EP1564700A1 - System and method for remote access to security event information - Google Patents
System and method for remote access to security event information Download PDFInfo
- Publication number
- EP1564700A1 EP1564700A1 EP05002498A EP05002498A EP1564700A1 EP 1564700 A1 EP1564700 A1 EP 1564700A1 EP 05002498 A EP05002498 A EP 05002498A EP 05002498 A EP05002498 A EP 05002498A EP 1564700 A1 EP1564700 A1 EP 1564700A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- security
- video
- security event
- data
- event data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims description 29
- 238000013480 data collection Methods 0.000 claims abstract description 30
- 238000001514 detection method Methods 0.000 claims description 16
- 230000008569 process Effects 0.000 claims description 9
- 239000011521 glass Substances 0.000 claims description 2
- 238000012544 monitoring process Methods 0.000 claims description 2
- 238000005516 engineering process Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 5
- 230000001413 cellular effect Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000007726 management method Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000001454 recorded image Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19665—Details related to the storage of video surveillance data
- G08B13/19671—Addition of non-video data, i.e. metadata, to video stream
- G08B13/19673—Addition of time stamp, i.e. time metadata, to video stream
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19654—Details concerning communication with a camera
- G08B13/19656—Network used to communicate with a camera, e.g. WAN, LAN, Internet
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19678—User interface
- G08B13/19684—Portable terminal, e.g. mobile phone, used for viewing video remotely
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19697—Arrangements wherein non-video detectors generate an alarm themselves
Definitions
- the present invention relates to security systems and, in particular, security systems including a mobile component for accessing and/or receiving security data at a remote location.
- a variety of security data may be communicated to a central surveillance location from various security devices.
- security personnel who desire access to such security data must access the data from the central location. This inhibits their ability to investigate incidents in person and to be timely notified of various occurrences. For example, security personnel who wish to view live or recorded video from a security camera must do so at the central surveillance location.
- security personnel may find it desirous to be actively notified of the occurrence of a security event while away from a central location and to be provided with information related to the event, such as video clips and when the event transpired.
- FIG. 1 is a schematic block diagram illustrating a security system including a system for remote access to security event information, consistent with one embodiment of the present invention
- FIG. 2 is a schematic block diagram illustrating one embodiment of the system for remote access to security event information
- FIG. 3 is a schematic block diagram illustrating another embodiment of the system for remote access to security event information.
- FIG. 4 is a flow chart illustrating a method for remote access to security event information, consistent with one embodiment of the present invention.
- FIG. 1 is a block diagram of an exemplary security system 100 consistent with an embodiment of the present invention.
- the security system 100 may include one or more remote or mobile access devices 112 connected to a remote access system 120 for remotely receiving and evaluating security event information.
- the security system 100 may include a security event data collection system 102 that collects security event data (also referred to as alarm data) from collection or detection devices 104 and a video surveillance system 108 that captures images of security events using one or more cameras 110.
- the security event data collection system 102, the video surveillance system 108 and the remote access system 120 may be connected to and communicate via a network 150 such as an Ethernet.
- the remote access system 120 may include a consolidated database 130 that receives and stores the security data from the security event data collection system 102 and from the video surveillance system 108.
- the consolidated database 130 may link the event data for a particular event to the video data available for that event.
- the remote access system 120 may notify the access device 112 of an event and deliver event data together with video data related to the event, for example, in an event message.
- the access device 112 may initiate communication with the remote access system 120 to access the security data in the consolidated database 130.
- the access device 112 may be used to view the event data and to play back the video associated with the event.
- the access device 112 may be a portable personal digital assistant (PDA), cellular telephone, pager, personal computer, computer terminal, laptop computer, or information kiosk. Those skilled in the art will recognize that the access device 112 may connect to and communicate with the remote access system 120 in a variety of ways. The connection may be over the internet or through a wireless network such as a wireless local area network (WLAN) or a cellular wide area network (WAN). The access device 112 may also connect directly to the network 150 through an access point 114 and may receive data directly from the collection system 102 or the video surveillance system 108.
- PDA portable personal digital assistant
- WLAN wireless local area network
- WAN cellular wide area network
- the security event data collection system 102 may include any system for detecting and/or collecting security event data including, but not limited to, an electronic article surveillance (EAS) based system, a radio frequency identification (RFID) based system, a motion detection system, an entry/exit monitoring system, a glass window and door breakage detection system, temperature sensing system, a fire detection system, a gas detection system, an intrusion detection system, and an electronic access control system.
- EAS electronic article surveillance
- RFID radio frequency identification
- RFID radio frequency identification
- a motion detection system an entry/exit monitoring system
- a glass window and door breakage detection system temperature sensing system
- a fire detection system a gas detection system
- an intrusion detection system an electronic access control system.
- One example of the security event data collection system 102 is the SENSORMATIC® ULTRALINK® EAS system available from ADT Security Services, Inc., a division of Tyco International Ltd.
- the collection devices 104 may detect security events such as detection of an active EAS tag, detection of an RFID label, a point of sale (POS) transaction, a door or window opening or breaking, or a gas or fire.
- security events such as detection of an active EAS tag, detection of an RFID label, a point of sale (POS) transaction, a door or window opening or breaking, or a gas or fire.
- the data collection system 102 When security events are detected, the data collection system 102 generates event or alarm data indicative of the detected event.
- the event or alarm data may include time stamps indicating a time of occurrence of the events as well as information describing the location of the event and the nature of the event or alarm.
- the video surveillance system 108 may include any system for capturing images of security events.
- One example of the video surveillance system 118 is the INTELLEX® V 3.1 video surveillance system available from ADT Security Services, Inc., a division of Tyco International Ltd.
- the video camera 110 may take video of a surveillance area on a continuous basis or at predefined intervals.
- the surveillance area may be, for example, an exit/entrance of a retail store, an area around a cash register, an area around a protected asset, and the like.
- the camera 110 may be oriented in a fixed direction or the position of the camera 110 may be controlled, for example, to adjust the pan-tilt-zoom of the camera 110 and/or to position the camera 110 at various viewing angles.
- the video surveillance system 108 may store the video data representing the recorded images on a multimedia server such as a digital video recorder (DVR) or a personal computer.
- the video surveillance system 108 may also store data pertaining to the recorded video such as time stamps, duration of the video clips, and a location of the surveillance area.
- the video surveillance system 108 may also capture and store audio associated with the images.
- the security system 100 may optionally include an object recognition system 106 connected to the network 150 and/or connected directly to the video surveillance system 108.
- the object recognition system 106 may be configured to recognize any variety of objects entering the surveillance area.
- the object recognition system 106 may receive live video from the camera 110 and analyze the video to detect if an object has entered the surveillance area.
- the object recognition system 106 may compare data representative of the detected object with data representative of a plurality of known objects to ascertain if an acceptable correlation exists. If a correlation exists, the object recognition system 106 may act as a security event data collection system and provide event data to the consolidated database 130.
- the live video from the camera 110 may be communicated to the object recognition system 106 and video surveillance system 108 in a variety of ways, e.g., through network cables or a wireless connection.
- the object recognition system 106 may include a computer provided in a variety of known configurations to analyze the live video from the camera 110 and/or store information about the video, as well as information about any events associated with or detectable from the video.
- the remote access system 120 may be implemented as a consolidated, server-based architecture used for the collection, storage and transmission of security event information.
- the remote access system 120 may include an alarm interface 122 that obtains event/alarm data 124 from the security event data collection system 102 and a video interface 126 that obtains video data 128 from the video surveillance system 108.
- the remote access system 120 may obtain the event data and video data for both real-time use (e.g., notification of an event when the event occurs) and after the fact use (e.g., for use in a report on events).
- the remote access system 120 may employ a common mechanism to format event records in the consolidated database 130.
- an initialization file may be used to determine the fields that will reside in an event record and to determine the field ordering.
- the initialization file may provide an XML description of the event interface to specify record content and field ordering.
- the consolidated database 130 links the event/alarm data and the video data corresponding to a particular event and stores the linked alarm and video data 132.
- the consolidated database 130 may be implemented as a relational database, for example, using a database server and database management system software such as the type available from Microsoft or Oracle.
- the linked event/alarm data and video data may be stored in a combined table in the consolidated database 130.
- Database synchronization software may be activated to transfer the security event data and/or video data to the consolidated database 130.
- the video data linked to the event data may include digitized video clips as well as information about the video.
- the digitized video clips may be stored directly on the consolidated database 130 as embedded video.
- the embedded video clips may be stored in a highly compressed format using techniques known to those skilled in the art.
- the digitized video clips may include linked video resident on a separate multimedia server (e.g., in the surveillance system 108).
- the digitized video clips on a separate multimedia server may also be associated with the event data on the consolidated database 130 through database relations.
- the video data stored on the consolidated database 130 includes information about the video clips (e.g., time stamps and duration).
- digitized video may also be streamed directly to and stored in the mobile access device 112.
- the event/alarm data 124 and the video data 126 may be linked based on an indication of when a security event occurred.
- the event/alarm data 124 and the video data 126 include timestamps indicating the time that the events occurred and the time when the video was taken.
- Both the data collections system 102 and the video surveillance system 108 may use Universal Coordinated Time (UTC) from a hardware timestamp source to provide an accurate and consistent timestamp.
- UTC Universal Coordinated Time
- the consolidated database 130 may include a device management table 134 containing device information pertaining to the collection devices 104.
- the device management table 134 allows a user to obtain information on the collection devices 104 and/or to manage the collection devices 104 using the mobile access device 112.
- the consolidated database 130 may also include notification rules 136 that trigger notification processes, as described below.
- the mobile access device 112 may be used to customize the notification process by accessing and modifying the notification rules. Additionally, the rules may be modified externally over the World Wide Web using the web server 162.
- One embodiment of the remote access system 120 may include a wireless interface 160 to connect with the mobile access device(s) 112 and to transmit data in a format suitable for wireless transmission.
- the wireless interface 160 may be implemented using wireless technologies known to those skilled in the art such as the short-range radio technology known as Bluetooth and various longer-range radio technologies such as cellular protocols.
- the remote access system 120 may include a web server 162 to make the consolidated database 130 available to an access device 112.
- the web server may be an Internet Information Services (IIS) Web server available from Microsoft.
- IIS Internet Information Services
- the web server 162 may be used to deliver the data on web pages, such as active server pages (ASP), in response to a hypertext transfer protocol (HTTP) request from a mobile access device 112.
- ASP active server pages
- HTTP hypertext transfer protocol
- the remote access system 120 may include a notification/messaging system 164 to provide notification of events.
- the notification/messaging system 160 may transmit an event or alarm message to the mobile access device 112, for example, on a subscription basis.
- the message may be sent to the user in the form of an email with the event data and video data.
- the video data in the message may include an embedded video clip or a link to a location where the video clip is stored.
- Web services publish/subscribe mechanisms may be used to provide notification of events.
- the remote access system 120 may support extensible markup language (XML), Simple Object Access Protocol (SOAP) and Uniform Device Discovery Interface (UDDI) standards.
- XML extensible markup language
- SOAP Simple Object Access Protocol
- UDDI Uniform Device Discovery Interface
- the remote access system 120 may also incorporate asynchronous messaging systems such as the messaging queue systems available from IBM under the name IBM MQ Series and from Microsoft under the name MSMQ.
- a messaging queue system is capable of delivering suitably formatted communications to subscribers using wired or wireless communications.
- the system may also use a time coordination protocol supported by asynchronous messaging, such as Lamport's Algorithm.
- the remote access system 120 may also include information security protection using security technologies known to those skilled in the art. Examples of security technologies that may be used include two-factor authentication, Public Key Infrastructure (PKI) security, secure sockets layer (SSL) and digital certificates.
- PKI Public Key Infrastructure
- SSL secure sockets layer
- Connection to the consolidated database 130 may be implemented using standardized database connection technologies such as Open Database Connectivity (ODBC), Java Database Connectivity (JDBC) and ActiveX Data Objects (ADO). Enterprise Application Interface (EAI) applications may also use the database connection to direct data from the consolidated database 130 into enterprise applications known to those skilled in the art. Access to the data in the consolidated database 130 may be provided via XML I/O, database synchronization, an enterprise connection, or using other techniques known to those skilled in the art.
- ODBC Open Database Connectivity
- JDBC Java Database Connectivity
- ADO ActiveX Data Objects
- Enterprise Application Interface (EAI) applications may also use the database connection to direct data from the consolidated database 130 into enterprise applications known to those skilled in the art. Access to the data in the consolidated database 130 may be provided via XML I/O, database synchronization, an enterprise connection, or using other techniques known to those skilled in the art.
- the remote access system 120, the data collection system 102, and the video surveillance system 108 may be networked using the Zero Configuration Networking (zeroconf) standards such as those implemented by Apple Computer under the name Rendezvous.
- the networked security system 100 may also be implemented using the Universal Plug and Play standard.
- the remote access system 120 may be implemented as a server appliance, for example, using the Server Appliance Kit (SAK) available from Microsoft.
- SAK Server Appliance Kit
- the remote access system 120 may also run one or more scheduled or on-demand business processes 170, 172, 174, 176.
- a notification business process 170 may be run to initiate and manage the notification process that is performed using the notification/messaging system 164.
- An analysis process 172 may be run to perform a data analysis using the alarm and video data 132 in the consolidated database 130.
- a reporting process 174 may be run to generate reports including, for example, event and video data or device information stored in the consolidated database 130.
- An enterprise connection process 176 may be run to direct data from the consolidated database 130 into applications using an Enterprise Application Interface (EAI).
- EAI Enterprise Application Interface
- FIG. 3 shows another embodiment of a remote access system 120a.
- This embodiment of the remote access system 120a includes a consolidated database 130, a wireless interface 160, a web server 162, and a notification/messaging system 164, similar to the embodiments described above.
- the wireless interface 160 includes both a wireless LAN interface 180 and a cellular WAN interface 182.
- the remote access system 120a may include an alarm management interface 202 that interfaces with the data collection system 102 and manages the event/alarm data received from the data collection system 102.
- the web server 162 may be connected to a firewall 204 that restricts external access to the web server 162.
- the remote access system 120a also includes a video/audio streaming and control system 210 that controls a camera 110a and provides streaming video data for transmission over a wireless network.
- the video/audio streaming and control system 210 may include a dome control 212 that controls the positioning of the camera 104a using techniques known to those skilled in the art.
- the video/audio streaming and control system 210 may also include a video encoder 214 that encodes digitized video data, an encryption device 216 that encrypts the encoded video data, and a stream manager 218 that manages the stream of encrypted video data for transmission over a wireless network via the wireless interface 160.
- the remote access system 120a may also include an external system interface 220 interfacing with a camera 104b and a video surveillance system 108.
- the external system interface 220 may include a video recorder application programming interface (API) 222 that interfaces with the video surveillance system 108 and an interface API 224 that interfaces with the camera 104b.
- API application programming interface
- one embodiment of the mobile access device 112 may include a message manager 310, a browser 312 and a video stream receiver 320.
- the message manager 310 receives and manages notification messages transmitted from a remote access system 120, 120a.
- the browser 312 may be used to access the web pages provided by the web server 162.
- the video stream receiver 320 receives, decrypts and decodes streamed video data to allow a user to view the video using the access device 112.
- Security events are monitored 410 (e.g., using one or more detectors or data collection devices).
- security event data is collected by the data collection system
- the security event data is sent to the consolidated database and stored 414.
- video data pertaining to the captured video may be stored 418 in the consolidated database and linked to the event data.
- Some or all of the captured video may be stored with the event data, or the event data may be linked to captured video stored in a separate location (e.g., on the video surveillance system).
- a user or subscriber is notified 420 of the event using the mobile access device (e.g., by a message including event and video data such as an embedded video clip or a link to a video clip).
- the user may acknowledge the alarm or event and access 422 the event and video data stored on the consolidated database.
- the user may use the mobile access device to manipulate the video data (e.g., by fast forwarding, rewinding, scanning, or zooming in/out).
- video data may be streamed directly to the mobile access device in real time.
- Embodiments of the system and method for remote access to security event information can be implemented as a computer program product for used with a computer system.
- Such implementation includes, without limitation, a series of computer instructions that embody all or part of the functionality previously described herein with respect to the system and method.
- the series of computer instructions may be stored in any machine-readable medium, such as semiconductor, magnetic, optical or other memory devices, and may be transmitted using any communications technology, such as optical, infrared, microwave, or other transmission technologies.
- Such a computer program product may be distributed as a removable machine-readable medium (e.g., a diskette, CD-ROM), preloaded with a computer system (e.g., on system ROM or fixed disk), or distributed from a server or electronic bulletin board over the network (e.g., the Internet or World Wide Web).
- a removable machine-readable medium e.g., a diskette, CD-ROM
- a computer system e.g., on system ROM or fixed disk
- a server or electronic bulletin board e.g., the Internet or World Wide Web
- a security system consistent with one embodiment of the present invention includes a security event data collection system configured to collect security event data and a video surveillance system configured to record images of security events and to generate video data.
- a remote access system is configured to receive security event data from the security event data collection system and to receive video data from the video surveillance system.
- the remote access system is also configured to link received video data to received security event data associated with a security event.
- the remote access system may include at least one consolidated database configured to store the linked security event data and video data.
- the remote access system may also be configured to provide access to the linked security event data and video data from an access device.
- a system for providing remote access to security event information includes an alarm interface configured to connect with a security event data collection system and to receive security event data and a video interface configured to connect to a video surveillance system and to receive video data.
- the remote access system may also include a consolidated database configured to link the video data received from the video surveillance system to the security event data received from the security event data collection system and to store the linked video and security event data.
- the remote access system may also include a wireless interface configured to connect to a mobile access device and to provide linked video and security event data to the mobile access device over a wireless network.
- the remote access system may further include a notification system configured to transmit a notification message to the mobile access device providing notification of an event.
- a method of providing remote access to security event information includes: receiving security event data indicative of security events detected by a security event data collection system; receiving video data associated with images of security events recorded by a video surveillance system; linking security event data indicative of a security event to video data associated with the security event; storing the linked alarm and video data in a consolidated database; and transmitting the linked alarm and video data from the consolidated database to a mobile access device.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Library & Information Science (AREA)
- Human Computer Interaction (AREA)
- Alarm Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Closed-Circuit Television Systems (AREA)
Abstract
Description
- This application claims the benefit of co-pending U.S. Provisional Patent Application Serial No. 60/543,727 filed on February 11, 2004, which is fully incorporated herein by reference, and is a continuation-in-part of co-pending U.S. Patent Application Serial No. 10/718,447 filed on November 20, 2003, which is fully incorporated herein by reference.
- The present invention relates to security systems and, in particular, security systems including a mobile component for accessing and/or receiving security data at a remote location.
- In known security systems, a variety of security data may be communicated to a central surveillance location from various security devices. However, security personnel who desire access to such security data must access the data from the central location. This inhibits their ability to investigate incidents in person and to be timely notified of various occurrences. For example, security personnel who wish to view live or recorded video from a security camera must do so at the central surveillance location.
- In addition, security personnel may find it desirous to be actively notified of the occurrence of a security event while away from a central location and to be provided with information related to the event, such as video clips and when the event transpired.
- Accordingly, there is a need for a system and method for remote access to and/or notification of security events.
- These and other features and advantages of the present invention will be better understood by reading the following detailed description, taken together with the drawings wherein:
- FIG. 1 is a schematic block diagram illustrating a security system including a system for remote access to security event information, consistent with one embodiment of the present invention;
- FIG. 2 is a schematic block diagram illustrating one embodiment of the system for remote access to security event information;
- FIG. 3 is a schematic block diagram illustrating another embodiment of the system for remote access to security event information; and
- FIG. 4 is a flow chart illustrating a method for remote access to security event information, consistent with one embodiment of the present invention.
- For simplicity and ease of explanation, the invention will be described herein in connection with various exemplary embodiments thereof. Those skilled in the art will recognize, however, that the features and advantages of the invention may be implemented in a variety of configurations. It is to be understood, therefore, that the embodiments described herein are presented by way of illustration, not of limitation.
- FIG. 1 is a block diagram of an
exemplary security system 100 consistent with an embodiment of the present invention. In general, thesecurity system 100 may include one or more remote ormobile access devices 112 connected to aremote access system 120 for remotely receiving and evaluating security event information. Thesecurity system 100 may include a security eventdata collection system 102 that collects security event data (also referred to as alarm data) from collection ordetection devices 104 and avideo surveillance system 108 that captures images of security events using one ormore cameras 110. The security eventdata collection system 102, thevideo surveillance system 108 and theremote access system 120 may be connected to and communicate via anetwork 150 such as an Ethernet. - The
remote access system 120 may include a consolidateddatabase 130 that receives and stores the security data from the security eventdata collection system 102 and from thevideo surveillance system 108. The consolidateddatabase 130 may link the event data for a particular event to the video data available for that event. Theremote access system 120 may notify theaccess device 112 of an event and deliver event data together with video data related to the event, for example, in an event message. Alternatively, theaccess device 112 may initiate communication with theremote access system 120 to access the security data in the consolidateddatabase 130. Theaccess device 112 may be used to view the event data and to play back the video associated with the event. - The
access device 112 may be a portable personal digital assistant (PDA), cellular telephone, pager, personal computer, computer terminal, laptop computer, or information kiosk. Those skilled in the art will recognize that theaccess device 112 may connect to and communicate with theremote access system 120 in a variety of ways. The connection may be over the internet or through a wireless network such as a wireless local area network (WLAN) or a cellular wide area network (WAN). Theaccess device 112 may also connect directly to thenetwork 150 through anaccess point 114 and may receive data directly from thecollection system 102 or thevideo surveillance system 108. - The security event
data collection system 102 may include any system for detecting and/or collecting security event data including, but not limited to, an electronic article surveillance (EAS) based system, a radio frequency identification (RFID) based system, a motion detection system, an entry/exit monitoring system, a glass window and door breakage detection system, temperature sensing system, a fire detection system, a gas detection system, an intrusion detection system, and an electronic access control system. One example of the security eventdata collection system 102 is the SENSORMATIC® ULTRALINK® EAS system available from ADT Security Services, Inc., a division of Tyco International Ltd. Thecollection devices 104 may detect security events such as detection of an active EAS tag, detection of an RFID label, a point of sale (POS) transaction, a door or window opening or breaking, or a gas or fire. When security events are detected, thedata collection system 102 generates event or alarm data indicative of the detected event. The event or alarm data may include time stamps indicating a time of occurrence of the events as well as information describing the location of the event and the nature of the event or alarm. - The
video surveillance system 108 may include any system for capturing images of security events. One example of the video surveillance system 118 is the INTELLEX® V 3.1 video surveillance system available from ADT Security Services, Inc., a division of Tyco International Ltd. Thevideo camera 110 may take video of a surveillance area on a continuous basis or at predefined intervals. The surveillance area may be, for example, an exit/entrance of a retail store, an area around a cash register, an area around a protected asset, and the like. Thecamera 110 may be oriented in a fixed direction or the position of thecamera 110 may be controlled, for example, to adjust the pan-tilt-zoom of thecamera 110 and/or to position thecamera 110 at various viewing angles. When thevideo surveillance system 108 captures images, thevideo surveillance system 108 may store the video data representing the recorded images on a multimedia server such as a digital video recorder (DVR) or a personal computer. Thevideo surveillance system 108 may also store data pertaining to the recorded video such as time stamps, duration of the video clips, and a location of the surveillance area. Thevideo surveillance system 108 may also capture and store audio associated with the images. - The
security system 100 may optionally include anobject recognition system 106 connected to thenetwork 150 and/or connected directly to thevideo surveillance system 108. Theobject recognition system 106 may be configured to recognize any variety of objects entering the surveillance area. In general, theobject recognition system 106 may receive live video from thecamera 110 and analyze the video to detect if an object has entered the surveillance area. Theobject recognition system 106 may compare data representative of the detected object with data representative of a plurality of known objects to ascertain if an acceptable correlation exists. If a correlation exists, theobject recognition system 106 may act as a security event data collection system and provide event data to the consolidateddatabase 130. - Those skilled in the art will appreciate that the live video from the
camera 110 may be communicated to theobject recognition system 106 andvideo surveillance system 108 in a variety of ways, e.g., through network cables or a wireless connection. Those skilled in the art will recognize that theobject recognition system 106 may include a computer provided in a variety of known configurations to analyze the live video from thecamera 110 and/or store information about the video, as well as information about any events associated with or detectable from the video. - Referring to FIG. 2, one embodiment of the
remote access system 120 may be implemented as a consolidated, server-based architecture used for the collection, storage and transmission of security event information. Theremote access system 120 may include analarm interface 122 that obtains event/alarm data 124 from the security eventdata collection system 102 and avideo interface 126 that obtainsvideo data 128 from thevideo surveillance system 108. - The
remote access system 120 may obtain the event data and video data for both real-time use (e.g., notification of an event when the event occurs) and after the fact use (e.g., for use in a report on events). Theremote access system 120 may employ a common mechanism to format event records in the consolidateddatabase 130. In one example, an initialization file may be used to determine the fields that will reside in an event record and to determine the field ordering. The initialization file may provide an XML description of the event interface to specify record content and field ordering. - The consolidated
database 130 links the event/alarm data and the video data corresponding to a particular event and stores the linked alarm andvideo data 132. The consolidateddatabase 130 may be implemented as a relational database, for example, using a database server and database management system software such as the type available from Microsoft or Oracle. The linked event/alarm data and video data may be stored in a combined table in the consolidateddatabase 130. Database synchronization software may be activated to transfer the security event data and/or video data to the consolidateddatabase 130. - The video data linked to the event data may include digitized video clips as well as information about the video. The digitized video clips may be stored directly on the
consolidated database 130 as embedded video. When digitized video is stored on theconsolidated database 130, the embedded video clips may be stored in a highly compressed format using techniques known to those skilled in the art. - Alternatively, the digitized video clips may include linked video resident on a separate multimedia server (e.g., in the surveillance system 108). The digitized video clips on a separate multimedia server may also be associated with the event data on the
consolidated database 130 through database relations. When the digitized video is stored in a separate location, the video data stored on theconsolidated database 130 includes information about the video clips (e.g., time stamps and duration). In a further alternative, digitized video may also be streamed directly to and stored in themobile access device 112. - The event/
alarm data 124 and thevideo data 126 may be linked based on an indication of when a security event occurred. The event/alarm data 124 and thevideo data 126 include timestamps indicating the time that the events occurred and the time when the video was taken. Both thedata collections system 102 and thevideo surveillance system 108 may use Universal Coordinated Time (UTC) from a hardware timestamp source to provide an accurate and consistent timestamp. Thus, event data corresponding to an event that occurred at a particular time and location may be linked to video data corresponding to a video taken at that time and at that location. - In addition to the alarm and
video data 132, theconsolidated database 130 may include a device management table 134 containing device information pertaining to thecollection devices 104. The device management table 134 allows a user to obtain information on thecollection devices 104 and/or to manage thecollection devices 104 using themobile access device 112. Theconsolidated database 130 may also includenotification rules 136 that trigger notification processes, as described below. Themobile access device 112 may be used to customize the notification process by accessing and modifying the notification rules. Additionally, the rules may be modified externally over the World Wide Web using theweb server 162. - One embodiment of the
remote access system 120 may include awireless interface 160 to connect with the mobile access device(s) 112 and to transmit data in a format suitable for wireless transmission. Thewireless interface 160 may be implemented using wireless technologies known to those skilled in the art such as the short-range radio technology known as Bluetooth and various longer-range radio technologies such as cellular protocols. - The
remote access system 120 may include aweb server 162 to make theconsolidated database 130 available to anaccess device 112. In one embodiment, the web server may be an Internet Information Services (IIS) Web server available from Microsoft. Theweb server 162 may be used to deliver the data on web pages, such as active server pages (ASP), in response to a hypertext transfer protocol (HTTP) request from amobile access device 112. - The
remote access system 120 may include a notification/messaging system 164 to provide notification of events. The notification/messaging system 160 may transmit an event or alarm message to themobile access device 112, for example, on a subscription basis. In one embodiment, the message may be sent to the user in the form of an email with the event data and video data. The video data in the message may include an embedded video clip or a link to a location where the video clip is stored. - According to one embodiment, Web services publish/subscribe mechanisms may be used to provide notification of events. The
remote access system 120 may support extensible markup language (XML), Simple Object Access Protocol (SOAP) and Uniform Device Discovery Interface (UDDI) standards. To provide both real-time and batch event information delivery, theremote access system 120 may also incorporate asynchronous messaging systems such as the messaging queue systems available from IBM under the name IBM MQ Series and from Microsoft under the name MSMQ. A messaging queue system is capable of delivering suitably formatted communications to subscribers using wired or wireless communications. The system may also use a time coordination protocol supported by asynchronous messaging, such as Lamport's Algorithm. - The
remote access system 120 may also include information security protection using security technologies known to those skilled in the art. Examples of security technologies that may be used include two-factor authentication, Public Key Infrastructure (PKI) security, secure sockets layer (SSL) and digital certificates. - Connection to the
consolidated database 130 may be implemented using standardized database connection technologies such as Open Database Connectivity (ODBC), Java Database Connectivity (JDBC) and ActiveX Data Objects (ADO). Enterprise Application Interface (EAI) applications may also use the database connection to direct data from theconsolidated database 130 into enterprise applications known to those skilled in the art. Access to the data in theconsolidated database 130 may be provided via XML I/O, database synchronization, an enterprise connection, or using other techniques known to those skilled in the art. - The
remote access system 120, thedata collection system 102, and thevideo surveillance system 108 may be networked using the Zero Configuration Networking (zeroconf) standards such as those implemented by Apple Computer under the name Rendezvous. Thenetworked security system 100 may also be implemented using the Universal Plug and Play standard. Theremote access system 120 may be implemented as a server appliance, for example, using the Server Appliance Kit (SAK) available from Microsoft. - The
remote access system 120 may also run one or more scheduled or on-demand business processes 170, 172, 174, 176. Anotification business process 170 may be run to initiate and manage the notification process that is performed using the notification/messaging system 164. Ananalysis process 172 may be run to perform a data analysis using the alarm andvideo data 132 in theconsolidated database 130. Areporting process 174 may be run to generate reports including, for example, event and video data or device information stored in theconsolidated database 130. Anenterprise connection process 176 may be run to direct data from theconsolidated database 130 into applications using an Enterprise Application Interface (EAI). - FIG. 3 shows another embodiment of a
remote access system 120a. This embodiment of theremote access system 120a includes aconsolidated database 130, awireless interface 160, aweb server 162, and a notification/messaging system 164, similar to the embodiments described above. In theremote access system 120a, according to this embodiment, thewireless interface 160 includes both awireless LAN interface 180 and acellular WAN interface 182. Theremote access system 120a may include analarm management interface 202 that interfaces with thedata collection system 102 and manages the event/alarm data received from thedata collection system 102. Theweb server 162 may be connected to afirewall 204 that restricts external access to theweb server 162. - In this embodiment, the
remote access system 120a also includes a video/audio streaming andcontrol system 210 that controls a camera 110a and provides streaming video data for transmission over a wireless network. The video/audio streaming andcontrol system 210 may include adome control 212 that controls the positioning of the camera 104a using techniques known to those skilled in the art. The video/audio streaming andcontrol system 210 may also include avideo encoder 214 that encodes digitized video data, anencryption device 216 that encrypts the encoded video data, and astream manager 218 that manages the stream of encrypted video data for transmission over a wireless network via thewireless interface 160. - The
remote access system 120a, according to this embodiment, may also include anexternal system interface 220 interfacing with a camera 104b and avideo surveillance system 108. Theexternal system interface 220 may include a video recorder application programming interface (API) 222 that interfaces with thevideo surveillance system 108 and aninterface API 224 that interfaces with the camera 104b. - As shown in FIG. 3, one embodiment of the
mobile access device 112 may include amessage manager 310, abrowser 312 and avideo stream receiver 320. Themessage manager 310 receives and manages notification messages transmitted from a 120, 120a. Theremote access system browser 312 may be used to access the web pages provided by theweb server 162. Thevideo stream receiver 320 receives, decrypts and decodes streamed video data to allow a user to view the video using theaccess device 112. - One method of remotely accessing security information is illustrated in FIG. 4. Security events are monitored 410 (e.g., using one or more detectors or data collection devices). When a security event is detected 412 and security event data is collected by the data collection system, the security event data is sent to the consolidated database and stored 414. If the event has been captured 416 on video (e.g., by a video surveillance system), video data pertaining to the captured video may be stored 418 in the consolidated database and linked to the event data. Some or all of the captured video may be stored with the event data, or the event data may be linked to captured video stored in a separate location (e.g., on the video surveillance system). A user or subscriber is notified 420 of the event using the mobile access device (e.g., by a message including event and video data such as an embedded video clip or a link to a video clip).
- When the user receives the notification on the mobile access device, the user may acknowledge the alarm or event and
access 422 the event and video data stored on the consolidated database. When accessing the video data, the user may use the mobile access device to manipulate the video data (e.g., by fast forwarding, rewinding, scanning, or zooming in/out). In an alternative method, video data may be streamed directly to the mobile access device in real time. - Embodiments of the system and method for remote access to security event information can be implemented as a computer program product for used with a computer system. Such implementation includes, without limitation, a series of computer instructions that embody all or part of the functionality previously described herein with respect to the system and method. The series of computer instructions may be stored in any machine-readable medium, such as semiconductor, magnetic, optical or other memory devices, and may be transmitted using any communications technology, such as optical, infrared, microwave, or other transmission technologies. It is expected that such a computer program product may be distributed as a removable machine-readable medium (e.g., a diskette, CD-ROM), preloaded with a computer system (e.g., on system ROM or fixed disk), or distributed from a server or electronic bulletin board over the network (e.g., the Internet or World Wide Web).
- Those skilled in the art should appreciate that such computer instructions can be written in a number of programming languages for use with many computer architectures or operating systems. For example, preferred embodiments may be implemented in a procedural programming language (e.g., "C") or an object oriented programming language (e.g., "C++" or Java). Alternative embodiments of the invention may be implemented as pre-programmed hardware elements or as a combination of hardware and software.
- In summary, a security system consistent with one embodiment of the present invention includes a security event data collection system configured to collect security event data and a video surveillance system configured to record images of security events and to generate video data. A remote access system is configured to receive security event data from the security event data collection system and to receive video data from the video surveillance system. The remote access system is also configured to link received video data to received security event data associated with a security event. The remote access system may include at least one consolidated database configured to store the linked security event data and video data. The remote access system may also be configured to provide access to the linked security event data and video data from an access device.
- Consistent with another embodiment of the present invention, a system for providing remote access to security event information includes an alarm interface configured to connect with a security event data collection system and to receive security event data and a video interface configured to connect to a video surveillance system and to receive video data. The remote access system may also include a consolidated database configured to link the video data received from the video surveillance system to the security event data received from the security event data collection system and to store the linked video and security event data. The remote access system may also include a wireless interface configured to connect to a mobile access device and to provide linked video and security event data to the mobile access device over a wireless network. The remote access system may further include a notification system configured to transmit a notification message to the mobile access device providing notification of an event.
- Consistent with a further embodiment of the present invention, a method of providing remote access to security event information includes: receiving security event data indicative of security events detected by a security event data collection system; receiving video data associated with images of security events recorded by a video surveillance system; linking security event data indicative of a security event to video data associated with the security event; storing the linked alarm and video data in a consolidated database; and transmitting the linked alarm and video data from the consolidated database to a mobile access device.
While the principles of the invention have been described herein, it is to be understood by those skilled in the art that this description is made only by way of example and not as a limitation as to the scope of the invention. Other embodiments are contemplated within the scope of the present invention in addition to the exemplary embodiments shown and described herein. Modifications and substitutions by one of ordinary skill in the art are considered to be within the scope of the present invention, which is not to be limited except by the following claims.
Claims (20)
- A security system comprising:a security event data collection system configured to collect security event data;a video surveillance system configured to record images of security events and to generate video data; anda remote access system being configured to receive security event data from said security event data collection system and to receive video data from said video surveillance system, said remote access system being configured to link received video data to received security event data associated with a security event, said remote access system including at least one consolidated database configured to store said linked security event data and video data, and said remote access system being configured to provide access to said linked security event data and video data from an access device.
- The security system of claim 1 wherein said security event data collection system comprises:at least one detection device configured to detect security events and to generate alarm data associated with said detected security events; andat least one security event database configured to store said alarm data.
- The security system of claim 1 wherein said security event data collection system includes at least one system selected from the group consisting of an electronic article surveillance (EAS) system, a radio frequency identification (RFID) system, a motion detection system, an entry/exit monitoring system, a glass window and door breakage detection system, temperature sensing system, a fire detection system, a gas detection system, an intrusion detection system, and an electronic access control system.
- The security system of claim 1 wherein said video data stored on said consolidated database and linked to said event data includes digitized video clips.
- The security system of claim 1 wherein said video data stored on said consolidated database and linked to said event data includes information about digitized video clips stored on said video surveillance system.
- The security system of claim 1 wherein said remote access system includes a web server configured to provide access to said linked security event data and video data and other data stored in said consolidated database.
- The security system of claim 1 wherein said remote access system includes a notification system configured to notify a mobile access device of an event.
- The security system of claim 1 wherein said security event data collection system is an object recognition system.
- A system for providing remote access to security event information, said system comprising:an alarm interface configured to connect with a security event data collection system and to receive security event data;a video interface configured to connect to a video surveillance system and to receive video data; anda consolidated database configured to link said video data received from said video surveillance system to said security event data received from said security event data collection system and to store said linked video and security event data;a wireless interface configured to connect to a mobile access device and to provide linked video and security event data to said mobile access device over a wireless network; anda notification system configured to transmit a notification message to said mobile access device providing notification of an event.
- The system of claim 9 wherein said consolidated database is configured to store device management tables including device information associated with detection devices in said security event data collection system.
- The system of claim 9 wherein said consolidated database is configured to store notification rules governing processes for notifying said mobile access device of security events.
- The system of claim 9 further comprising a web server configured to provide said linked alarm and video data to said mobile access device.
- A method of providing remote access to security event information, said method comprising:receiving security event data indicative of security events detected by a security event data collection system;receiving video data associated with images of security events recorded by a video surveillance system;linking security event data indicative of a security event to video data associated with said security event;storing said linked alarm and video data in a consolidated database; andtransmitting said linked alarm and video data from said consolidated database to a mobile access device.
- The method of claim 13 wherein said security event data is indicative of at least one event selected from the group consisting of a door opening, a point of sale (POS) transaction, detection of an active electronic article surveillance (EAS) tag, and proximity of a radio frequency identification (RFID) label.
- The method of claim 13 wherein said security event data and said video data is linked using time stamps associated with said security event data and said video data.
- The method of claim 13 wherein said video data received and stored on said consolidated database includes digitized video clips.
- The method of claim 13 wherein said video data received and stored on said consolidated database includes information about digitized video clips stored on a multimedia server in said video surveillance system.
- The method of claim 13 wherein receiving said security event data and said video data includes synchronizing said consolidated database with a security event database in said security event data collection system.
- The method of claim 13 wherein transmitting said linked alarm and video data from said consolidated database to said mobile access device includes providing said linked alarm and video data on a web server.
- The method of claim 13 further comprising notifying a subscriber of an event according to rules stored on said consolidated database.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US54372704P | 2004-02-11 | 2004-02-11 | |
| US543727P | 2004-02-11 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| EP1564700A1 true EP1564700A1 (en) | 2005-08-17 |
Family
ID=34700208
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| EP05002498A Withdrawn EP1564700A1 (en) | 2004-02-11 | 2005-02-07 | System and method for remote access to security event information |
Country Status (4)
| Country | Link |
|---|---|
| EP (1) | EP1564700A1 (en) |
| JP (1) | JP2005228330A (en) |
| CN (1) | CN1694531A (en) |
| AU (1) | AU2005200584A1 (en) |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2007127556A1 (en) * | 2006-04-28 | 2007-11-08 | Symbol Technologies, Inc. | Methods and apparatus for visual tracking of rf elements |
| FR2904743A1 (en) * | 2006-08-07 | 2008-02-08 | Gint Soc Par Actions Simplifie | Video surveillance system for e.g. building or construction site, has processing system comparing acquired video data with reference image of area to be monitored, and generating and transmitting warning message to destination of terminal |
| GB2488750A (en) * | 2011-01-25 | 2012-09-12 | Cooper Security Ltd | Alarm apparatus generating data in XML or JSON for communication with external apparatus |
| US8489065B2 (en) | 2011-05-03 | 2013-07-16 | Robert M Green | Mobile device controller application for any security system |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2016144045A (en) * | 2015-02-02 | 2016-08-08 | キヤノン株式会社 | OUTPUT DEVICE, VIDEO MONITORING SYSTEM, INFORMATION PROCESSING METHOD, AND PROGRAM |
| US11080977B2 (en) | 2015-02-24 | 2021-08-03 | Hiroshi Aoyama | Management system, server, management device, and management method |
| US10354506B2 (en) * | 2015-02-24 | 2019-07-16 | Hiroshi Aoyama | Management system, server, management device, and management method |
| JP6620312B2 (en) * | 2015-03-27 | 2019-12-18 | パナソニックIpマネジメント株式会社 | Network operation management system, network operation management apparatus, and network operation management method |
| JP6758918B2 (en) * | 2016-05-27 | 2020-09-23 | キヤノン株式会社 | Image output device, image output method and program |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6385772B1 (en) * | 1998-04-30 | 2002-05-07 | Texas Instruments Incorporated | Monitoring system having wireless remote viewing and control |
| WO2002041273A1 (en) * | 2000-11-20 | 2002-05-23 | Visual Protection Limited | Smart camera system |
| EP1316933A2 (en) * | 2001-11-28 | 2003-06-04 | Matsushita Electric Industrial Co., Ltd. | Home security system |
| GB2389978A (en) * | 2002-06-17 | 2003-12-24 | Raymond Joseph Lambert | Event-triggered security monitoring apparatus |
-
2005
- 2005-02-07 CN CN 200510071614 patent/CN1694531A/en active Pending
- 2005-02-07 EP EP05002498A patent/EP1564700A1/en not_active Withdrawn
- 2005-02-10 AU AU2005200584A patent/AU2005200584A1/en not_active Abandoned
- 2005-02-10 JP JP2005034461A patent/JP2005228330A/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6385772B1 (en) * | 1998-04-30 | 2002-05-07 | Texas Instruments Incorporated | Monitoring system having wireless remote viewing and control |
| WO2002041273A1 (en) * | 2000-11-20 | 2002-05-23 | Visual Protection Limited | Smart camera system |
| EP1316933A2 (en) * | 2001-11-28 | 2003-06-04 | Matsushita Electric Industrial Co., Ltd. | Home security system |
| GB2389978A (en) * | 2002-06-17 | 2003-12-24 | Raymond Joseph Lambert | Event-triggered security monitoring apparatus |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2007127556A1 (en) * | 2006-04-28 | 2007-11-08 | Symbol Technologies, Inc. | Methods and apparatus for visual tracking of rf elements |
| FR2904743A1 (en) * | 2006-08-07 | 2008-02-08 | Gint Soc Par Actions Simplifie | Video surveillance system for e.g. building or construction site, has processing system comparing acquired video data with reference image of area to be monitored, and generating and transmitting warning message to destination of terminal |
| GB2488750A (en) * | 2011-01-25 | 2012-09-12 | Cooper Security Ltd | Alarm apparatus generating data in XML or JSON for communication with external apparatus |
| US8489065B2 (en) | 2011-05-03 | 2013-07-16 | Robert M Green | Mobile device controller application for any security system |
Also Published As
| Publication number | Publication date |
|---|---|
| JP2005228330A (en) | 2005-08-25 |
| CN1694531A (en) | 2005-11-09 |
| AU2005200584A1 (en) | 2005-08-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20060001537A1 (en) | System and method for remote access to security event information | |
| US12412466B2 (en) | Building security system | |
| US11741825B2 (en) | Digital video alarm temporal monitoring computer system | |
| US7302481B1 (en) | Methods and apparatus providing remote monitoring of security and video systems | |
| US7403116B2 (en) | Central monitoring/managed surveillance system and method | |
| US8417090B2 (en) | System and method for management of surveillance devices and surveillance footage | |
| EP3033742B1 (en) | System and method for video/audio and event dispatch using positioning system | |
| US20040093409A1 (en) | System and method for external event determination utilizing an integrated information system | |
| US20050132414A1 (en) | Networked video surveillance system | |
| EP1936577A2 (en) | Enhanced multimedia intrusion notification system and method | |
| US20080303903A1 (en) | Networked video surveillance system | |
| US9959722B1 (en) | Methods for determining patterns of presence and ownership of mobile devices by integrating video surveillance with smartphone WiFi monitoring | |
| US20150172602A9 (en) | Video security systems and methods | |
| US20020147982A1 (en) | Video security system | |
| US20070199076A1 (en) | System and method for remote data acquisition and distribution | |
| CA2806786C (en) | System and method of on demand video exchange between on site operators and mobile operators | |
| US20050066371A1 (en) | Mobile digital security system and method | |
| CN110383356A (en) | monitoring system | |
| EP1564700A1 (en) | System and method for remote access to security event information | |
| KR102145614B1 (en) | System for preventing crime in real time by predicting crime occurrence in advance and its control method | |
| US20090153660A1 (en) | Surveillance system and method including active alert function | |
| CA2496245A1 (en) | System and method for remote access to security event information | |
| US20020030738A1 (en) | Web based monitoring system | |
| HK1083406A (en) | System and method for remote access to security event information | |
| US20040008257A1 (en) | Monitoring service process using communication network |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
| AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
| AX | Request for extension of the european patent |
Extension state: AL BA HR LV MK YU |
|
| 17P | Request for examination filed |
Effective date: 20060208 |
|
| AKX | Designation fees paid |
Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU MC NL PL PT RO SE SI SK TR |
|
| 17Q | First examination report despatched |
Effective date: 20070820 |
|
| STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
| 18D | Application deemed to be withdrawn |
Effective date: 20100820 |