a response including the token ID and the event identifier;the system controller further being configured:on receipt of a response from the token (370) to:compare the event identifier included in the response with the event identifier included in the instruction to the video camera (50);compare the token ID included in the response with one or more stored token IDs;and to suspend the event timer if both comparisons provide a match;if either no response is received or one or both comparisons do not provide a match, to determine an alarm event on expiry of the event timer.
- A security monitoring system as claimed in claim 1, wherein the video camera (50) and motion sensor (60) are arranged to survey a surveillance area and the video camera (50) is configured to broadcast the token (370) activation signal as a radio signal having an effective range that does not extend significantly beyond the surveillance area.
- A security monitoring system as claimed in claim 1 or claim 2, wherein the portable token (370) includes a processor coupled to a token (370) movement sensor, and the token (370) is configured to respond to token (370) activation signals only if the processor determines that the token (370) is moving.
- A security monitoring system as claimed in any one of the preceding claims, wherein RF communication means of the portable token (370) includes a wake on radio receiver, and the video camera (50) is configured to broadcast token (370) activation signals as wake on radio signals to which the token (370) is responsive.
- A security monitoring system as claimed in any one of the preceding claims, wherein the portable token (370) is configured to include RSSI data in its response to the token (370) activation signal from the video camera (50).
- A security monitoring system as claimed in claim 5, wherein the system controller is configured to use the RSSI data included in the token (370) response in determining whether to trust the received response.
- A security monitoring system as claimed in claim 6, wherein the system controller is configured to regard the token (370) response as invalid if the RSSI data included in the token (370) response suggest that the response has come from outside the usual range of radio signals from the camera.
- A security monitoring system as claimed in any one of the preceding claims, wherein radio frequency transceivers (55) of the portable token (370), the video camera (50) and the system controller are configured to operate in the industrial, scientific and medical, ISM, radio bands.
- A security monitoring system as claimed in any one of the preceding claims, wherein the video camera (50) is configured, on instruction from the system controller to transmit video images captured by the video camera (50) using Wi-Fi.
- A security monitoring system as claimed in any one of the preceding claims, wherein the system controller is configured, in an armed state, to disarm the security monitoring system if both comparisons provide a match.
- A security monitoring system as claimed in any one of claims 1 to 9, wherein the system controller is configured in an armed state, if both comparisons provide a match, to disarm the security monitoring system only in respect of the monitoring of the surveillance area.
- A video camera (50) for use in a security monitoring system as claimed in any one of the preceding claims, the video camera (50) including an image sensor, a radio frequency transmitter, a radio frequency receiver, and a processor operatively connected to the image sensor, the radio frequency transmitter and the radio frequency receiver, the processor being configured, on receipt of a motion trigger signal from a motion sensor (60) to:transmit, using the radio frequency transmitter, a flag signal to the system controller of the security monitoring system;in response to receiving, via the radio frequency receiver, an instruction from the controller to cause the radio frequency transmitter to transmit a token (370) activation signal.
- The video camera (50) as claimed in claim 12, wherein the token (370) activation signal is a wake on radio signal.
- The video camera (50) as claimed in claim 12, wherein the motion sensor (60) is part of the video camera (50).
- The video camera (50) as claimed in any one of claims 12 to 14, wherein the video camera's radio frequency transmitter and radio frequency receiver are configured to operate within the industrial, scientific and medical, ISM, radio bands.
- The video camera (50) as claimed in claim 15, wherein the radio frequency receiver and the radio frequency receiver are configured to operate in the 868 MHz band.
- The video camera (50) as claimed in any one of claims 12 to 16, further comprising an RF transmitter configured to transmit Wi-Fi signals.
- The video camera (50) as claimed in claim 17, wherein the processor is configured, on instruction from the controller of a security installation to activate the RF transmitter to transmit via Wi-Fi video images captured by the video camera (50).
- A method of configuring a security monitoring system, the method comprising:providing a system controller;a remote video camera (50) coupled to a motion sensor (60); anda portable token (370) storing a token ID;the video camera (50) being configured on receipt of a motion detection signal from the motion sensor (60) to send an alert to the system controller;the system controller being configured, on receipt of an alert from the video camera (50), to start an event timer and to send an instruction to the video camera (50) to broadcast a token (370) activation signal, the instruction including an event identifier;the video camera (50) further being configured to, on receipt of the instruction from the system controller, broadcast a token (370) activation signal including the event identifier;the portable token (370) being configured to respond to receipt of a token (370) activation signal from the video camera (50) by broadcasting a response including the token ID and the event identifier;the system controller further being configured:
on receipt of a response from the token (370) to:compare the event identifier included in the response with the event identifier included in the instruction to the video camera (50);compare the token ID included in the response with one or more stored token IDs;and to suspend the event timer if both comparisons provide a match;if either no response is received or one or both comparisons do not provide a match, to determine an alarm event on expiry of the event timer. - A method of operating a security monitoring system, the security monitoring system including:a system controller;a video camera (50), coupled to a motion sensor (60), arranged to monitor a surveillance area; anda portable token (370) storing a token ID;the method comprising:monitoring the surveillance area using the video camera (50) and motion sensor (60);on receipt by the video camera (50) of a motion detection signal from the motion sensor (60) sending an alert to the system controller;on receipt of an alert from the video camera (50), the system controller starting an event timer and sending an instruction to the video camera (50) to broadcast a token (370) activation signal, the instruction including an event identifier;the video camera (50), on receipt of the instruction from the system controller, broadcasting a token (370) activation signal including the event identifier;the portable token (370) responding to receipt of the token (370) activation signal from the video camera (50) by broadcasting a response including the token ID and the event identifier;the system controller: on receipt of a response from the token (370), comparing the event identifier included in the response with the event identifier included in the instruction to the video camera (50);comparing the token ID included in the response with one or more stored token IDs;and suspending the event timer if both comparisons provide a match;if either no response is received or one or both comparisons do not provide a match, determining an alarm event on expiry of the event timer.
