Field of the Invention
-
The present invention relates to an apparatus for and a method of monitoring persons.
Background to the Invention
-
There are a number of industries which require workers to undertake their tasks away from fellow workers. When this work is conducted in remote places, or at antisocial hours, there is a problem in ensuring that an alarm would be raised if the lone worker had an accident. There are a number of known solutions available for this type of situation which involve placing monitors on the body of the worker to detect if there is no movement over a period of time, or to detect if the worker is lying down. This data may, for example, be used to infer that a worker is unconscious. These types of systems are typically called "man down devices" and in the event of a lack of movement while lying down being detected then the device is capable of sending an alarm signal. Another solution in regular use is for a remote colleague to periodically telephone the lone worker to ask if he or she is alright.
-
Some lone or remote workers may also work in situations where they may be placed under duress or taken hostage. Examples of this type of worker are psychiatric nurses visiting patients in the community, and security guards. For these types of worker neither a man down alarm nor a colleague phone call may be sufficient to indicate a duress or hostage situation as the lone worker will be made to respond appropriately. Further examples of personnel who may benefit from monitoring are other vulnerable persons such as people travelling alone for long periods, whether on business or for pleasure.
Summary of the Invention
-
According to the first aspect of the invention there is provided an apparatus for monitoring a person, characterised by means for generating a challenge which is delivered to a person being monitored and for generating an alarm if no response is received within a preset time period or if the response is not correct.
-
It is thus possible to provide an automatic system which periodically communicates with the lone worker or other vulnerable person. The system requires the person being monitored to undertake a simple task to ensure that they are alive or well. The system monitors for a response for the person being monitored and, provided that the response is in an expected format the system can record the fact that the person being monitored is responsive and safe. However, such a system can also produce a covert alarm if the person being monitored is subject to duress. Under such circumstances the person being monitored may provide an incorrect response to the challenge, or may provide an "emergency" or "duress" response to the challenge such that they can signal to the system that they are under duress or require assistance and consequently an appropriate alarm can be raised.
-
Preferably the person being monitored is given a predetermined time in which to provide a correct response to the system to indicate that their status is "satisfactory" which can imply that they are acceptably safe and acceptably well.
-
Preferably the challenge is a random sequence.
-
Because the person being monitored responds to the randomly generated challenge in accordance with the rules known only to themselves, or to only a few select individuals, then that person being monitored can indicate whether their situation is satisfactory or whether they are in a duress situation, and if they are in a duress situation the person placing them under duress has no way of knowing which response the person being monitored is giving. Consequently, a third party placing the person being monitored under duress would not be able to respond on behalf of the person being monitored and would not know if the person being monitored had given a satisfactory response or a duress response. Thus safety of vulnerable workers is increased.
-
Advantageously the challenge in response is made using existing telecommunications infrastructure. Thus, for example, the challenge and response may be in the form a text or SMS message sent to, for example, a mobile telephone connected to a mobile telephone network. The telephone of the person being monitored may be capable of transmitting its position, for example by reference to the Global Positioning System, or the position may be determined by network operator parameters. The location of a mobile device might be achieved via triangulation, time to propagate the received signal, or simply coverage area of the mast handling the call. This can provide useful information if, for example, the person being monitored has moved from their expected path, perhaps because of an abduction. Similarly, failure of the person to move when movement is expected may indicate injury or a hostage situation.
-
Where a person is expected to move along a route, a number of communication devices may be located along the route that the person being monitored has to proceed. A monitoring communication, comprising a challenge needing a response, can then be sent to each device in turn or each successive device along the route and the person being monitored can respond appropriately from each communication device as they reach it. In this way the progress of the person along the route and their status, e.g. whether their status is satisfactory or whether they are under duress, or whether they have failed to arrive, can be monitored.
-
According to a second aspect of the present invention there is provided a method for monitoring a person, comprising the steps of:
- 1) generating a challenge to be sent to a person being monitored whereby the person being monitored knows how to respond to the challenge;
- 2) sending the challenge;
- 3) monitoring for receipt of a response to the challenge; and
- 4) raising an alert if a response is not received within a predetermined time or if the response is incorrect or if the response indicates a duress situation.
Brief Summary of the Drawing
-
The present invention will now be described with reference to the attached drawing which is a schematic drawing showing a personnel monitoring system constituting an embodiment of the present invention.
Description of Preferred Embodiment of the Invention
-
Figure 1 illustrates a monitoring system, generally designated 2 for monitoring a person. The system comprises a computer 4 arranged to send text messages to and receive text messages from a mobile phone 6 carried by a person being monitored 12. Communication between the computer 4 and the mobile phone 6 is made via a telephone communications infrastructure, generally designated 8. The computer 4 may be a conventional computer which need not be described in detail here. A program within the computer 4 may have access to a database 10 which contains details of the person or persons to be monitored. These details include the mobile telephone number of the or each person 12, the chosen format for their response to indicate that their condition is satisfactory and/or to indicate that they are in a duress situation, and third party contact details, for example phone number or e-mail address, to which an alarm message may be sent indicating that the person is under duress.
-
The database further contains an indication of the frequency or times at which a monitoring cycle comprising a challenge and response is to be performed, and may optionally contain logs of preceding challenge and response sequences. The database may also indicate how long a person has to respond and/or whether a repeat of the challenge should be made.
-
A person being monitored 12 carries their mobile phone 6. Their mobile phone is capable of receiving and sending text messages.
-
Periodically the computer 4 checks the database 10 to determine if a monitoring communication is required in respect of the person 12. If the computer 4 determines that it is time to send a monitoring message to the person 12 it generates a random number, in this example 123, and this is sent as a text message 14 via the telecommunications network to the mobile phone 6 of the person being monitored. The computer also starts a timer to time a period in which the response should be received.
-
Upon receipt of the text message by the mobile phone 6, the person being monitored 12 knows the required response in order to indicate that their situation is satisfactory. The "satisfactory" response may, for example, be to send a text message back, designated 16, in which the number sequence is reversed. This is then conveyed by the telecommunications network to the computer 8 which can examine the database, compare the response with the rules for responding and determine that the response indicates that the person is satisfactory. As the response is satisfactory, and has been received before the end of a timeout period, then the computer system 4 takes no further action other than to schedule the next monitoring event for that person.
-
Suppose, at a later time, that the computer 4 sends another periodic monitoring message 18 to the mobile device 6 of the person 12 being monitored. The message is randomly generated, and in this example is "456". Suppose now that the person 12 being monitored is under duress, for example having been taken hostage, and his captor tells him to respond appropriately to the message. The person 12 being monitored knows the required response to indicate a duress situation, which in this example may be to repeat the number sequence exactly as received. He therefore sends a text message 20 back to the computer 4 via the telecommunications network 8. The person holding the person being monitored 12 does not know the correct reply and hence cannot tell whether this was a duress message or a satisfactory message. Upon receipt of the message indicating that the person 12 is under duress the computer 4 examines the database, notes that the message is not satisfactory, and further notes that it corresponds the duress message, and therefore opens the contact details for the third party to which an alert should be sent. The computer 4 then sends an alert message 22 to a communications terminal, such as a mobile phone 24, of a person designated in the database.
-
The computer 4 may also start a timer when each challenge 14 or 18 is sent, and may check to see whether a response has been returned by the end of a period counted by the timer. If no response has been received then an alert message may also be sent to the device 24 indicating the absence of a satisfactory response from the person 12.
-
It is thus possible to provide a robust, simple and inexpensive monitoring system which can be readily deployed using available technology.