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PL21174825.6T PL4092643T3 (en) | 2021-05-19 | 2021-05-19 | A security monitoring system |
EP21174825.6A EP4092643B1 (en) | 2021-05-19 | 2021-05-19 | A security monitoring system |
ES21174825T ES2969462T3 (en) | 2021-05-19 | 2021-05-19 | A security surveillance system |
BR112022026271A BR112022026271A2 (en) | 2021-05-19 | 2022-05-18 | A SECURITY MONITORING SYSTEM |
PCT/EP2022/063376 WO2022243345A1 (en) | 2021-05-19 | 2022-05-18 | A security monitoring system |
ARP220101335A AR125918A1 (en) | 2021-05-19 | 2022-05-19 | SECURITY MONITORING SYSTEM |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21174825.6A EP4092643B1 (en) | 2021-05-19 | 2021-05-19 | A security monitoring system |
Publications (3)
Publication Number | Publication Date |
---|---|
EP4092643A1 EP4092643A1 (en) | 2022-11-23 |
EP4092643B1 true EP4092643B1 (en) | 2023-12-20 |
EP4092643C0 EP4092643C0 (en) | 2023-12-20 |
Family
ID=76011862
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP21174825.6A Active EP4092643B1 (en) | 2021-05-19 | 2021-05-19 | A security monitoring system |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP4092643B1 (en) |
AR (1) | AR125918A1 (en) |
BR (1) | BR112022026271A2 (en) |
ES (1) | ES2969462T3 (en) |
PL (1) | PL4092643T3 (en) |
WO (1) | WO2022243345A1 (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7015806B2 (en) * | 1999-07-20 | 2006-03-21 | @Security Broadband Corporation | Distributed monitoring for a video security system |
US9681103B2 (en) * | 2012-11-13 | 2017-06-13 | International Business Machines Corporation | Distributed control of a heterogeneous video surveillance network |
US9325949B2 (en) * | 2012-11-19 | 2016-04-26 | Qualcomm Incorporated | Intrusion detection |
US9472077B2 (en) * | 2014-08-01 | 2016-10-18 | Francis Joseph Coviello | Surveillance of a secure area |
-
2021
- 2021-05-19 ES ES21174825T patent/ES2969462T3/en active Active
- 2021-05-19 EP EP21174825.6A patent/EP4092643B1/en active Active
- 2021-05-19 PL PL21174825.6T patent/PL4092643T3/en unknown
-
2022
- 2022-05-18 WO PCT/EP2022/063376 patent/WO2022243345A1/en active Application Filing
- 2022-05-18 BR BR112022026271A patent/BR112022026271A2/en unknown
- 2022-05-19 AR ARP220101335A patent/AR125918A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
BR112022026271A2 (en) | 2023-12-05 |
EP4092643A1 (en) | 2022-11-23 |
PL4092643T3 (en) | 2024-04-22 |
EP4092643C0 (en) | 2023-12-20 |
WO2022243345A1 (en) | 2022-11-24 |
AR125918A1 (en) | 2023-08-23 |
ES2969462T3 (en) | 2024-05-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10467887B2 (en) | Systems and methods of integrating sensor output of a mobile device with a security system | |
US10165401B2 (en) | Adjusting security in response to alert communications | |
JP3874122B2 (en) | Portable alarm system | |
US20160189496A1 (en) | Systems and methods of intrusion detection | |
US20050134450A1 (en) | Integrated alarm detection and verification device | |
US20180066861A1 (en) | Systems and methods of detection with active infrared sensors | |
AU2024202157A1 (en) | A security monitoring system | |
US9734697B1 (en) | Automatic notify mode for security system | |
WO2016109335A1 (en) | Systems and methods of intrusion detection | |
EP4038597B1 (en) | A security monitoring system | |
EP4092643B1 (en) | A security monitoring system | |
AU2020265397A1 (en) | Disarm node and security monitoring system including such a node | |
RU148910U1 (en) | AUTONOMOUS RADIO CHANNEL GSM SIGNAL | |
RU2303289C1 (en) | System for individual protection of real estate | |
JP4530696B2 (en) | Security system | |
WO2022268922A1 (en) | A security monitoring system | |
EP2390854B1 (en) | A method and a system for arming and disarming | |
KR100807814B1 (en) | Cooperation crime prevention burglar alarm system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20221130 |
|
RBV | Designated contracting states (corrected) |
Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20230713 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: VERISURE SARL |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602021007807 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
U01 | Request for unitary effect filed |
Effective date: 20240117 |
|
U07 | Unitary effect registered |
Designated state(s): AT BE BG DE DK EE FI FR IT LT LU LV MT NL PT SE SI Effective date: 20240125 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20240321 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20240321 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2969462 Country of ref document: ES Kind code of ref document: T3 Effective date: 20240520 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20231220 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20231220 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20240420 |
|
U20 | Renewal fee paid [unitary effect] |
Year of fee payment: 4 Effective date: 20240528 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: IE Payment date: 20240527 Year of fee payment: 4 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: ES Payment date: 20240603 Year of fee payment: 4 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20231220 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20231220 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20231220 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20231220 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20231220 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20240420 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20231220 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: NO Payment date: 20240530 Year of fee payment: 4 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: PL Payment date: 20240520 Year of fee payment: 4 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602021007807 Country of ref document: DE |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |