EP4207119A1 - Security monitoring systems - Google Patents

Security monitoring systems Download PDF

Info

Publication number
EP4207119A1
EP4207119A1 EP21218143.2A EP21218143A EP4207119A1 EP 4207119 A1 EP4207119 A1 EP 4207119A1 EP 21218143 A EP21218143 A EP 21218143A EP 4207119 A1 EP4207119 A1 EP 4207119A1
Authority
EP
European Patent Office
Prior art keywords
location
radio
management device
image data
local management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
EP21218143.2A
Other languages
German (de)
French (fr)
Inventor
Nicholas J. HAckett
Julien PIEDBOIS
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Verisure SARL
Original Assignee
Verisure SARL
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Verisure SARL filed Critical Verisure SARL
Priority to EP21218143.2A priority Critical patent/EP4207119A1/en
Priority to PCT/EP2022/087929 priority patent/WO2023126425A1/en
Publication of EP4207119A1 publication Critical patent/EP4207119A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19639Details of the system layout
    • G08B13/19645Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19678User interface
    • G08B13/19691Signalling events for better perception by user, e.g. indicating alarms by making display brighter, adding text, creating a sound
    • G08B13/19693Signalling events for better perception by user, e.g. indicating alarms by making display brighter, adding text, creating a sound using multiple video sources viewed on a single or compound screen
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19695Arrangements wherein non-video detectors start video recording or forwarding but do not generate an alarm themselves

Definitions

  • the present invention relates generally to security monitoring systems for premises, and in particular to such installations including a plurality of video cameras.
  • Security monitoring systems for monitoring premises typically provide a means for detecting the presence and/or actions of people at the premises and reacting to detected events.
  • alarm systems typically include sensors to detect the opening and closing of doors and windows, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones.
  • Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected.
  • Such installations typically include a control unit (which may also be termed a central unit or local management device), generally mains powered, that is coupled to the sensors, detectors, cameras, etc.
  • nodes which processes received notifications and determines a response.
  • the local management device or central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit.
  • the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered.
  • a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a remotely located monitoring station where, typically, human operators manage the responses required by different alarm and notification types.
  • These monitoring stations are often referred to as Central Monitoring Station (CMS) because they may be used to monitor a large number of security monitoring systems distributed around the monitoring station, the CMS located rather like a spider in a web.
  • CMS Central Monitoring Station
  • the local management device or central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system - in particular whether it is fully or only partially armed, and the nature of the detected events.
  • the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station.
  • the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.
  • centrally monitored security monitoring systems it is nowadays usual for centrally monitored security monitoring systems to include at least one motion-triggered video camera for monitoring the premises, and even in modestly sized premises the use of multiple such cameras to monitor different rooms or aspects is increasingly common.
  • the central unit of a system with multiple motion-triggered video camera will typically be configured to supply the remote monitoring station with video data only from video cameras at which motion was detected (motion detection is typically performed by optical sensors such as PIR devices, but cameras may also be triggered by the motion (or act) of opening a door, for example.
  • the remote monitoring station may also be able to command the central unit to command a video camera that has not been triggered but which provides a view of a particular location (for example, where another sensor or alarm node has been triggered) to supply video data.
  • the transceiver of the central unit that handles video and image data transmissions from the video cameras of the system obviously has limited bandwidth, and if multiple cameras have video to transmit they each have in effect to take their turn, to avoid contention problems. This means that the last video file to be received may be received well after the first video file. Moreover, channels over which video data (still images and video sequences/streams) are transmitted from the central unit to the remote unit are frequently low bandwidth, so that transmitting usefully high-resolution images at a reasonable frame rate is rather slow.
  • the critical images/video sequence which clearly shows the intruder and his actions, are received after all the other video data - therefore delaying the moment when the monitoring station (or more typically, the human operative in the monitoring station) can take action based on the content of the critical images/sequences.
  • the monitoring station or more typically, the human operative in the monitoring station
  • a delay of a minute or a few minutes is of no consequence, practical experience shows that quite literally such delays can be a matter of life or death.
  • a premises security monitoring installation having a plurality of alarm event sensors and a plurality of cameras, a location sensing arrangement to detect human presence and location within the premises and comprising a radio-based system that is configured to sense presence and location based on detecting perturbations of radio signals, a local management device to report alarm events to a remote monitoring station, "CMS", the local management device being configured to: notify the CMS on receiving notification of an alarm event and to supply to the CMS location data from the location sensing arrangement, receive from the CMS a request for image data from an identified one of the plurality of cameras selected based on the supplied location data; and supply the requested image data to the CMS.
  • CMS remote monitoring station
  • This approach helps the CMS more quickly locate the camera data showing the intruder, rather than potentially having to wait until images from all cameras have been viewed which can take a long time as the data from the different cameras are sent serially and the channel bitrate may be low.
  • a premises security monitoring installation having a plurality of alarm event sensors and a plurality of cameras, a location sensing arrangement that uses channel state information analysis to detect human presence and location within the premises; a local management device to report alarm events to a central monitoring station, "CMS", the local management device being configured to: notify the CMS on receiving notification of an alarm event and to supply to the CMS location data from the location sensing arrangement, receive from the CMS a request for image data from a particular one of the plurality of cameras selected based on the supplied location data; and supply the requested image data to the CMS.
  • CMS central monitoring station
  • a local management device of a premises security monitoring installation including a plurality of cameras, a location sensing arrangement to detect human presence and location within the premises and comprising a radio-based system that is configured to sense presence and location based on detecting perturbations of radio signals, the method comprising:
  • a control unit for a security monitoring system for premises comprising a processor, a memory communicatively coupled to the processor and a set of instructions stored in the memory which when executed by the processor cause the control unit to: perform location sensing to detect human presence and location within the premises based on detecting perturbations of radio signals; notify a remote monitoring station on receiving notification of an alarm event and to supply to the remote monitoring station location data derived from detected perturbations of radio signals; receive from the remote monitoring station a request for image data from an identified one of the plurality of cameras selected based on the supplied location data; and supply the requested image data to the remote monitoring station.
  • a local management device for a premises security monitoring installation configured to be coupled to: a plurality of cameras of the installation; a plurality of alarm event sensors; and to a remote monitoring station, "CMS", for the reporting of alarm events; and further configured to: perform location sensing to detect human presence and location within the premises based on detecting perturbations of radio signals; notify the CMS on receiving notification of an alarm event and to supply to the CMS location data derived from detected perturbations of radio signals; receive from the CMS a request for image data from an identified one of the plurality of cameras selected based on the supplied location data; and supply the requested image data to the CMS.
  • CMS remote monitoring station
  • FIG. 1 shows schematically a security monitoring system installation 100 in premises comprising a dwelling standing in grounds, not shown.
  • the premises are in the form of a multi-story house, of which only the ground floor is shown.
  • the house has a front door 104, that serves as the main entrance, and which leads into an entrance hall 106.
  • the various rooms are shown as linked by doorways, but with doors omitted.
  • most of the doorways would typically be fitted with doors, and some or all of these doors may be fitted with door opening sensors such as that shown on the front door as sensor 107.
  • these door opening sensors will be battery powered, using a magnet and a sensing element such as a magnetometer or reed switch, and include a radio transceiver for communicating with the local management device, or central unit, 122 of the security monitoring system.
  • the entrance hall leads through to the living room 108, a dining room 110, and thence into a kitchen 112.
  • the kitchen 112 includes the house's back door 114. Like the front door 104, the back door 114 is also provided with the door opening sensor 107. From the kitchen 112 there is an entry to a pantry 116, and also to a playroom 118.
  • the playroom leads into a music room 120, and a conservatory 124 which in turn leads back into the entrance hall 106 which in turn leads to a cloakroom 125.
  • a library 126 Leading off the living room 108 is a library 126, and an office 128 which in turn leads through to a storage room 130. Stairs 131 in the hall lead up to the upper floors of the house.
  • a user may use the control panel 132 to disarm the monitoring system 100, or to change the armed state from "armed away" - in which the security monitoring system both secures the perimeter of the house, and also monitors the interior of the house with the possibility of an alarm event being triggered upon motion been detected within the house; to "armed at home” state, in which the perimeter is monitored but movement within the house does not give rise to the central unit 122 raising an alarm event.
  • a disarm node 134 is provided instead.
  • the disarm node permits arming and disarming of the security monitoring system using a dongle, a suitably programmed smart phone, or the like, and possibly arming and disarming by the entry of a PIN using a physical keypad or touchscreen.
  • the central unit 122 of the security monitoring system 100 is coupled to an external monitoring station 200 by means of a wired (broadband) connection the Internet 210 and also by at least one radio network, e.g. a public land mobile network (PLMN).
  • a wired (broadband) connection the Internet 210 and also by at least one radio network, e.g. a public land mobile network (PLMN).
  • PLMN public land mobile network
  • the house shown in Figure 1 is provided with a plurality of internal video cameras 140, as well as external video cameras 142 to the front and rear of the premises. All or some of these video cameras may be connected to a mains power supply, but more commonly only the external video cameras are powered in this way (with a battery power supply backup).
  • the internal video cameras may rely on autonomous power supplies, such as internal battery power supplies.
  • the cameras relying on autonomous power supplies will typically include a first transceiver, with low-power consumption and low bandwidth, for receiving control signals from, and for reporting events to the central unit 122, along with a larger bandwidth and more power-hungry second transceiver, such as a Wi-Fi transceiver, for the transmission of images and video signals to the central unit (typically only done on command from the central unit, often as a result of an intervention from the remote monitoring station 200).
  • a first transceiver with low-power consumption and low bandwidth
  • a second transceiver such as a Wi-Fi transceiver
  • the house is shown without any windows, but of course in practice there would be windows and typically some at least of these windows would be provided with sensors to detect opening or attempted opening the windows, again battery-powered and typically coupled to the central unit by means of an internal low bandwidth and low power transceiver.
  • an intruder breaks into the house when the security monitoring system is in the armed away state, typically a window or door sensor node will be triggered, resulting in an alarm event signal being sent by the node central unit 122.
  • the central unit 122 Upon receiving the alarm event signal, the central unit 122 will typically report this to the remote monitoring station 200.
  • motion sensors for example integrated into or associated with one or more of the internal video cameras 140. The relevant motion sensor or camera will then likewise report an alarm event to the central unit 122, which will typically again be forwarded to the remote monitoring station 200.
  • the central unit determines that there is an alarm event it will typically send a request to each camera, as soon as the camera is triggered, to transmit its video to the central unit 122.
  • the central unit is typically not configured to store the videos received from the video cameras but instead forwards them directly to the remote monitoring station. At the central monitoring station 200 received videos are stored for review by an operative of the CMS.
  • the internal video cameras 140 may be configured to start to capture images, and possibly video sequences, starting from the triggering of the respective motion sensor, and typically these images and video sequences are initially stored on internal memory of the cameras 140 until they have been sent to the central unit 122, upon its request. Because the internal cameras 140 are typically battery-powered, and because the large bandwidth transceivers (e.g. Wi-Fi transceiver is used to transmitting video from the cameras to the central unit 122 tend to be power hungry, it is often the case that the battery-powered cameras are configured only to transmit video (more generally, images) on request from the central unit 122.
  • the large bandwidth transceivers e.g. Wi-Fi transceiver
  • the remote monitoring station even if the human operator picks up the alarm event notification from the central unit almost immediately, the operator needs to assess whether the alarm indications suggest that there is a real incident, whether it is a false alarm. This can be difficult without seeing images, and in particular high resolution video images.
  • the central unit 122 of the security monitoring system 100 will already have started to transmit video files or image files from the cameras that have been triggered. But because, in this case there are many rooms with many possible circulation routes between them, is not evident which camera is likely to provide the most useful images or video.
  • the central unit 122 has limited capacity to receive video, because the capacity of the large bandwidth transceiver that uses to receive video/images from the cameras 140, 142, and therefore the central unit 122 preferably doesn't simultaneously instruct all triggered cameras to transmit their stored videos. Instead, the central unit tend to send serial requests, allowing the different video cameras to transmit their video/images one after the other.
  • the central unit 122 will upload images as they come in based on the order to detection. If the central unit 122 received a detection notification from camera 1, 3, 4, 2. Images would be received in that order and transferred to a media tab for that incident for access by the operator at the central monitoring station. It can be seen therefore that the remote monitoring station may have to wait several minutes, or more, before it receives the video/image data necessary to determine whether an intervention is required, and what type of intervention if any is required. This is the main problem addressed by the present invention.
  • the underlying idea is to introduce to the premises a radio-based location sensing arrangement to detect human presence and that is configured to sense presence and location based on detecting perturbations of radio signals, and for the local management device to report alarm events to the remote monitoring station, on receiving notification of an alarm event and to supply location data from the location sensing arrangement.
  • the remote monitoring station can then use the supplied location data, and knowledge of the location of video cameras in the premises, to determine which video camera data it wants to see first.
  • the monitoring station can then send to the central unit of the security monitoring system a request for image data from an identified one of the plurality of cameras selected based on the supplied location data, and the central unit can then supply the requested image data.
  • the volume of data that needs to be transferred to the remote monitoring station to enable the current location of an intruder is relatively small, and can therefore generally be transferred quite quickly.
  • the remote monitoring station typically a human operative, is able rapidly to determine which camera's images are most likely to be useful to see now - and these can be requested and supplied without the delay inherent in the sharing and viewing of a collection of video sequences from several video cameras. Consequently, the remote monitoring centre is able to make decisions and interventions based on what is happening in the premises.
  • embodiments of the invention enable intruder localisation, and the use of intruder localisation in speeding up decision making and interventions based on supplying the relevant images/videos more quickly.
  • a radio (or wireless) signal as used herein refers to a signal transmitted from a radio transmitter and received by a radio receiver, wherein the radio transmitter and radio receiver operate according to a standard or protocol. Such standards include, but are not limited to, IEEE 802.11.
  • radio transmitters and receivers may operate in non-telecommunications or Industrial, Scientific and Medical (ISM) spectral regions without departing from the scope of the invention.
  • ISM Industrial, Scientific and Medical
  • radio signals to probe a zone or zones of interest, and to analyse and extract statistics from these signals, in particular looking at the physical layer and/or data link layer such as MAC address measurements that expose the frequency response of a radio channel (e.g., CSI or RSSI measurements).
  • CSI CSI or RSSI measurements
  • These measurements are processed to detect anomalies and variations over time, and in particular to detect changes signifying the entrance of a person and/or movement of a person within a monitored zone.
  • the zone(s) to be monitored need to be covered sufficiently by radio signals, but the sources of the radio signals may either already be present before a monitoring system is established - for example from the plurality of Wi-Fi or Bluetooth capable devices that are now dotted around the typical home or office, or the sources may be added specifically to establish a monitoring system.
  • radio-based presence detection system Often some established (i.e., already located or installed) radio devices are supplemented by some extra devices added as part of establishing a radio-based presence detection system.
  • devices preinstalled or specifically added
  • Wi-Fi access points Wi-Fi routers
  • smart speakers Wi-Fi repeaters
  • video cameras and video doorbells smart bulbs, etc.
  • the monitoring network between radio devices that are essentially static (i.e., that remain in the same position for extended periods) rather than relying on devices that are repeatedly moved - such as smart phones, headphones, laptops, and tablet devices. It is not strictly speaking essential for all the devices whose signals are used by the monitoring system to be part of the same network - for example, signals from Wi-Fi access points of neighbouring premises could be used as part of a monitoring system in different premises. Again, a primary consideration is the stability of the signals from the signal sources that are used. Wi-Fi access points provided by broadband routers are seldom moved and rarely turned off, consequently they can generally be relied upon as a stable signal source - even if they are in properties neighbouring the property containing the zone or zones to be monitored.
  • FIG. 2 The idea is illustrated very schematically in Figure 2 , here with an installation 200 including just a single source (or illuminator) 202 and just a single receiver 204, for simplicity, although in practice there will typically be multiple sources (illuminators) and sometimes plural receivers.
  • the installation 200 has been established to monitor a monitored zone 206.
  • Figure 2A we see that in steady state, and in the absence of a person, radio signals are transmitted from the source 202, spread through the monitored zone 206, and are received by the receiver 204.
  • the presence of a person in the monitored zone blocks at least some of the signals from the source, and that affects the pattern of radio signals received by the receiver 204.
  • the changed pattern of signals received by the receiver enables the presence of the intruder to be detected by a presence monitoring algorithm that is supplied with information derived from the received signals.
  • a presence monitoring algorithm that is supplied with information derived from the received signals. It will be appreciated that the nature and extent of the perturbation of the signals passing from the source 202 to the receiver 204 is likely to change as the intruder 208 enters, passes through, and leaves the monitored area 206, and that this applies also to reflected, refracted, and attenuated signals. These changes may enable the location of a person within the zone, and their speed of movement, to be determined.
  • signals that are received from an illuminator device (or from more than one illuminator device) after having passed through a monitored space (or volume), have in effect been filtered by the environment to which they have been exposed.
  • the monitored volume as a filter having a transfer coefficient, and we can see that a received signal is at least in part defined by the properties, or channel response, of the wireless channel through which it is propagated. If the environment provided by the monitored volume changes, for example by the addition of a person, then the transfer coefficient of the filter, and the channel response or properties, will also change.
  • the changes in the transfer coefficient, and in the channel response, consequent on the change in the environment of the monitored space, can be detected and quantified by analysing radio signals received by the wireless sensing receiver(s). Both the introduction of an object, e.g. a person, into the monitored space and movement of that object within the monitored space will change the environment and hence change the effective transfer coefficient and the channel response.
  • an object e.g. a person
  • the radio-based sensing system can be trained by establishing a base setting in which the monitored zone is unoccupied, which is then labelled as unoccupied for example by an installer using a smartphone app or the like, and then training occupied states by a person entering, standing, and then walking through each of the zones one by one. Presence at different locations in each of the zones may be captured and labelled in the system in the same way. This process may be repeated with two people, and then optionally with more people. In essence this is a supervised machine learning approach, but other approaches to training may be used.
  • the system may need to be retrained for the base setting if bulky furniture (or if a large metal object) is added to or moved within the monitored space, because these can be expected to change the propagation properties of the relevant zone/space.
  • the data for unoccupied states is preferably retained within a database of "unoccupied" states, even when there are changes to the arrangement of furniture etc. It may not be necessary to retrain for the occupied states, if the system can determine a delta function between the previous base state and the new one, because the delta function may also be applicable in occupied states. But if not, it may be sufficient to retrain only a subset of the occupied states previously learnt.
  • the system may also be configured to self-learn to accommodate changes in the characteristics of the zones when unoccupied, and to add newly determined unoccupied state data to the database.
  • FIG. 2 example uses just a single source (illuminator) and a single receiver, as already mentioned often multiple sources (illuminators) will be used in order to achieve satisfactory coverage of the zone or zones to be monitored. Multiple zones may be monitored by a single receiver through the use of multiple strategically placed sources, but each zone, or some zones of multiple zones may have a dedicate receiver that does not serve other zones. Likewise, a radio signal source (illuminator) may provide illuminating signals for a single monitored zone or for multiple monitored zones.
  • a presence monitoring system (and a security monitoring system including such a presence monitoring system) may use mesh network arrangement, for example a Wi-Fi mesh network, in which multiple devices act as receivers for illuminating signals - either for a single monitored zone or for multiple monitored zones.
  • mesh network arrangement for example a Wi-Fi mesh network, in which multiple devices act as receivers for illuminating signals - either for a single monitored zone or for multiple monitored zones.
  • Figure 3 is based on Figure 1 but illustrates the presence of multiple sources of radio signals that may be used in a radio-based system that senses presence and location based on detecting perturbations of radio signals.
  • elements already labelled in Figure 1 should be considered to carry the same reference numerals, although in the interests of clarity these have largely been omitted. Newly introduced elements are indicated by new reference numerals.
  • As explained with reference to Figure 2 ideally we want to ensure that the whole area of interest is adequately covered by radio signals (from relevant sources, of course) so that there are no blind spots.
  • the radio-based presence sensing which may conveniently be based on the monitoring of Wi-Fi signals, and to which for convenience we will refer hereafter as WFS, is here performed by the central unit 122 which operates as a Wi-Fi Access Point (AP) and which serves as a Wi-Fi sensing receiver.
  • AP Wi-Fi Access Point
  • Wi-Fi stations For example, the whole ground floor of the premises
  • WFS effectively covers the whole area of interest (for example, the whole ground floor of the premises)
  • STAs Wi-Fi stations
  • WFS illuminators so that Wi-Fi signals received at the central unit AP 122 traverse the whole area of interest.
  • Wi-Fi transceivers are quite power hungry, we will generally want the STAs used as WFS illuminators to be mains powered (but preferably also with some back-up power supply such as an internal battery power source) rather than solely battery powered.
  • a battery powered (video) camera such as 140 might be replaced by a mains powered equivalent 340, and battery powered disarm node 134 may be replaced by a mains powered equivalent 334 that is Wi-Fi capable (although the control unit may still use something other than Wi-Fi to communicate with the central unit).
  • Wi-Fi capable devices such as smart plugs, smart bulbs, Wi-Fi range extenders (for example of the type that simply plug in to a socket of the mains electricity supply), to provide a Wi-Fi network that covers the whole of the area of interest.
  • the central unit AP 122 preferably works in infrastructure mode in conjunction with the various other Wi-Fi stations (STAs) to form either an infrastructure Basic Service Set (BSS) or, in conjunction with another AP connected to the same Local Area Network as the central unit 122 - such as broadband router 300, to provide an Extended Service Set (ESS).
  • STAs Wi-Fi stations
  • BSS infrastructure Basic Service Set
  • ESS Extended Service Set
  • the central unit AP 122 provides just a BSS and not an ESS, and that only the central unit AP 122 serves as a Wi-Fi sensing receiver.
  • Some or all of the STAs in the BSS act as illuminators to provide signals which the CU 122 analyses in order to perform WFS.
  • these other STAs include the broadband router 300, a printer 302, and a desktop computer 304, in the office, a smart TV 306 in the living room, a smart plug 308 in the play room, Wi-Fi range extenders 310 in various rooms, the control unit 130 and a Wi-Fi-enabled camera 340 in the hall, and optionally the disarm node 334 in the kitchen.
  • both the Wi-Fi enabled camera and the disarm node 334 are fed with power from a mains electricity supply as well as having an autonomous internal power supply.
  • the kitchen is provided with an STA in the form of for example a "smart speaker" 312.
  • the disarm node 334 may not be configured as a Wi-Fi STA but instead some other Wi-Fi STA device may be installed to suitably extend WFS coverage within the kitchen and the living room - for example, a Wi-Fi range extender or smart plug or the like which is plugged into a conveniently located power socket.
  • a radio-based location sensing arrangement with a security monitoring system that includes multiple cameras it is possible to use the location sensing arrangement as a guide as to which camera is likely to be best located to capture an intruder. And we can even use this information predictively, so that for example the monitoring station may instruct the central unit 122 to turn on a camera, and stream its video, based on a prediction that the intruder will come into view on that camera in the near future. In this way, a camera may be turned on and supplying video before its motion sensor (internal or external) has been triggered.
  • a premises security monitoring installation having a plurality of alarm event sensors and a plurality of video cameras, a location sensing arrangement to detect human presence and location within the premises and comprising a radio-based system that is configured to sense presence and location based on detecting perturbations of radio signals, a local management device, to report alarm events to a remote monitoring station, the local management device being configured to notify the remote monitoring station on receiving notification of an alarm event and to supply to the remote monitoring station location data from the location sensing arrangement, receive from the remote monitoring station a request for image data from an identified one of the plurality of video cameras selected based on the supplied location data; and supply the requested image data to the remote monitoring station.
  • the notification of the alarm event preferably includes an identifier for each video camera for which image data are already available.
  • the remote monitoring centre generally a human operative of the centre, is able to select between different video sources (if multiple cameras have been triggered) and optionally to compare the presence data built up since the start of the event with the identities of the cameras for which video is available.
  • the remote monitoring centre has a map of the premises (which is used by the human operators of the centre) in respect of which an alarm event has been created, the map showing the location and identifiers for the cameras and other sensors of the system.
  • the request received by the central unit from the remote monitoring station may be for which image data have not already been captured as part of the alarm event, for example based on a prediction of where the intruder will be next. But the remote monitoring centre may see that the available location data shows that the intruder may already be in the vicinity of a camera that has not yet been triggered, and hence instruct the central unit to activate the relevant camera and supply images from it. In this and other situations, video may be streamed, or short sequences may be sent.
  • the radio-based system is preferably configured to process communication signals received from one or more radio transmitters operating according to one or more communication standards or protocols, as distinct for example from merely processing RF carrier waves or other unmodulated signals.
  • one or more communication standards or protocols as distinct for example from merely processing RF carrier waves or other unmodulated signals.
  • the one or more radio transmitters may be in a common wireless network with the local management device, as this facilitates integration of the radio-based presence and location system into the security monitoring system - which is likely to reduce both the cost and the installation time required to deploy such a security monitoring system.
  • the local management device of security monitoring installations preferably includes a radio receiver of the radio-based presence and location sensing system, rather than for example receiving presence and location data or signals from another device which is part of the radio-based presence and location sensing system.
  • a radio receiver of the radio-based presence and location sensing system rather than for example receiving presence and location data or signals from another device which is part of the radio-based presence and location sensing system.
  • This helps to reduce complexity and hence also reduce both cost and speed of deployment.
  • the radio-based system is configured to process communication signals according to one or more communication standards or protocols, it also enables the local management device to benefit directly from recovery protocols and mechanisms integrated into the relevant communication standards or protocols.
  • the local management device includes a processor and a memory holding software instructions that when run on the processor cause the local management device to process radio signals to derive location and presence data. This helps to reduce complexity and hence also reduce both cost and speed of deployment.
  • the sensing arrangement to detect human presence uses changes in channel state information or received signal strength in determining presence.
  • the local management device functions as an access point of a radio network, such as a Wi-Fi network, whose signals are used by the radio-based presence and location sensing system.
  • a radio network such as a Wi-Fi network
  • the radio network for which the local management device functions as an access point may include at least one further access point.
  • the Wi-Fi network may be based on an Extended Service Set model, with two or more interconnected APs.
  • the one or more radio transmitters may include one or more of the following: a Wi-Fi access point, a Wi-Fi extender, a smart plug or smart socket, a smart speaker, a smart bulb, a control panel of the security monitoring system, a Wi-Fi-enabled video camera.
  • a control unit for a security monitoring system for premises comprising a processor, a memory communicatively coupled to the processor and a set of instructions stored in the memory which when executed by the processor cause the control unit to: perform location sensing to detect human presence and location within the premises based on detecting perturbations of radio signals; notify a remote monitoring station on receiving notification of an alarm event and to supply to the remote monitoring station location data derived from detected perturbations of radio signals; receive from the remote monitoring station a request for image data from an identified one of the plurality of cameras selected based on the supplied location data; and supply the requested image data to the remote monitoring station.
  • the control unit may further comprise a radio transceiver communicatively coupled to the processor, the processor being configured to perform location sensing by detecting perturbations in radio signals received by the transceiver.
  • a local management device for a premises security monitoring installation configured to be coupled to:
  • the local management device is configured to perform location sensing by processing communication signals received from one or more radio transmitters operating according to one or more communication standards or protocols.
  • something else such as Wi-Fi extender, or another AP, may perform the location and presence sensing and provide the results to a local management device or central unit.
  • the local management device further comprises a radio transceiver that the local management device uses as a radio receiver of a radio-based presence and location sensing system.
  • the local management device may be a controller of a security monitoring system in which the video cameras and other sensors are coupled to the device using wires rather than wirelessly.
  • the local management device will include one or more transceivers for wireless exchange of control and housekeeping signals with the video cameras and other nodes and sensors of the system, but these will typically support the use of low bandwidth transmissions that can be supported by low power, low bandwidth transceivers in the nodes and sensors of the system - permitting the use of internal battery power supplies in the nodes and sensors, while still achieving reasonable battery life.
  • the local management device may include a further transceiver, such as a Wi-Fi transceiver, that is used as a radio receiver of the radio-based presence and location sensing system - and optionally also for the transfer of video data from video cameras of the security monitoring system.
  • a further transceiver such as a Wi-Fi transceiver, that is used as a radio receiver of the radio-based presence and location sensing system - and optionally also for the transfer of video data from video cameras of the security monitoring system.
  • the local management device further comprises a processor and a memory holding software instructions, the software instructions when run on the processor causing the local management device to process radio signals to derive location and presence data.
  • the local management device is configured to detect human presence and location using changes in channel state information or received signal strength.
  • a local management device of a premises security monitoring installation including a plurality of cameras, a location sensing arrangement to detect human presence and location within the premises and comprising a radio-based system that is configured to sense presence and location based on detecting perturbations of radio signals, the method comprising:
  • the method further comprises determining a location of human presence within the premises before the step of supplying the remote monitoring station with location data from the location sensing arrangement.
  • the notification of the alarm event preferably includes an identifier for each video camera for which image data are already available.
  • the request is for image data from one of the cameras for which image data have not already been captured as part of the alarm event.
  • FIG 4 is a schematic drawing showing in more detail features of the gateway or central unit 122 of Figures 1 .
  • the gateway 122 includes a first transceiver 430 coupled to the first antenna 480, and optionally a second transceiver 432 coupled to a second antenna 482.
  • the transceivers 430 and 432 can each both transmit and receive, but a transceiver cannot both transmit and receive at the same time.
  • the transceivers 430, 432 each operate in half duplex.
  • a transceiver will use the same frequency to transmit and receive (although of course if the two transceivers are to operate simultaneously but in opposite modes, they will operate on different frequencies).
  • the transceivers 430, 432 may be arranged such that one transceiver 430 uses a first frequency for transmit and receive and the second transceiver 432 uses the same first frequency for transmit and receive, i.e. the transceivers are arranged to operate in a diversity-like arrangement.
  • the second transceiver may, depending on configuration, be arranged to use a second frequency for transmit and/or receive.
  • the transceivers 430 and 432 are coupled to a controller 450 by a bus.
  • the controller 450 is also connected to a network interface 460 by means of which the controller 450 may be provided with a wired connection to the Internet and hence to the monitoring centre 200.
  • the controller 450 is also coupled to a memory 470 which may store data received from the various nodes of the installation for example event data, sounds, images and video data.
  • the central unit 122 also includes a crystal oscillator 451, which is preferably a temperature controlled or oven-controlled crystal oscillator. This is used for system clocking and also frequency control of the transceivers.
  • the gateway 122 includes a power supply 362 which is coupled to a domestic mains supply, from which the gateway 122 generally derives power, and a backup battery pack 464 which provides power to the gateway in the event of failure of the mains power supply.
  • the central unit 122 also includes a Wi-Fi transceiver 440, and associated antenna arrangement 442, which may be used for communication with any of the nodes that is Wi-Fi enabled.
  • the Wi-Fi enabled node may be a remote control or control panel that may for example be located close to the main entrance to the building (e.g., control panel 128 or disarm node 130) to enable the occupier to arm or disarm the system from near the main entrance, or it may for example be an image-capture device such as a video camera (e.g. camera 126).
  • PLMN Public Land Mobile Network
  • a third antenna 484 and associated ISM transceiver 434 may be provided, for example for communication with the monitoring centre 200 over, for example, the European 863MHz to 870MHz frequency band.
  • the third transceiver 434 may be a Sigfox transceiver configured to use the Sigfox network to contact the central monitoring station especially in the event that jamming of other radio channels is detected.
  • the first 430 and second 432 transceivers may both be tuneable ISM devices, operating for example in the European 863MHz to 870MHz frequency band or in the 915MHz band (which may span 902-928MHz or 915-928MHZ depending upon the country). In particular, both of these devices may be tuned, i.e. may be tuneable, to the frequencies within the regulatorily agreed sub-bands within this defined frequency band.
  • the first transceiver and the second transceiver if present, may have different tuning ranges and optionally there is some overlap between these ranges.
  • the controller 450 is configured to run a sensing application using a WFS software agent 800, which may be stored in memory 470.
  • the WFS software agent 400 uses WFS radio APIs in the Wi-Fi transceiver 440 to interact with the Wi-Fi radio, the APIs enabling extraction of desired channel environment measurement information and provides the ability to assert any related controls to configure WFS features. This behaviour will be described in more detail shortly.
  • the sensing application on the CU will report a presence state change when the appropriate thresholds are triggered, along with the address of the device whose received data triggered the algorithm.
  • the WFS agent provides a monitoring system which enables the security monitoring system to detect presence and movement in a monitored space, without the necessity to use line of sight motion detectors.
  • this functionality can be provided on an access point, e.g. a Wi-Fi access point, AP such as router 300, of the premises, with the AP configured to report the result of presence detection to the central unit 122.
  • a Wi-Fi range extender could instead be used as sensing master for its connected nodes, but would be configured to report to the central unit 122 which would be the overall master in terms of reporting the "alarm”.
  • WFS works, and how WFS can be integrated into a security monitoring system, and in particular how WFS can be integrated into a central unit of a security monitoring system.
  • Wi-Fi Sensing can be performed with any Wi-Fi device and can be used on any available communication path. Each communication path between two devices gives the chance to extract information about the surrounding environment. Wi-Fi sensing is based on an ability to estimate the wireless channel and hence the surrounding environment. Because Wi-Fi networks comprise many devices spread throughout a geographical area, they are well suited to exploiting these devices' transmissions in effect to provide a radar system. Depending on the number of devices, the radar system may be monostatic, bistatic, or multistatic. In monostatic WFS, a single device measures its own transmitted Wi-Fi signals. In bistatic WFS, the receiver and transmitter are two different devices (for instance, an AP and a STA in infrastructure mode). In multistatic WFS, the received signals from multiple Wi-Fi transmitters are used to learn about a shared environment.
  • At least one Wi-Fi transmitter and one Wi-Fi receiver are required to perform WFS measurements, and these can be located in the same device (to create a kind of monostatic radar) or in different devices.
  • the measurement is always performed by a Wi-Fi Sensing-enabled receiver on the Wi-Fi signal transmitted by a transmitter, and which may or may not originate from a Wi-Fi sensing-capable device.
  • the device that transmits the signal that is used for measurements is called the "illuminator," as its transmissions enable collection of information about the channel - that is, it illuminates the channel.
  • Wi-Fi Sensing measurements are recognised - Passive, Triggered, Invoked, and Pushed, and these depend upon what triggers the illuminator device to transmit a Wi-Fi signal.
  • the agent improves the usefulness of the standard beacon interval by using optimised timings.
  • WFS In passive mode, WFS relies on transmissions that are part of regular Wi-Fi communication.
  • the Wi-Fi Sensing receiver(s) rely only on transmissions between itself and the illuminator device(s). Passive transmissions do not introduce overhead, but the Wi-Fi sensing device lacks control over the rate of transmissions, transmission characteristics (bandwidth, number of antennas, use of beamforming), or environmental measurements.
  • Invoked measurement involves utilizing a packet transmission that is in response to a packet received from the Wi-Fi Sensing receiver device.
  • a transmission is initiated by the illuminator device for measurement.
  • a pushed transmission can be either a unicast or a multicast/broadcast message.
  • Multicast/broadcast messages can be used for measurements by multiple WFS receivers simultaneously if the devices are not in power-save mode.
  • Triggered transmissions introduce overhead because additional over-the-air transmissions are required. Pushed transmissions introduce less overhead compared to invoked transmissions, because the exchange is unidirectional rather than bidirectional. Triggered transmissions allow for a system to control both the rate and occurrence of measurements.
  • a WFS network is made up of one or more WFS illuminators and one or more WFS receivers.
  • a WFS system is made up of three main components and that are present in Wi-Fi Sensing illuminators and receivers:
  • a WFS system can be built based on existing Wi-Fi standards, hardware, software and infrastructure.
  • the fundamental component required to enable Wi-Fi sensing on the radio is the interface to enable control and extraction of periodic channel or environmental measurement data. Regardless of device type, operating band or Wi-Fi generation, the core APIs to enable Wi-Fi sensing are similar, as the required data and control are common.
  • the WFS software Agent can reside on any Wi-Fi device; for example, in the infrastructure mode, the agent may reside on the AP, in which case channel measurements from all the STAs associated with the AP can be collected.
  • the software agent may also be located on a STA. But in the security management system applications this would mean that the STA would either need to be the controller of the security management system (e.g. the CU), or would have to be reporting to the controller of the security management system (e.g. the CU). Generally, we therefore prefer to run the software agent on the CU, and given that the CU is conveniently also an access point, it makes sense for us to run the software agent on the CU acting as AP rather than merely as an STA.
  • the WFS software Agent uses the WFS radio APIs to interact with the Wi-Fi radio, the APIs enabling extraction of desired channel environment measurement information, and providing the ability to assert any related controls to configure WFS features.
  • the WFS Agent has two main subsystems: Configuration and Control; and a Sensing Algorithm.
  • the Configuration and Control subsystem interact with the radio, using a standard set of APIs.
  • the Configuration and Control subsystem performs tasks including sensing capability identification, pushed illumination coordination, and radio measurement configuration.
  • the sensing algorithm subsystem includes intelligence needed to extract the desired features from the radio measurement data and may differ according to the desired sensing application.
  • the WFS software Agent is needed on any sensing receiver, but is merely optional on an illuminator - only being required if the illuminator also acts as a receiver. If included on an illuminator, only the configuration and control subsystem is needed. By having the agent on the illuminator, additional enhancements are enabled, including sensing capability identification and co-ordinated pushed illumination. If the illuminator is not running an agent, it is still technically able to participate in the sensing network, but only the most basic features that currently exist in Wi-Fi standards will be supported.
  • the WFS software Agent processes and analyses the channel measurement information and makes sensing decisions, such as detecting motion. This information is then shared with the application layer via the Wi-Fi Sensing agent I/O interface. As well as interfacing with the radio and the application layer, the Wi-Fi Sensing agent also interfaces with the existing Wi-Fi services on the system. This interface is necessary for the agent to provide feedback for sensing optimizations that can be used in radio resource management decisions, such as band steering or AP selection requests.
  • the application layer of a WFS system creates the sensing service and in effect presents the information to the end user (in our case to the security management system).
  • the application layer can potentially reside on any networked device: in some embodiments of the present invention it will reside in the central unit 122 along with the WFS agent, but in other embodiments the application layer may exist in an external server or even in the central monitoring station. We prefer, however, to provide the application layer on the central unit to avoid potential problems with signalling delays (for example due to accidental or deliberate network interruption) between the central unit (or other WFS receiver) and a remotely located entity.
  • the application layer receives input from one or multiple Wi-Fi sensing software agents.
  • a typical Wi-Fi home network follows one of two common deployment scenarios.
  • the first consists of a single AP that serves as the internet gateway for all the devices in the house.
  • the second consists of multiple APs forming an ESS and extending coverage throughout the home.
  • the Wi-Fi Sensing receiver may be the AP and/or other devices in the network. Not all the devices in a home deployment need to be Wi-Fi Sensing capable.
  • Wi-Fi Sensing can be deployed in all types of Wi-Fi networks and topologies, operating in different frequency bands (2.4, 5, 6, and 60 GHz) and different bandwidths.
  • the sensing resolution and performance depends on the use case requirements. In general, it is enhanced with the increase in the number of participating devices and higher bandwidths.
  • Applications that require lower resolutions and longer range, such as home monitoring, can be deployed using Wi-Fi networks operating in 2.4GHz and 5GHz.
  • Applications that require higher resolutions and lower range, such as gesture recognition require 60GHz Wi-Fi networks.
  • Radio resource management (RRM) events such as AP and/or band steering, should be conducted in coordination with the Wi-Fi Sensing agent/operation.
  • the devices involved with Wi-Fi Sensing will depend upon the deployment environment and the specific use case.
  • the sensing measurements also need to be processed by the device with enough computation power.
  • the coordination of sensing, including participating devices, is a role particularly suited to an AP.
  • the central unit of a security monitoring system will have ample processing power, as well as being able to function as an AP, to handle this task efficiently and speedily.
  • Wi-Fi networks The nature of Wi-Fi networks is such that it should be possible able to add additional Wi-Fi sensing capable devices to the network to enhance accuracy, coverage and/or localization.
  • additional devices do not necessarily need to be Wi-Fi Sensing capable or dedicated Wi-Fi sensing devices to participate; however, optionally they may also identify their Wi-Fi sensing capabilities and supported features to the AP.
  • Internet of Things (IoT) devices for home deployment can typically also be used as part of a WFS installation supporting a WFS-enabled security monitoring system: example include Wi-Fi controllable plugs and sockets, light bulbs, thermostats, smart speakers, and video door bells.
  • Wi-Fi Sensing agent may elect not to make use of that device.
  • WFS for a security monitoring system may be run over a dedicated Wi-Fi network, the premises having at least one other Wi-Fi network for other purposes. But for reasons of simplicity and economy it may often be preferred to operate a single Wi-Fi network to serve all a household's (or small business's) needs including WFS for a security monitoring service. If a single-network solution is adopted, performance degradation due to airtime usage and sensing overhead must be minimized and hence Wi-Fi transactions required for conducting sensing measurements and sensing management and processing must be optimized for efficiency.
  • At least one network device executes the sensing software, or Wi-Fi Sensing Agent.
  • the Wi-Fi Sensing agent is typically placed on the AP, but it can be placed on any STA (although, as previously mentioned, we prefer to run the Wi-Fi Sensing agent on the AP).
  • the Wi-Fi Sensing agent should discover the device and its sensing capabilities. Depending on the capabilities of the device, its role in the Wi-Fi sensing network would be determined. If the new device is another Wi-Fi Sensing-capable AP, then coordination among the agents is required.
  • the WFS agent needs to have a mechanism to determine which devices are capable and needs to participate in the sensing for each application on a device-specific basis.
  • a WFS agent also needs to be capable of configuring the radio for measurements and triggering transmissions on a periodic basis for sensing measurements, and to enable/disable measurements or adjust configuration parameters for Wi-Fi sensing-capable devices.
  • the Wi-Fi Sensing agent is also able to request specific radio resource management operations, such as AP or band steering.
  • the WFS agent is also preferably able to detect and process specific sensing events and communicate the relevant information to the application layer (e.g., the security monitoring system) for specific handling and user presentation.
  • Interference can be caused by other Wi-Fi devices operating in the same band, which causes cochannel interference, or in an adjacent channel, which causes adjacent channel interference. It can also be caused by non-W-Fi devices, which can be other communication systems or unintentional transmissions that create electromagnetic noise in the band. Interference can impact Wi-Fi Sensing performance in two ways. Firstly, it may interfere with the sensing transmissions and thereby reduce the number of measurements made in a given time interval. As such, it introduces jitter in time instants during which the measurements are made. Secondly channel-state measurements may capture the impact of transient interference, such as for a non-Wi-Fi device, as opposed to motion in the environment.
  • Wireless systems deploy various techniques to avoid or reduce the impact of interference, and these techniques also help to improve WFS performance. These techniques aim at maximizing the reuse of spectrum, while minimizing the overlap of spectrum used by nearby networks: for example, Dynamic Channel Allocation (DCA); Auto Channel Selection (ACS); optimized RF planning; (e.g., non-overlapping channels and use of reduced channel width when applicable), and power control.
  • DCA Dynamic Channel Allocation
  • ACS Auto Channel Selection
  • optimized RF planning e.g., non-overlapping channels and use of reduced channel width when applicable
  • increasing the number of illuminators may result in a higher sensing performance: with more transmitters that are located sufficiently apart from one another, motion in a larger area can be detected; when motion is detected using transmissions on one or more transmitters, information is provided that can be used to determine localization of the motion; and sensing accuracy is improved with a higher number of measurements taken across a larger number of transmitters in most scenarios.
  • the IEEE 802.11a preamble is useful for Wi-Fi Sensing.
  • the preamble contains a short training field (STF), a guard interval and a long training field (LTF).
  • STF is used for signal detection, automatic gain control (AGC), coarse frequency adjustment and timing synchronization.
  • AGC automatic gain control
  • LTF is used for fine frequency adjustment and channel estimation. Since only 52 subcarriers are present, the channel estimation will consist of 52 frequency points.
  • Newer OFDM PHY versions (HT/VHT/HE) maintain the IEEE 802.11a preamble for backward compatibility and refer to it as the legacy preamble.
  • the legacy preamble spans a 20MHz bandwidth and consists of a legacy STF (L-STF) and legacy LTF (L-LTF).
  • HT/VHT/HE OFDM PHY versions
  • HT/VHT/HE introduce wider channel bandwidths (up to 160MHz) for backward compatibility
  • the legacy preamble is duplicated on each 20MHz channel. This allows the receiver to compute 52, 104, 208 or 416 valid L-LTF frequency points, which represent the channel estimation between the two devices.
  • MIMO training fields present in HT, VHT and HE LTFs.
  • the MIMO fields are modulated using the full bandwidth (20MHz to 160MHz) and are traditionally used by the receiver to estimate the mapping between the constellation outputs and the receive chains. Since these fields span the full bandwidth, they provide more frequency points. For example, a 20MHz L-LTF contains 52 subcarriers, while a 20MHz HT/VHT-LTF contains 56 subcarriers.
  • the latest introduction of the HE PHY has the potential to enhance Wi-Fi Sensing. In addition to enabling operation in the 6GHz spectrum, the HE PHY has increased the number of subcarriers per 20MHz bandwidth by 4x, which effectively allows for better object resolution.
  • the IEEE 802.11ad amendment defines a Directional-Multi-Gigabit (DMG) PHY for operation in the 60GHz band. While there are three different modulation schemes (Control, Single-Carrier and OFDM) defined, Control and the Single Carrier PHY are the primary PHY used in 802.11ad (and is also part of the subsequent 802.11ay amendment). Regardless of the modulation scheme, every packet starts with a preamble that consists of a short training field (STF) and a channel estimation field (CEF). The STF is used for timing estimation and AGC adjustment. CEF is used for channel estimation.
  • STF short training field
  • CEF channel estimation field
  • the necessary channel estimation for Wi-Fi Sensing is available following successful reception and processing of the preamble of a packet and can be provided to the higher layers.
  • the wide channel bandwidth available in 802.11ad/ay can significantly improve the performance of Wi-Fi Sensing in terms of the resolution; however, the limited communication range in 60GHz band restricts the sensing range and coverage.
  • the central unit of a security monitoring system may relay instead on frequency bands with longer range, sufficient to cover the majority of households.
  • the use of the 60GHz band may be attractive and therefore embodiments of the invention may use this band for WFS.
  • the MAC layer mechanisms may be used to obtain information about the connected devices and the roles they play in Wi-Fi sensing.
  • the MAC layer also initiates and drives transmissions required for channel estimation among the devices in the Wi-Fi Sensing network.
  • the first is identifying the devices and the channel estimation mapped to the physical environment between any two devices.
  • an STA is identified by a 48-bit MAC address.
  • a MAC address is sufficient identification for STAs associated with a Wi-Fi network; however, if the association is lost during the lifetime of the application, then randomized MAC addresses may be used. In this case, a different or more involved mechanism would be required to identify each STA. This identification must match the corresponding channel estimate measurement obtained from the PHY.
  • the second is identifying the device network role and its connection type, such as whether it is an AP or an STA, or whether it is part of a mesh or a P2P connection. This information is used by the Wi-Fi Sensing agent to decide the best method for conducting measurements.
  • the third aspect is the identification of WFS device capabilities, such as sensing capabilities, supported measurement rate, and the availability and willingness of the device to participate in sensing measurements. This information is required from all devices in the network for the Wi-Fi Sensing agent to select devices participating in the sensing measurements.
  • NDP null data packet
  • ACK ACK
  • Another example of how an invoked measurement can be triggered is by use of the implicit unidirectional beamforming procedure, first defined in the IEEE 802.1 In standard. In this procedure, an STA requests beamforming training by sending a MAC frame with the training request (TRQ) bit set to 1. This triggers the receiving device to send an NDP announcement, followed by an NDP to illuminate the channel.
  • TRQ training request
  • a transmission is triggered by the illuminator to be received by one or multiple Wi-Fi Sensing receivers.
  • Beacon frames are an example of using existing MAC packet exchanges for pushed measurements.
  • either the AP or STA may take the role of sensing receiver; additionally, there may be multiple sensing receivers required to support the application. Moreover, there may be multiple illuminators involved in the measurements. MAC layer coordination is used to coordinate the sensing transmissions among the illuminators and the sensing receivers in an efficient way. MAC layer scheduling may also be used to enable periodic measurements on which some use cases rely. Coordination and scheduling at the MAC layer should enable different options for conducting sensing measurements among multiple illuminators and sensing receivers, with minimal added overhead, while accounting for the power save state of the devices.
  • the WFS agent has an interface to pass the WFS control information to the radio and extract the measurement data.
  • the interface should be PHY agnostic and is, therefore, defined in a generic manner and extendable to cover different radio driver implementations, including drivers from different chipset vendors.
  • the interface definition should allow for potential additional features or capabilities provided by a specific PHY or a chipset, as well as a path for growing the technology. Definition of a standard interface/API enables radio firmware and driver developers to ensure compliance and enables reuse of components or common codes, which may be placed into a library. Most Wi-Fi drivers are based on either the wireless-extensions framework or the more recent and actively developed cfg80211 / nl80211 framework.
  • the WFS interface should provide the WFS agent with STA identification and enable the WFS agent to track the physical device in the network (i.e., the AP to which it is connected), as well as the device's capability and availability to participate in the measurements.
  • the WFS agent requires control of the STAs that will participate in the sensing measurements, as well as what measurement type (passive vs triggered) will be performed.
  • the WFS interface should provide such control, either on a global system scale or on a per STA basis so that the WFS agent can conduct WFS measurements in the most efficient manner.
  • the measurement rate is typically decided by the WFS agent, and the interface should support its control. However, to provide the lowest jitter and best efficiency possible, it is best to rely on the MAC layer for scheduling.
  • WFS applications may have different measurement parameter requirements (bandwidth, antenna configuration, etc.). The configuration of measurement parameters allows the application to obtain only the data it requires to maintain efficiency.
  • the measurement parameters should be configurable independently for each STA.
  • the WFS interface should be flexible enough for the radio to specify whether the data payload is in time-domain or frequency-domain, the numerical format, etc. By having this knowledge, the Wi-Fi Sensing agent can correctly interpret the data.
  • While security monitoring systems are normally developed to protect premises, such as houses or apartments, some installations include one or more cameras, typically video cameras, arranged to monitor external spaces such as terraces, gardens and forecourts.
  • the (video) camera is associated with one or more movement sensors, the camera and the movement sensor(s) being arranged to cover a common surveillance area.
  • movement within the monitored surveillance area triggers the movement sensor, turning on the camera and alerting the central unit which in turn may signal an alarm condition to a central monitoring station.
  • embodiments of the invention are also directly applicable to such system and installations.

Abstract

Provided is a premises security monitoring installation having a plurality of alarm event sensors and a plurality of video cameras, a location sensing arrangement to detect human presence and location within the premises and comprising a radio-based system that is configured to sense presence and location based on detecting perturbations of radio signals, a local management device, to report alarm events to a remote monitoring station, the local management device being configured to: notify the remote monitoring station on receiving notification of an alarm event and to supply to the remote monitoring station location data from the location sensing arrangement, receive from the remote monitoring station a request for image data from an identified one of the plurality of video cameras selected based on the supplied location data; and supply the requested image data to the remote monitoring station. Optionally, the notification of the alarm event includes an identifier for each video camera for which image data are already available. Optionally, the request is for image data from one of the cameras for which image data have not already been captured as part of the alarm event.

Description

    Technical Field
  • The present invention relates generally to security monitoring systems for premises, and in particular to such installations including a plurality of video cameras.
  • Background
  • Security monitoring systems for monitoring premises, often referred to as alarm systems, typically provide a means for detecting the presence and/or actions of people at the premises and reacting to detected events. Commonly such systems include sensors to detect the opening and closing of doors and windows, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones. Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected. Such installations typically include a control unit (which may also be termed a central unit or local management device), generally mains powered, that is coupled to the sensors, detectors, cameras, etc. ("nodes"), and which processes received notifications and determines a response. The local management device or central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit. Similarly, for ease of installation and to improve security, the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered.
  • As an alternative to self-contained systems, a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a remotely located monitoring station where, typically, human operators manage the responses required by different alarm and notification types. These monitoring stations are often referred to as Central Monitoring Station (CMS) because they may be used to monitor a large number of security monitoring systems distributed around the monitoring station, the CMS located rather like a spider in a web. In such centrally monitored systems, the local management device or central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system - in particular whether it is fully or only partially armed, and the nature of the detected events. In such a configuration, the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station. Again, in such installations the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.
  • It is nowadays usual for centrally monitored security monitoring systems to include at least one motion-triggered video camera for monitoring the premises, and even in modestly sized premises the use of multiple such cameras to monitor different rooms or aspects is increasingly common. In larger or more complex premises there may many cameras, for example in multistoried premises there may be multiple cameras to each floor and others for access areas. In the event that an intrusion is detected, the central unit of a system with multiple motion-triggered video camera will typically be configured to supply the remote monitoring station with video data only from video cameras at which motion was detected (motion detection is typically performed by optical sensors such as PIR devices, but cameras may also be triggered by the motion (or act) of opening a door, for example. The remote monitoring station may also be able to command the central unit to command a video camera that has not been triggered but which provides a view of a particular location (for example, where another sensor or alarm node has been triggered) to supply video data.
  • The transceiver of the central unit that handles video and image data transmissions from the video cameras of the system obviously has limited bandwidth, and if multiple cameras have video to transmit they each have in effect to take their turn, to avoid contention problems. This means that the last video file to be received may be received well after the first video file. Moreover, channels over which video data (still images and video sequences/streams) are transmitted from the central unit to the remote unit are frequently low bandwidth, so that transmitting usefully high-resolution images at a reasonable frame rate is rather slow. This should not be a problem if there is only a single video camera (or only a single camera has been triggered), and images may be streamed continuously at a certain frame rate and resolution, or periodically at higher frame rates and/or resolutions if such higher frame rate/resolution is required. But if multiple video cameras have been triggered, so that images or video sequences from multiple cameras need to be supplied to the remote monitoring station, it can take several minutes for images/sequences from every triggered camera to be supplied to the remote monitoring unit. It may be therefore that the critical images/video sequence, which clearly shows the intruder and his actions, are received after all the other video data - therefore delaying the moment when the monitoring station (or more typically, the human operative in the monitoring station) can take action based on the content of the critical images/sequences. Although it might seem that a delay of a minute or a few minutes is of no consequence, practical experience shows that quite literally such delays can be a matter of life or death. There therefore exists a need to provide a way of reducing the delay in supplying relevant video image/sequence data from security monitoring system to a remote monitoring station.
  • Summary
  • According to a first aspect, there is provided a premises security monitoring installation having a plurality of alarm event sensors and a plurality of cameras, a location sensing arrangement to detect human presence and location within the premises and comprising a radio-based system that is configured to sense presence and location based on detecting perturbations of radio signals, a local management device to report alarm events to a remote monitoring station, "CMS", the local management device being configured to: notify the CMS on receiving notification of an alarm event and to supply to the CMS location data from the location sensing arrangement, receive from the CMS a request for image data from an identified one of the plurality of cameras selected based on the supplied location data; and supply the requested image data to the CMS.
  • This approach helps the CMS more quickly locate the camera data showing the intruder, rather than potentially having to wait until images from all cameras have been viewed which can take a long time as the data from the different cameras are sent serially and the channel bitrate may be low.
  • According to a second aspect, there is provided a premises security monitoring installation having a plurality of alarm event sensors and a plurality of cameras, a location sensing arrangement that uses channel state information analysis to detect human presence and location within the premises; a local management device to report alarm events to a central monitoring station, "CMS", the local management device being configured to: notify the CMS on receiving notification of an alarm event and to supply to the CMS location data from the location sensing arrangement, receive from the CMS a request for image data from a particular one of the plurality of cameras selected based on the supplied location data; and supply the requested image data to the CMS.
  • These approaches help the CMS more quickly locate the camera data showing the intruder, rather than potentially having to wait until images from all cameras have been viewed which can take a long time as the data from the different cameras are sent serially and the channel bitrate may be low.
  • According to a third aspect, there is provided a method performed by a local management device of a premises security monitoring installation, the installation including a plurality of cameras, a location sensing arrangement to detect human presence and location within the premises and comprising a radio-based system that is configured to sense presence and location based on detecting perturbations of radio signals, the method comprising:
    • receiving notification of an alarm event; notifying a remote monitoring station, "CMS", of the alarm event; supplying the CMS with location data from the location sensing arrangement;
    • receiving from the CMS a request for image data from an identified one of the plurality of cameras selected based on the supplied location data; and supplying the requested image data to the CMS.
  • According to a fourth aspect, there is provided a control unit for a security monitoring system for premises, the system including a plurality of cameras, and the control unit comprising a processor, a memory communicatively coupled to the processor and a set of instructions stored in the memory which when executed by the processor cause the control unit to: perform location sensing to detect human presence and location within the premises based on detecting perturbations of radio signals; notify a remote monitoring station on receiving notification of an alarm event and to supply to the remote monitoring station location data derived from detected perturbations of radio signals; receive from the remote monitoring station a request for image data from an identified one of the plurality of cameras selected based on the supplied location data; and supply the requested image data to the remote monitoring station.
  • According to a fifth aspect, there is provided a local management device for a premises security monitoring installation, the management device configured to be coupled to: a plurality of cameras of the installation; a plurality of alarm event sensors; and to a remote monitoring station, "CMS", for the reporting of alarm events; and further configured to: perform location sensing to detect human presence and location within the premises based on detecting perturbations of radio signals; notify the CMS on receiving notification of an alarm event and to supply to the CMS location data derived from detected perturbations of radio signals; receive from the CMS a request for image data from an identified one of the plurality of cameras selected based on the supplied location data; and supply the requested image data to the CMS.
  • Brief description of the drawings
  • Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings, in which:
    • Figure 1 is a schematic plan of a single floor of premises in which a first security monitoring system has been installed, the system including a plurality of video cameras;
    • Figure 2 illustrates schematically the principles of radio-based presence and location sensing;
    • Figure 3 is a schematic floor plan corresponding generally to Figure 1 but additionally showing multiple sources of radio signals for use in a radio-based presence and location sensing system based on detecting perturbations of radio signals; and
    • Figure 4 illustrates schematically features of the local management device of the system of Figure 3.
    Specific description
  • Figure 1 shows schematically a security monitoring system installation 100 in premises comprising a dwelling standing in grounds, not shown. In this example the premises are in the form of a multi-story house, of which only the ground floor is shown. The house has a front door 104, that serves as the main entrance, and which leads into an entrance hall 106. For simplicity and ease of description the various rooms are shown as linked by doorways, but with doors omitted. In practice, of course, most of the doorways would typically be fitted with doors, and some or all of these doors may be fitted with door opening sensors such as that shown on the front door as sensor 107. Typically, these door opening sensors will be battery powered, using a magnet and a sensing element such as a magnetometer or reed switch, and include a radio transceiver for communicating with the local management device, or central unit, 122 of the security monitoring system. The entrance hall leads through to the living room 108, a dining room 110, and thence into a kitchen 112. The kitchen 112 includes the house's back door 114. Like the front door 104, the back door 114 is also provided with the door opening sensor 107. From the kitchen 112 there is an entry to a pantry 116, and also to a playroom 118. The playroom leads into a music room 120, and a conservatory 124 which in turn leads back into the entrance hall 106 which in turn leads to a cloakroom 125. Leading off the living room 108 is a library 126, and an office 128 which in turn leads through to a storage room 130. Stairs 131 in the hall lead up to the upper floors of the house.
  • Adjacent the front door 104, in the entrance hall, is a control panel 132 by means of which a user may arm and disarm the security monitoring system 100. In particular, when entering the house through the front door 104 when the system is armed, a user may use the control panel 132 to disarm the monitoring system 100, or to change the armed state from "armed away" - in which the security monitoring system both secures the perimeter of the house, and also monitors the interior of the house with the possibility of an alarm event being triggered upon motion been detected within the house; to "armed at home" state, in which the perimeter is monitored but movement within the house does not give rise to the central unit 122 raising an alarm event.
  • Another similar control panel, including a display, may also be provided adjacent the back door, but in this example a disarm node 134 is provided instead. The disarm node permits arming and disarming of the security monitoring system using a dongle, a suitably programmed smart phone, or the like, and possibly arming and disarming by the entry of a PIN using a physical keypad or touchscreen.
  • The central unit 122 of the security monitoring system 100, here located in the library 126, is coupled to an external monitoring station 200 by means of a wired (broadband) connection the Internet 210 and also by at least one radio network, e.g. a public land mobile network (PLMN). When the security monitoring system 100 is in the armed state, the triggering of an alarm event will cause the central unit 122 to report the alarm event to the external monitoring station 200, where typically a human operator will intervene, involving police and other security personnel as necessary.
  • The house shown in Figure 1 is provided with a plurality of internal video cameras 140, as well as external video cameras 142 to the front and rear of the premises. All or some of these video cameras may be connected to a mains power supply, but more commonly only the external video cameras are powered in this way (with a battery power supply backup). The internal video cameras may rely on autonomous power supplies, such as internal battery power supplies. The cameras relying on autonomous power supplies will typically include a first transceiver, with low-power consumption and low bandwidth, for receiving control signals from, and for reporting events to the central unit 122, along with a larger bandwidth and more power-hungry second transceiver, such as a Wi-Fi transceiver, for the transmission of images and video signals to the central unit (typically only done on command from the central unit, often as a result of an intervention from the remote monitoring station 200).
  • The house is shown without any windows, but of course in practice there would be windows and typically some at least of these windows would be provided with sensors to detect opening or attempted opening the windows, again battery-powered and typically coupled to the central unit by means of an internal low bandwidth and low power transceiver.
  • If an intruder breaks into the house when the security monitoring system is in the armed away state, typically a window or door sensor node will be triggered, resulting in an alarm event signal being sent by the node central unit 122. Upon receiving the alarm event signal, the central unit 122 will typically report this to the remote monitoring station 200. As the intruder moves around the house, there are likely to trigger motion sensors, for example integrated into or associated with one or more of the internal video cameras 140. The relevant motion sensor or camera will then likewise report an alarm event to the central unit 122, which will typically again be forwarded to the remote monitoring station 200. As soon as the central unit determines that there is an alarm event it will typically send a request to each camera, as soon as the camera is triggered, to transmit its video to the central unit 122. The central unit is typically not configured to store the videos received from the video cameras but instead forwards them directly to the remote monitoring station. At the central monitoring station 200 received videos are stored for review by an operative of the CMS.
  • As the intruder moves from room to room, different ones of the internal video cameras, or their associated motion sensors, will be triggered, causing further alarm event notifications to the central unit. The internal video cameras 140 may be configured to start to capture images, and possibly video sequences, starting from the triggering of the respective motion sensor, and typically these images and video sequences are initially stored on internal memory of the cameras 140 until they have been sent to the central unit 122, upon its request. Because the internal cameras 140 are typically battery-powered, and because the large bandwidth transceivers (e.g. Wi-Fi transceiver is used to transmitting video from the cameras to the central unit 122 tend to be power hungry, it is often the case that the battery-powered cameras are configured only to transmit video (more generally, images) on request from the central unit 122. It can therefore be seen that in premises such as that shown, where there are many internal video cameras covering many distinct internal spaces (e.g. many rooms), an intruder keen to scour the premises for portable valuables, may quickly give rise to a large number of stored videos waiting to be transmitted - at least until the cameras have received from the central unit requests to transmit.
  • Meanwhile, at the remote monitoring station, even if the human operator picks up the alarm event notification from the central unit almost immediately, the operator needs to assess whether the alarm indications suggest that there is a real incident, whether it is a false alarm. This can be difficult without seeing images, and in particular high resolution video images. The central unit 122 of the security monitoring system 100 will already have started to transmit video files or image files from the cameras that have been triggered. But because, in this case there are many rooms with many possible circulation routes between them, is not evident which camera is likely to provide the most useful images or video. The central unit 122 has limited capacity to receive video, because the capacity of the large bandwidth transceiver that uses to receive video/images from the cameras 140, 142, and therefore the central unit 122 preferably doesn't simultaneously instruct all triggered cameras to transmit their stored videos. Instead, the central unit tend to send serial requests, allowing the different video cameras to transmit their video/images one after the other. Once an incident is created, the central unit 122 will upload images as they come in based on the order to detection. If the central unit 122 received a detection notification from camera 1, 3, 4, 2. Images would be received in that order and transferred to a media tab for that incident for access by the operator at the central monitoring station. It can be seen therefore that the remote monitoring station may have to wait several minutes, or more, before it receives the video/image data necessary to determine whether an intervention is required, and what type of intervention if any is required. This is the main problem addressed by the present invention.
  • The underlying idea is to introduce to the premises a radio-based location sensing arrangement to detect human presence and that is configured to sense presence and location based on detecting perturbations of radio signals, and for the local management device to report alarm events to the remote monitoring station, on receiving notification of an alarm event and to supply location data from the location sensing arrangement. The remote monitoring station can then use the supplied location data, and knowledge of the location of video cameras in the premises, to determine which video camera data it wants to see first. The monitoring station can then send to the central unit of the security monitoring system a request for image data from an identified one of the plurality of cameras selected based on the supplied location data, and the central unit can then supply the requested image data. The volume of data that needs to be transferred to the remote monitoring station to enable the current location of an intruder is relatively small, and can therefore generally be transferred quite quickly. This means that the remote monitoring station, typically a human operative, is able rapidly to determine which camera's images are most likely to be useful to see now - and these can be requested and supplied without the delay inherent in the sharing and viewing of a collection of video sequences from several video cameras. Consequently, the remote monitoring centre is able to make decisions and interventions based on what is happening in the premises. In effect embodiments of the invention enable intruder localisation, and the use of intruder localisation in speeding up decision making and interventions based on supplying the relevant images/videos more quickly.
  • We will now provide a brief introduction to radio-based presence detection, which may for example be based on analysing the signal dynamics and signal statistics of radio signals and/or detecting changes in channel state information (CSI). A radio (or wireless) signal as used herein refers to a signal transmitted from a radio transmitter and received by a radio receiver, wherein the radio transmitter and radio receiver operate according to a standard or protocol. Such standards include, but are not limited to, IEEE 802.11. (which includes the Wi-Fi standards), IEEE 802.15 (which includes Zigbee), Bluetooth SIG, IEEE 802.16, IEEE 802.20, UMTS, GSM 850, GSM 900, GSM 180, GSM 19011, GPM ITU-R 5.13, GPM ITU-R 5.150, ITU-R 5.280, 3GPP 4G (including LTE), 3GPP 5G, 3GPP NR, AND IMT-2000. However, the radio transmitters and receivers may operate in non-telecommunications or Industrial, Scientific and Medical (ISM) spectral regions without departing from the scope of the invention.
  • Essentially the idea is to use radio signals to probe a zone or zones of interest, and to analyse and extract statistics from these signals, in particular looking at the physical layer and/or data link layer such as MAC address measurements that expose the frequency response of a radio channel (e.g., CSI or RSSI measurements). These measurements are processed to detect anomalies and variations over time, and in particular to detect changes signifying the entrance of a person and/or movement of a person within a monitored zone. The zone(s) to be monitored need to be covered sufficiently by radio signals, but the sources of the radio signals may either already be present before a monitoring system is established - for example from the plurality of Wi-Fi or Bluetooth capable devices that are now dotted around the typical home or office, or the sources may be added specifically to establish a monitoring system. Often some established (i.e., already located or installed) radio devices are supplemented by some extra devices added as part of establishing a radio-based presence detection system. Among the types of devices (preinstalled or specifically added) that may be used as part of such a detection system are Wi-Fi access points, Wi-Fi routers, smart speakers, Wi-Fi repeaters, as well as video cameras and video doorbells, smart bulbs, etc. Because presence (or intrusion) is detected by detecting a change in the properties or character of radio signals compared to some previous reference signal(s), it is preferred to establish what might be termed the monitoring network between radio devices that are essentially static (i.e., that remain in the same position for extended periods) rather than relying on devices that are repeatedly moved - such as smart phones, headphones, laptops, and tablet devices. It is not strictly speaking essential for all the devices whose signals are used by the monitoring system to be part of the same network - for example, signals from Wi-Fi access points of neighbouring premises could be used as part of a monitoring system in different premises. Again, a primary consideration is the stability of the signals from the signal sources that are used. Wi-Fi access points provided by broadband routers are seldom moved and rarely turned off, consequently they can generally be relied upon as a stable signal source - even if they are in properties neighbouring the property containing the zone or zones to be monitored.
  • The idea is illustrated very schematically in Figure 2, here with an installation 200 including just a single source (or illuminator) 202 and just a single receiver 204, for simplicity, although in practice there will typically be multiple sources (illuminators) and sometimes plural receivers. The installation 200 has been established to monitor a monitored zone 206. In Figure 2A we see that in steady state, and in the absence of a person, radio signals are transmitted from the source 202, spread through the monitored zone 206, and are received by the receiver 204. Of course, in most installations there will be walls, ceilings, floors, and other structures that will tend to reflect, at least in part, signals from the source. Furniture and other objects may block and attenuate the signals, the reflected signals will give rise to multiple paths, and the signals may interfere with each other, and there may be scattering and other behaviours, such as phase shifts, frequency shifts, all leading to complexity in the channels experienced by the radio signals that arrive at the receiver 204. But while the environment is static and unchanging, the receiver will tend to see a consistent pattern of radio signals. And this is true whether or not the source transmits continuously or transmits periodically. But this consistent pattern of received signals is changed by the arrival of an intruder 208, as shown in Figure 2B. From Figure 2B we see that, at the very least, the presence of a person in the monitored zone blocks at least some of the signals from the source, and that affects the pattern of radio signals received by the receiver 204. The changed pattern of signals received by the receiver enables the presence of the intruder to be detected by a presence monitoring algorithm that is supplied with information derived from the received signals. It will be appreciated that the nature and extent of the perturbation of the signals passing from the source 202 to the receiver 204 is likely to change as the intruder 208 enters, passes through, and leaves the monitored area 206, and that this applies also to reflected, refracted, and attenuated signals. These changes may enable the location of a person within the zone, and their speed of movement, to be determined.
  • It will be realised that signals that are received from an illuminator device (or from more than one illuminator device) after having passed through a monitored space (or volume), have in effect been filtered by the environment to which they have been exposed. We can therefore imagine the monitored volume as a filter having a transfer coefficient, and we can see that a received signal is at least in part defined by the properties, or channel response, of the wireless channel through which it is propagated. If the environment provided by the monitored volume changes, for example by the addition of a person, then the transfer coefficient of the filter, and the channel response or properties, will also change. The changes in the transfer coefficient, and in the channel response, consequent on the change in the environment of the monitored space, can be detected and quantified by analysing radio signals received by the wireless sensing receiver(s). Both the introduction of an object, e.g. a person, into the monitored space and movement of that object within the monitored space will change the environment and hence change the effective transfer coefficient and the channel response.
  • The radio-based sensing system can be trained by establishing a base setting in which the monitored zone is unoccupied, which is then labelled as unoccupied for example by an installer using a smartphone app or the like, and then training occupied states by a person entering, standing, and then walking through each of the zones one by one. Presence at different locations in each of the zones may be captured and labelled in the system in the same way. This process may be repeated with two people, and then optionally with more people. In essence this is a supervised machine learning approach, but other approaches to training may be used.
  • The system may need to be retrained for the base setting if bulky furniture (or if a large metal object) is added to or moved within the monitored space, because these can be expected to change the propagation properties of the relevant zone/space. The data for unoccupied states is preferably retained within a database of "unoccupied" states, even when there are changes to the arrangement of furniture etc. It may not be necessary to retrain for the occupied states, if the system can determine a delta function between the previous base state and the new one, because the delta function may also be applicable in occupied states. But if not, it may be sufficient to retrain only a subset of the occupied states previously learnt. The system may also be configured to self-learn to accommodate changes in the characteristics of the zones when unoccupied, and to add newly determined unoccupied state data to the database.
  • Although the Figure 2 example uses just a single source (illuminator) and a single receiver, as already mentioned often multiple sources (illuminators) will be used in order to achieve satisfactory coverage of the zone or zones to be monitored. Multiple zones may be monitored by a single receiver through the use of multiple strategically placed sources, but each zone, or some zones of multiple zones may have a dedicate receiver that does not serve other zones. Likewise, a radio signal source (illuminator) may provide illuminating signals for a single monitored zone or for multiple monitored zones. Also, a presence monitoring system (and a security monitoring system including such a presence monitoring system) may use mesh network arrangement, for example a Wi-Fi mesh network, in which multiple devices act as receivers for illuminating signals - either for a single monitored zone or for multiple monitored zones.
  • Figure 3 is based on Figure 1 but illustrates the presence of multiple sources of radio signals that may be used in a radio-based system that senses presence and location based on detecting perturbations of radio signals. For clarity, elements already labelled in Figure 1 should be considered to carry the same reference numerals, although in the interests of clarity these have largely been omitted. Newly introduced elements are indicated by new reference numerals. As explained with reference to Figure 2, ideally we want to ensure that the whole area of interest is adequately covered by radio signals (from relevant sources, of course) so that there are no blind spots.
  • The radio-based presence sensing, which may conveniently be based on the monitoring of Wi-Fi signals, and to which for convenience we will refer hereafter as WFS, is here performed by the central unit 122 which operates as a Wi-Fi Access Point (AP) and which serves as a Wi-Fi sensing receiver.
  • To ensure that the WFS effectively covers the whole area of interest (for example, the whole ground floor of the premises) we need to provide a sufficient number of suitable located Wi-Fi stations (STAs) as WFS illuminators so that Wi-Fi signals received at the central unit AP 122 traverse the whole area of interest. Because Wi-Fi transceivers are quite power hungry, we will generally want the STAs used as WFS illuminators to be mains powered (but preferably also with some back-up power supply such as an internal battery power source) rather than solely battery powered. That may lead us to replace some battery powered but Wi-Fi capable devices with mains powered equivalents - so, for example, a battery powered (video) camera such as 140 might be replaced by a mains powered equivalent 340, and battery powered disarm node 134 may be replaced by a mains powered equivalent 334 that is Wi-Fi capable (although the control unit may still use something other than Wi-Fi to communicate with the central unit).
  • Alternatively (or additionally) we may simply add new mains powered Wi-Fi capable devices such as smart plugs, smart bulbs, Wi-Fi range extenders (for example of the type that simply plug in to a socket of the mains electricity supply), to provide a Wi-Fi network that covers the whole of the area of interest.
  • The central unit AP 122 preferably works in infrastructure mode in conjunction with the various other Wi-Fi stations (STAs) to form either an infrastructure Basic Service Set (BSS) or, in conjunction with another AP connected to the same Local Area Network as the central unit 122 - such as broadband router 300, to provide an Extended Service Set (ESS).
  • For ease of explanation, we will assume initially that the central unit AP 122 provides just a BSS and not an ESS, and that only the central unit AP 122 serves as a Wi-Fi sensing receiver. Some or all of the STAs in the BSS act as illuminators to provide signals which the CU 122 analyses in order to perform WFS. As shown, these other STAs include the broadband router 300, a printer 302, and a desktop computer 304, in the office, a smart TV 306 in the living room, a smart plug 308 in the play room, Wi-Fi range extenders 310 in various rooms, the control unit 130 and a Wi-Fi-enabled camera 340 in the hall, and optionally the disarm node 334 in the kitchen. Preferably, because of the power consumption concerns, both the Wi-Fi enabled camera and the disarm node 334 are fed with power from a mains electricity supply as well as having an autonomous internal power supply. In addition, the kitchen is provided with an STA in the form of for example a "smart speaker" 312. If the disarm node 334 only has an internal power supply, and is not mains fed, it may not be configured as a Wi-Fi STA but instead some other Wi-Fi STA device may be installed to suitably extend WFS coverage within the kitchen and the living room - for example, a Wi-Fi range extender or smart plug or the like which is plugged into a conveniently located power socket.
  • It will be appreciated that by combing a radio-based location sensing arrangement with a security monitoring system that includes multiple cameras it is possible to use the location sensing arrangement as a guide as to which camera is likely to be best located to capture an intruder. And we can even use this information predictively, so that for example the monitoring station may instruct the central unit 122 to turn on a camera, and stream its video, based on a prediction that the intruder will come into view on that camera in the near future. In this way, a camera may be turned on and supplying video before its motion sensor (internal or external) has been triggered.
  • Thus the problem is solved by providing a premises security monitoring installation having a plurality of alarm event sensors and a plurality of video cameras, a location sensing arrangement to detect human presence and location within the premises and comprising a radio-based system that is configured to sense presence and location based on detecting perturbations of radio signals, a local management device, to report alarm events to a remote monitoring station, the local management device being configured to notify the remote monitoring station on receiving notification of an alarm event and to supply to the remote monitoring station location data from the location sensing arrangement, receive from the remote monitoring station a request for image data from an identified one of the plurality of video cameras selected based on the supplied location data; and supply the requested image data to the remote monitoring station.
  • The notification of the alarm event preferably includes an identifier for each video camera for which image data are already available. In this way, the remote monitoring centre, generally a human operative of the centre, is able to select between different video sources (if multiple cameras have been triggered) and optionally to compare the presence data built up since the start of the event with the identities of the cameras for which video is available. Preferably the remote monitoring centre has a map of the premises (which is used by the human operators of the centre) in respect of which an alarm event has been created, the map showing the location and identifiers for the cameras and other sensors of the system.
  • The request received by the central unit from the remote monitoring station may be for which image data have not already been captured as part of the alarm event, for example based on a prediction of where the intruder will be next. But the remote monitoring centre may see that the available location data shows that the intruder may already be in the vicinity of a camera that has not yet been triggered, and hence instruct the central unit to activate the relevant camera and supply images from it. In this and other situations, video may be streamed, or short sequences may be sent.
  • In security monitoring installation according to embodiments of the invention the radio-based system is preferably configured to process communication signals received from one or more radio transmitters operating according to one or more communication standards or protocols, as distinct for example from merely processing RF carrier waves or other unmodulated signals. It will be appreciated that the ubiquity of sources of communication signals in the domestic (and commercial) environment mean that by using such sources the cost of deployment, and the time involved in deploying, a radio-based presence and location system are much reduced. Moreover, communication signals according to communication standards or protocols typically have structures and features that can readily be exploited in the provision of radio-based presence and location systems. The one or more radio transmitters may be in a common wireless network with the local management device, as this facilitates integration of the radio-based presence and location system into the security monitoring system - which is likely to reduce both the cost and the installation time required to deploy such a security monitoring system.
  • The local management device of security monitoring installations according to embodiments of the invention preferably includes a radio receiver of the radio-based presence and location sensing system, rather than for example receiving presence and location data or signals from another device which is part of the radio-based presence and location sensing system. This helps to reduce complexity and hence also reduce both cost and speed of deployment. Importantly, in the cases that the radio-based system is configured to process communication signals according to one or more communication standards or protocols, it also enables the local management device to benefit directly from recovery protocols and mechanisms integrated into the relevant communication standards or protocols.
  • Preferably, the local management device includes a processor and a memory holding software instructions that when run on the processor cause the local management device to process radio signals to derive location and presence data. This helps to reduce complexity and hence also reduce both cost and speed of deployment.
  • Optionally, in security monitoring installations according to embodiments of the invention the sensing arrangement to detect human presence uses changes in channel state information or received signal strength in determining presence.
  • Optionally, in security monitoring installations according to embodiments of the invention the local management device functions as an access point of a radio network, such as a Wi-Fi network, whose signals are used by the radio-based presence and location sensing system. This may have the benefits of reducing installation complexity and enabling quicker setup. In such security monitoring installations, the radio network for which the local management device functions as an access point may include at least one further access point. For example in a Wi-Fi deployment the Wi-Fi network may be based on an Extended Service Set model, with two or more interconnected APs.
  • Optionally, in security monitoring installations according to embodiments of the invention the one or more radio transmitters may include one or more of the following: a Wi-Fi access point, a Wi-Fi extender, a smart plug or smart socket, a smart speaker, a smart bulb, a control panel of the security monitoring system, a Wi-Fi-enabled video camera.
  • In an embodiment there is provided a control unit for a security monitoring system for premises, the system including a plurality of cameras, and the control unit comprising a processor, a memory communicatively coupled to the processor and a set of instructions stored in the memory which when executed by the processor cause the control unit to:
    perform location sensing to detect human presence and location within the premises based on detecting perturbations of radio signals; notify a remote monitoring station on receiving notification of an alarm event and to supply to the remote monitoring station location data derived from detected perturbations of radio signals; receive from the remote monitoring station a request for image data from an identified one of the plurality of cameras selected based on the supplied location data; and supply the requested image data to the remote monitoring station. The control unit may further comprise a radio transceiver communicatively coupled to the processor, the processor being configured to perform location sensing by detecting perturbations in radio signals received by the transceiver.
  • In a further embodiment there is provided a local management device for a premises security monitoring installation, the management device configured to be coupled to:
    • a plurality of cameras of the installation; a plurality of alarm event sensors;
    • and to a remote monitoring station for the reporting of alarm events; and further configured to: perform location sensing to detect human presence and location within the premises based on detecting perturbations of radio signals; notify the remote monitoring station on receiving notification of an alarm event and to supply to the remote monitoring station location data derived from detected perturbations of radio signals; receive from the remote monitoring station a request for image data from an identified one of the plurality of cameras selected based on the supplied location data; and supply the requested image data to the remote monitoring station.
  • Preferably the local management device is configured to perform location sensing by processing communication signals received from one or more radio transmitters operating according to one or more communication standards or protocols. In an alternative, something else such as Wi-Fi extender, or another AP, may perform the location and presence sensing and provide the results to a local management device or central unit.
  • Preferably the local management device further comprises a radio transceiver that the local management device uses as a radio receiver of a radio-based presence and location sensing system. The local management device may be a controller of a security monitoring system in which the video cameras and other sensors are coupled to the device using wires rather than wirelessly. But, in general, the local management device will include one or more transceivers for wireless exchange of control and housekeeping signals with the video cameras and other nodes and sensors of the system, but these will typically support the use of low bandwidth transmissions that can be supported by low power, low bandwidth transceivers in the nodes and sensors of the system - permitting the use of internal battery power supplies in the nodes and sensors, while still achieving reasonable battery life. The local management device may include a further transceiver, such as a Wi-Fi transceiver, that is used as a radio receiver of the radio-based presence and location sensing system - and optionally also for the transfer of video data from video cameras of the security monitoring system.
  • Preferably, the local management device further comprises a processor and a memory holding software instructions, the software instructions when run on the processor causing the local management device to process radio signals to derive location and presence data.
  • Preferably, the local management device is configured to detect human presence and location using changes in channel state information or received signal strength.
  • In an embodiment there is provided a method performed by a local management device of a premises security monitoring installation, the installation including a plurality of cameras, a location sensing arrangement to detect human presence and location within the premises and comprising a radio-based system that is configured to sense presence and location based on detecting perturbations of radio signals, the method comprising:
    • receiving notification of an alarm event; notifying a remote monitoring station of the alarm event; supplying the remote monitoring station with location data from the location sensing arrangement; receiving from the remote monitoring station a request for image data from an identified one of the plurality of cameras selected based on the supplied location data; and
    • supplying the requested image data to the remote monitoring station.
  • Preferably the method further comprises determining a location of human presence within the premises before the step of supplying the remote monitoring station with location data from the location sensing arrangement.
  • In the method the notification of the alarm event preferably includes an identifier for each video camera for which image data are already available. Optionally, the request is for image data from one of the cameras for which image data have not already been captured as part of the alarm event.
  • Figure 4 is a schematic drawing showing in more detail features of the gateway or central unit 122 of Figures 1. The gateway 122 includes a first transceiver 430 coupled to the first antenna 480, and optionally a second transceiver 432 coupled to a second antenna 482. The transceivers 430 and 432 can each both transmit and receive, but a transceiver cannot both transmit and receive at the same time. Thus, the transceivers 430, 432 each operate in half duplex. Preferably a transceiver will use the same frequency to transmit and receive (although of course if the two transceivers are to operate simultaneously but in opposite modes, they will operate on different frequencies). The transceivers 430, 432 may be arranged such that one transceiver 430 uses a first frequency for transmit and receive and the second transceiver 432 uses the same first frequency for transmit and receive, i.e. the transceivers are arranged to operate in a diversity-like arrangement. Alternative, the second transceiver may, depending on configuration, be arranged to use a second frequency for transmit and/or receive. The transceivers 430 and 432 are coupled to a controller 450 by a bus. The controller 450 is also connected to a network interface 460 by means of which the controller 450 may be provided with a wired connection to the Internet and hence to the monitoring centre 200. The controller 450 is also coupled to a memory 470 which may store data received from the various nodes of the installation for example event data, sounds, images and video data. The central unit 122 also includes a crystal oscillator 451, which is preferably a temperature controlled or oven-controlled crystal oscillator. This is used for system clocking and also frequency control of the transceivers. The gateway 122includes a power supply 362 which is coupled to a domestic mains supply, from which the gateway 122 generally derives power, and a backup battery pack 464 which provides power to the gateway in the event of failure of the mains power supply. Preferably, as shown, the central unit 122 also includes a Wi-Fi transceiver 440, and associated antenna arrangement 442, which may be used for communication with any of the nodes that is Wi-Fi enabled. The Wi-Fi enabled node may be a remote control or control panel that may for example be located close to the main entrance to the building (e.g., control panel 128 or disarm node 130) to enable the occupier to arm or disarm the system from near the main entrance, or it may for example be an image-capture device such as a video camera (e.g. camera 126). Similarly, an interface enabling bidirectional communication over a Public Land Mobile Network (PLMN), such as GSM or L TE, may optionally be provided. Optionally, a third antenna 484 and associated ISM transceiver 434 may be provided, for example for communication with the monitoring centre 200 over, for example, the European 863MHz to 870MHz frequency band. Optionally, the third transceiver 434 may be a Sigfox transceiver configured to use the Sigfox network to contact the central monitoring station especially in the event that jamming of other radio channels is detected.
  • The first 430 and second 432 transceivers may both be tuneable ISM devices, operating for example in the European 863MHz to 870MHz frequency band or in the 915MHz band (which may span 902-928MHz or 915-928MHZ depending upon the country). In particular, both of these devices may be tuned, i.e. may be tuneable, to the frequencies within the regulatorily agreed sub-bands within this defined frequency band. Alternatively, the first transceiver and the second transceiver, if present, may have different tuning ranges and optionally there is some overlap between these ranges.
  • The controller 450 is configured to run a sensing application using a WFS software agent 800, which may be stored in memory 470. The WFS software agent 400 uses WFS radio APIs in the Wi-Fi transceiver 440 to interact with the Wi-Fi radio, the APIs enabling extraction of desired channel environment measurement information and provides the ability to assert any related controls to configure WFS features. This behaviour will be described in more detail shortly. The sensing application on the CU will report a presence state change when the appropriate thresholds are triggered, along with the address of the device whose received data triggered the algorithm. The WFS agent provides a monitoring system which enables the security monitoring system to detect presence and movement in a monitored space, without the necessity to use line of sight motion detectors.
  • As an alternative to incorporating the radio sensing application into the central unit, this functionality can be provided on an access point, e.g. a Wi-Fi access point, AP such as router 300, of the premises, with the AP configured to report the result of presence detection to the central unit 122. In another example, a Wi-Fi range extender could instead be used as sensing master for its connected nodes, but would be configured to report to the central unit 122 which would be the overall master in terms of reporting the "alarm".
  • A brief explanation will now be given of how WFS works, and how WFS can be integrated into a security monitoring system, and in particular how WFS can be integrated into a central unit of a security monitoring system.
  • Wi-Fi Sensing can be performed with any Wi-Fi device and can be used on any available communication path. Each communication path between two devices gives the chance to extract information about the surrounding environment. Wi-Fi sensing is based on an ability to estimate the wireless channel and hence the surrounding environment. Because Wi-Fi networks comprise many devices spread throughout a geographical area, they are well suited to exploiting these devices' transmissions in effect to provide a radar system. Depending on the number of devices, the radar system may be monostatic, bistatic, or multistatic. In monostatic WFS, a single device measures its own transmitted Wi-Fi signals. In bistatic WFS, the receiver and transmitter are two different devices (for instance, an AP and a STA in infrastructure mode). In multistatic WFS, the received signals from multiple Wi-Fi transmitters are used to learn about a shared environment.
  • At least one Wi-Fi transmitter and one Wi-Fi receiver are required to perform WFS measurements, and these can be located in the same device (to create a kind of monostatic radar) or in different devices. The measurement is always performed by a Wi-Fi Sensing-enabled receiver on the Wi-Fi signal transmitted by a transmitter, and which may or may not originate from a Wi-Fi sensing-capable device. The device that transmits the signal that is used for measurements is called the "illuminator," as its transmissions enable collection of information about the channel - that is, it illuminates the channel.
  • Different modes of Wi-Fi Sensing measurements are recognised - Passive, Triggered, Invoked, and Pushed, and these depend upon what triggers the illuminator device to transmit a Wi-Fi signal. Preferably the agent improves the usefulness of the standard beacon interval by using optimised timings.
  • In passive mode, WFS relies on transmissions that are part of regular Wi-Fi communication. The Wi-Fi Sensing receiver(s) rely only on transmissions between itself and the illuminator device(s). Passive transmissions do not introduce overhead, but the Wi-Fi sensing device lacks control over the rate of transmissions, transmission characteristics (bandwidth, number of antennas, use of beamforming), or environmental measurements.
  • Triggered measurement happen when a Wi-Fi Sensing device is triggered to transmit a Wi-Fi packet for the purpose of WFS measurements, either in response to a received Wi-Fi packet or by the higher layers (for instance, in WFS software).
  • Invoked measurement involves utilizing a packet transmission that is in response to a packet received from the Wi-Fi Sensing receiver device.
  • In pushed mode, a transmission is initiated by the illuminator device for measurement. A pushed transmission can be either a unicast or a multicast/broadcast message. Multicast/broadcast messages can be used for measurements by multiple WFS receivers simultaneously if the devices are not in power-save mode.
  • Triggered transmissions introduce overhead because additional over-the-air transmissions are required. Pushed transmissions introduce less overhead compared to invoked transmissions, because the exchange is unidirectional rather than bidirectional. Triggered transmissions allow for a system to control both the rate and occurrence of measurements.
  • A WFS network is made up of one or more WFS illuminators and one or more WFS receivers. A WFS system is made up of three main components and that are present in Wi-Fi Sensing illuminators and receivers:
    • first is the Wi-Fi radio, which encompasses the radio technology specified in IEEE 802.11 standards, the interfaces and the APIs connecting the radio to the higher layers;
    • second is the Wi-Fi Sensing software agent, consisting of a signal processing algorithm and interfaces, the agent interacting with the Wi-Fi environment, and turning radio measurement data into motion or context-aware information; and
    • thirdly, an application layer operates on the Wi-Fi sensing output and forms the services or features which are ultimately presented to an end user - such as a security monitoring service provided by a security monitoring system that detects presence using WFS.
  • A WFS system can be built based on existing Wi-Fi standards, hardware, software and infrastructure.
  • The fundamental component required to enable Wi-Fi sensing on the radio is the interface to enable control and extraction of periodic channel or environmental measurement data. Regardless of device type, operating band or Wi-Fi generation, the core APIs to enable Wi-Fi sensing are similar, as the required data and control are common.
  • The WFS software Agent can reside on any Wi-Fi device; for example, in the infrastructure mode, the agent may reside on the AP, in which case channel measurements from all the STAs associated with the AP can be collected. The software agent may also be located on a STA. But in the security management system applications this would mean that the STA would either need to be the controller of the security management system (e.g. the CU), or would have to be reporting to the controller of the security management system (e.g. the CU). Generally, we therefore prefer to run the software agent on the CU, and given that the CU is conveniently also an access point, it makes sense for us to run the software agent on the CU acting as AP rather than merely as an STA.
  • The WFS software Agent uses the WFS radio APIs to interact with the Wi-Fi radio, the APIs enabling extraction of desired channel environment measurement information, and providing the ability to assert any related controls to configure WFS features.
  • The WFS Agent has two main subsystems: Configuration and Control; and a Sensing Algorithm. The Configuration and Control subsystem interact with the radio, using a standard set of APIs. The Configuration and Control subsystem performs tasks including sensing capability identification, pushed illumination coordination, and radio measurement configuration. The sensing algorithm subsystem includes intelligence needed to extract the desired features from the radio measurement data and may differ according to the desired sensing application.
  • The WFS software Agent is needed on any sensing receiver, but is merely optional on an illuminator - only being required if the illuminator also acts as a receiver. If included on an illuminator, only the configuration and control subsystem is needed. By having the agent on the illuminator, additional enhancements are enabled, including sensing capability identification and co-ordinated pushed illumination. If the illuminator is not running an agent, it is still technically able to participate in the sensing network, but only the most basic features that currently exist in Wi-Fi standards will be supported.
  • The WFS software Agent processes and analyses the channel measurement information and makes sensing decisions, such as detecting motion. This information is then shared with the application layer via the Wi-Fi Sensing agent I/O interface. As well as interfacing with the radio and the application layer, the Wi-Fi Sensing agent also interfaces with the existing Wi-Fi services on the system. This interface is necessary for the agent to provide feedback for sensing optimizations that can be used in radio resource management decisions, such as band steering or AP selection requests.
  • The application layer of a WFS system creates the sensing service and in effect presents the information to the end user (in our case to the security management system).
  • The application layer can potentially reside on any networked device: in some embodiments of the present invention it will reside in the central unit 122 along with the WFS agent, but in other embodiments the application layer may exist in an external server or even in the central monitoring station. We prefer, however, to provide the application layer on the central unit to avoid potential problems with signalling delays (for example due to accidental or deliberate network interruption) between the central unit (or other WFS receiver) and a remotely located entity. The application layer receives input from one or multiple Wi-Fi sensing software agents. It combines the information and delivers it to the security management system which may then in turn provide it to the CMS and/or to a cloud service by means of which push notifications may be sent to a registered user device such as a smartphone - allowing users to receive real-time notifications and the ability to view historic data.
  • A typical Wi-Fi home network follows one of two common deployment scenarios. The first consists of a single AP that serves as the internet gateway for all the devices in the house. The second consists of multiple APs forming an ESS and extending coverage throughout the home. Depending on the use case, the Wi-Fi Sensing receiver may be the AP and/or other devices in the network. Not all the devices in a home deployment need to be Wi-Fi Sensing capable.
  • Wi-Fi Sensing can be deployed in all types of Wi-Fi networks and topologies, operating in different frequency bands (2.4, 5, 6, and 60 GHz) and different bandwidths. The sensing resolution and performance depends on the use case requirements. In general, it is enhanced with the increase in the number of participating devices and higher bandwidths. Applications that require lower resolutions and longer range, such as home monitoring, can be deployed using Wi-Fi networks operating in 2.4GHz and 5GHz. Applications that require higher resolutions and lower range, such as gesture recognition, require 60GHz Wi-Fi networks.
  • In multi-AP and/or multi-band deployments, there may be an advantage to having a Wi-Fi sensing device connected to a specific AP or operating in a specific frequency band. Radio resource management (RRM) events, such as AP and/or band steering, should be conducted in coordination with the Wi-Fi Sensing agent/operation.
  • The devices involved with Wi-Fi Sensing will depend upon the deployment environment and the specific use case. The sensing measurements also need to be processed by the device with enough computation power. The coordination of sensing, including participating devices, is a role particularly suited to an AP. Typically the central unit of a security monitoring system will have ample processing power, as well as being able to function as an AP, to handle this task efficiently and speedily.
  • The nature of Wi-Fi networks is such that it should be possible able to add additional Wi-Fi sensing capable devices to the network to enhance accuracy, coverage and/or localization. These additional devices do not necessarily need to be Wi-Fi Sensing capable or dedicated Wi-Fi sensing devices to participate; however, optionally they may also identify their Wi-Fi sensing capabilities and supported features to the AP. Internet of Things (IoT) devices for home deployment can typically also be used as part of a WFS installation supporting a WFS-enabled security monitoring system: example include Wi-Fi controllable plugs and sockets, light bulbs, thermostats, smart speakers, and video door bells. However, even when a device connects to the AP and reports that it is Wi-Fi sensing capable, the Wi-Fi Sensing agent may elect not to make use of that device.
  • WFS for a security monitoring system may be run over a dedicated Wi-Fi network, the premises having at least one other Wi-Fi network for other purposes. But for reasons of simplicity and economy it may often be preferred to operate a single Wi-Fi network to serve all a household's (or small business's) needs including WFS for a security monitoring service. If a single-network solution is adopted, performance degradation due to airtime usage and sensing overhead must be minimized and hence Wi-Fi transactions required for conducting sensing measurements and sensing management and processing must be optimized for efficiency.
  • For each Wi-Fi Sensing application, at least one network device executes the sensing software, or Wi-Fi Sensing Agent. The Wi-Fi Sensing agent is typically placed on the AP, but it can be placed on any STA (although, as previously mentioned, we prefer to run the Wi-Fi Sensing agent on the AP). Following authentication and association of a device with the Wi-Fi network, the Wi-Fi Sensing agent should discover the device and its sensing capabilities. Depending on the capabilities of the device, its role in the Wi-Fi sensing network would be determined. If the new device is another Wi-Fi Sensing-capable AP, then coordination among the agents is required.
  • The WFS agent needs to have a mechanism to determine which devices are capable and needs to participate in the sensing for each application on a device-specific basis.
  • A WFS agent also needs to be capable of configuring the radio for measurements and triggering transmissions on a periodic basis for sensing measurements, and to enable/disable measurements or adjust configuration parameters for Wi-Fi sensing-capable devices. Optionally, the Wi-Fi Sensing agent is also able to request specific radio resource management operations, such as AP or band steering. The WFS agent is also preferably able to detect and process specific sensing events and communicate the relevant information to the application layer (e.g., the security monitoring system) for specific handling and user presentation.
  • One of the parameters that impacts the quality of the received signal in a wireless network is the amount of interference present. Interference can be caused by other Wi-Fi devices operating in the same band, which causes cochannel interference, or in an adjacent channel, which causes adjacent channel interference. It can also be caused by non-W-Fi devices, which can be other communication systems or unintentional transmissions that create electromagnetic noise in the band. Interference can impact Wi-Fi Sensing performance in two ways. Firstly, it may interfere with the sensing transmissions and thereby reduce the number of measurements made in a given time interval. As such, it introduces jitter in time instants during which the measurements are made. Secondly channel-state measurements may capture the impact of transient interference, such as for a non-Wi-Fi device, as opposed to motion in the environment.
  • Wireless systems deploy various techniques to avoid or reduce the impact of interference, and these techniques also help to improve WFS performance. These techniques aim at maximizing the reuse of spectrum, while minimizing the overlap of spectrum used by nearby networks: for example, Dynamic Channel Allocation (DCA); Auto Channel Selection (ACS); optimized RF planning; (e.g., non-overlapping channels and use of reduced channel width when applicable), and power control.
  • As already mentioned, increasing the number of illuminators may result in a higher sensing performance: with more transmitters that are located sufficiently apart from one another, motion in a larger area can be detected; when motion is detected using transmissions on one or more transmitters, information is provided that can be used to determine localization of the motion; and sensing accuracy is improved with a higher number of measurements taken across a larger number of transmitters in most scenarios.
  • The IEEE 802.11a preamble is useful for Wi-Fi Sensing. The preamble contains a short training field (STF), a guard interval and a long training field (LTF). The STF is used for signal detection, automatic gain control (AGC), coarse frequency adjustment and timing synchronization. The LTF is used for fine frequency adjustment and channel estimation. Since only 52 subcarriers are present, the channel estimation will consist of 52 frequency points. Newer OFDM PHY versions (HT/VHT/HE) maintain the IEEE 802.11a preamble for backward compatibility and refer to it as the legacy preamble. The legacy preamble spans a 20MHz bandwidth and consists of a legacy STF (L-STF) and legacy LTF (L-LTF). As more recently defined OFDM PHY versions (HT/VHT/HE) introduce wider channel bandwidths (up to 160MHz) for backward compatibility, the legacy preamble is duplicated on each 20MHz channel. This allows the receiver to compute 52, 104, 208 or 416 valid L-LTF frequency points, which represent the channel estimation between the two devices.
  • Also potentially useful for Wi-Fi Sensing are the MIMO training fields present in HT, VHT and HE LTFs. The MIMO fields are modulated using the full bandwidth (20MHz to 160MHz) and are traditionally used by the receiver to estimate the mapping between the constellation outputs and the receive chains. Since these fields span the full bandwidth, they provide more frequency points. For example, a 20MHz L-LTF contains 52 subcarriers, while a 20MHz HT/VHT-LTF contains 56 subcarriers. The latest introduction of the HE PHY has the potential to enhance Wi-Fi Sensing. In addition to enabling operation in the 6GHz spectrum, the HE PHY has increased the number of subcarriers per 20MHz bandwidth by 4x, which effectively allows for better object resolution.
  • The IEEE 802.11ad amendment defines a Directional-Multi-Gigabit (DMG) PHY for operation in the 60GHz band. While there are three different modulation schemes (Control, Single-Carrier and OFDM) defined, Control and the Single Carrier PHY are the primary PHY used in 802.11ad (and is also part of the subsequent 802.11ay amendment). Regardless of the modulation scheme, every packet starts with a preamble that consists of a short training field (STF) and a channel estimation field (CEF). The STF is used for timing estimation and AGC adjustment. CEF is used for channel estimation. Similar to the OFDM-based PHYs, the necessary channel estimation for Wi-Fi Sensing is available following successful reception and processing of the preamble of a packet and can be provided to the higher layers. The wide channel bandwidth available in 802.11ad/ay can significantly improve the performance of Wi-Fi Sensing in terms of the resolution; however, the limited communication range in 60GHz band restricts the sensing range and coverage. As such, in many situations the central unit of a security monitoring system may relay instead on frequency bands with longer range, sufficient to cover the majority of households. However, for smaller-scale installations the use of the 60GHz band may be attractive and therefore embodiments of the invention may use this band for WFS.
  • When it comes to identifying peer devices in a WFS installation, the MAC layer mechanisms may be used to obtain information about the connected devices and the roles they play in Wi-Fi sensing. The MAC layer also initiates and drives transmissions required for channel estimation among the devices in the Wi-Fi Sensing network.
  • Various aspects of peer identification arise with Wi-Fi Sensing. The first is identifying the devices and the channel estimation mapped to the physical environment between any two devices. Typically, an STA is identified by a 48-bit MAC address. A MAC address is sufficient identification for STAs associated with a Wi-Fi network; however, if the association is lost during the lifetime of the application, then randomized MAC addresses may be used. In this case, a different or more involved mechanism would be required to identify each STA. This identification must match the corresponding channel estimate measurement obtained from the PHY. The second is identifying the device network role and its connection type, such as whether it is an AP or an STA, or whether it is part of a mesh or a P2P connection. This information is used by the Wi-Fi Sensing agent to decide the best method for conducting measurements.
  • The third aspect is the identification of WFS device capabilities, such as sensing capabilities, supported measurement rate, and the availability and willingness of the device to participate in sensing measurements. This information is required from all devices in the network for the Wi-Fi Sensing agent to select devices participating in the sensing measurements.
  • As already noted, there are different types of transmissions that can be used for illumination of the Wi-Fi channel and obtaining measurements between two devices. Passive transmissions rely on existing Wi-Fi traffic and do not introduce any new MAC layer requirements. Triggered transmissions, however, rely on additional transmissions. Depending on whether existing packet exchange procedures are used for triggered transmissions or new exchanges are defined, the requirements on the MAC layer will be different. An example of one existing packet exchange that can be used for triggering invoked transmissions is null data packet (NDP) and ACK exchange. NDP transmission by the Wi-Fi Sensing receiver can be used to invoke a Wi-Fi Sensing transmitter to respond with an ACK, which may then be used to compute a channel estimation. The disadvantage of using ACK packets for channel estimation, in 2.4/5GHz bands, is that the ACKs are only transmitted in legacy mode. Another example of how an invoked measurement can be triggered is by use of the implicit unidirectional beamforming procedure, first defined in the IEEE 802.1 In standard. In this procedure, an STA requests beamforming training by sending a MAC frame with the training request (TRQ) bit set to 1. This triggers the receiving device to send an NDP announcement, followed by an NDP to illuminate the channel. The benefit of this invoked measurement is that it is not limited to the legacy preamble for channel measurements and uses the MIMO training fields, as well.
  • In pushed measurements, a transmission is triggered by the illuminator to be received by one or multiple Wi-Fi Sensing receivers. Beacon frames are an example of using existing MAC packet exchanges for pushed measurements.
  • Also as already noted, to support different use cases, either the AP or STA may take the role of sensing receiver; additionally, there may be multiple sensing receivers required to support the application. Moreover, there may be multiple illuminators involved in the measurements. MAC layer coordination is used to coordinate the sensing transmissions among the illuminators and the sensing receivers in an efficient way. MAC layer scheduling may also be used to enable periodic measurements on which some use cases rely. Coordination and scheduling at the MAC layer should enable different options for conducting sensing measurements among multiple illuminators and sensing receivers, with minimal added overhead, while accounting for the power save state of the devices.
  • To interact with the MAC and PHY, the WFS agent has an interface to pass the WFS control information to the radio and extract the measurement data. The interface should be PHY agnostic and is, therefore, defined in a generic manner and extendable to cover different radio driver implementations, including drivers from different chipset vendors. The interface definition should allow for potential additional features or capabilities provided by a specific PHY or a chipset, as well as a path for growing the technology. Definition of a standard interface/API enables radio firmware and driver developers to ensure compliance and enables reuse of components or common codes, which may be placed into a library. Most Wi-Fi drivers are based on either the wireless-extensions framework or the more recent and actively developed cfg80211 / nl80211 framework. As the system integration components are largely provided, these frameworks enable Wi-Fi driver developers to focus on the hardware aspects of the driver. These frameworks also offer significant potential as a location for defining a WFS API. The WFS interface should provide the WFS agent with STA identification and enable the WFS agent to track the physical device in the network (i.e., the AP to which it is connected), as well as the device's capability and availability to participate in the measurements.
  • The WFS agent requires control of the STAs that will participate in the sensing measurements, as well as what measurement type (passive vs triggered) will be performed. The WFS interface should provide such control, either on a global system scale or on a per STA basis so that the WFS agent can conduct WFS measurements in the most efficient manner.
  • Based on the specific WFS application or use case, different measurement rates may be required. The measurement rate is typically decided by the WFS agent, and the interface should support its control. However, to provide the lowest jitter and best efficiency possible, it is best to rely on the MAC layer for scheduling. WFS applications may have different measurement parameter requirements (bandwidth, antenna configuration, etc.). The configuration of measurement parameters allows the application to obtain only the data it requires to maintain efficiency. The measurement parameters should be configurable independently for each STA.
  • The WFS interface should be flexible enough for the radio to specify whether the data payload is in time-domain or frequency-domain, the numerical format, etc. By having this knowledge, the Wi-Fi Sensing agent can correctly interpret the data.
  • While security monitoring systems are normally developed to protect premises, such as houses or apartments, some installations include one or more cameras, typically video cameras, arranged to monitor external spaces such as terraces, gardens and forecourts. Typically, in such installations the (video) camera is associated with one or more movement sensors, the camera and the movement sensor(s) being arranged to cover a common surveillance area. When the system is armed, movement within the monitored surveillance area triggers the movement sensor, turning on the camera and alerting the central unit which in turn may signal an alarm condition to a central monitoring station. It will be appreciated that embodiments of the invention are also directly applicable to such system and installations.

Claims (23)

  1. A premises security monitoring installation having a plurality of alarm event sensors and a plurality of video cameras, a location sensing arrangement to detect human presence and location within the premises and comprising a radio-based system that is configured to sense presence and location based on detecting perturbations of radio signals, a local management device, to report alarm events to a remote monitoring station, the local management device being configured to:
    notify the remote monitoring station on receiving notification of an alarm event and to supply to the remote monitoring station location data from the location sensing arrangement;
    receive from the remote monitoring station a request for image data from an identified one of the plurality of video cameras selected based on the supplied location data;
    and supply the requested image data to the remote monitoring station.
  2. The security monitoring installation of claim 1, wherein the notification of the alarm event includes an identifier for each video camera for which image data are already available.
  3. The security monitoring installation of claim 1 or claim 2, wherein the request is for image data from one of the cameras for which image data have not already been captured as part of the alarm event.
  4. The security monitoring installation of any one of the preceding claims, wherein the radio-based system is configured to process communication signals received from one or more radio transmitters operating according to one or more communication standards or protocols.
  5. The security monitoring system as claimed in claim 4, wherein the one or more radio transmitters that are in a common wireless network with the local management device.
  6. The security monitoring installation as claimed in any one of the preceding claims, wherein the local management device includes a radio receiver of the radio-based presence and location sensing system.
  7. The security monitoring installation as claimed in claim 6, wherein the local management device includes a processor and a memory holding software instructions that when run on the processor cause the local management device to process radio signals to derive location and presence data.
  8. The security monitoring installation as claimed in any one of the preceding claims, wherein the sensing arrangement to detect human presence uses changes in channel state information or received signal strength in determining presence.
  9. The security monitoring installation as claimed in any one of the preceding claims, wherein the local management device functions as an access point of a radio network whose signals are used by the radio-based presence and location sensing system.
  10. The security monitoring installation of claim 9, wherein the radio network for which the local management device functions as an access point includes at least one further access point.
  11. The security monitoring installation of claim 9 or claim 10, wherein the radio network is a Wi-Fi network.
  12. The security monitoring installation of claim 11 as dependent on claim 4, wherein the one or more radio transmitters include one or more of the following: a Wi-Fi access point, a Wi-Fi extender, a smart plug or smart socket, a smart speaker, a smart bulb, a control panel of the security monitoring system, a Wi-Fi-enabled video camera.
  13. A control unit for a security monitoring system for premises, the system including a plurality of cameras, and the control unit comprising a processor, a memory communicatively coupled to the processor and a set of instructions stored in the memory which when executed by the processor cause the control unit to:
    perform location sensing to detect human presence and location within the premises based on detecting perturbations of radio signals;
    notify a remote monitoring station on receiving notification of an alarm event and to supply to the remote monitoring station location data derived from detected perturbations of radio signals;
    receive from the remote monitoring station a request for image data from an identified one of the plurality of cameras selected based on the supplied location data;
    and supply the requested image data to the remote monitoring station.
  14. A control unit as claimed in claim 13, further comprising a radio transceiver communicatively coupled to the processor, wherein the processor is configured to perform location sensing by detecting perturbations in radio signals received by the transceiver.
  15. A local management device for a premises security monitoring installation, the management device configured to be coupled to:
    a plurality of cameras of the installation;
    a plurality of alarm event sensors;
    and to a remote monitoring station, "CMS", for the reporting of alarm events;
    and further configured to:
    perform location sensing to detect human presence and location within the premises based on detecting perturbations of radio signals;
    notify the CMS on receiving notification of an alarm event and to supply to the CMS location data derived from detected perturbations of radio signals;
    receive from the CMS a request for image data from an identified one of the plurality of cameras selected based on the supplied location data;
    and supply the requested image data to the CMS.
  16. The local management device of claim 15, wherein the local management device is configured to perform location sensing by processing communication signals received from one or more radio transmitters operating according to one or more communication standards or protocols.
  17. The local management device as claimed in claim 15 or claim 16, further comprising a radio transceiver, the local management device being configured to use the transceiver as a radio receiver of a radio-based presence and location sensing system.
  18. The local management device as claimed in claim 17, further comprising a processor and a memory holding software instructions, the software instructions when run on the processor causing the local management device to process radio signals to derive location and presence data.
  19. The local management device as claimed in any one of claims 15 to 18, wherein the local management device is configured to detect human presence and location using changes in channel state information or received signal strength.
  20. A method performed by a local management device of a premises security monitoring installation, the installation including a plurality of cameras, a location sensing arrangement to detect human presence and location within the premises and comprising a radio-based system that is configured to sense presence and location based on detecting perturbations of radio signals, the method comprising:
    receiving notification of an alarm event;
    notifying a remote monitoring station, "CMS", of the alarm event;
    supplying the CMS with location data from the location sensing arrangement;
    receiving from the CMS a request for image data from an identified one of the plurality of cameras selected based on the supplied location data;
    and supplying the requested image data to the CMS.
  21. The method of claim 20, further comprising determining a location of human presence within the premises before the step of supplying the CMS with location data from the location sensing arrangement.
  22. The method of claim 20 or claim 21, wherein the notification of the alarm event includes an identifier for each video camera for which image data are already available.
  23. The method of any one of claims 20 to 22, wherein the request is for image data from one of the cameras for which image data have not already been captured as part of the alarm event.
EP21218143.2A 2021-12-29 2021-12-29 Security monitoring systems Pending EP4207119A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP21218143.2A EP4207119A1 (en) 2021-12-29 2021-12-29 Security monitoring systems
PCT/EP2022/087929 WO2023126425A1 (en) 2021-12-29 2022-12-28 Security monitoring systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP21218143.2A EP4207119A1 (en) 2021-12-29 2021-12-29 Security monitoring systems

Publications (1)

Publication Number Publication Date
EP4207119A1 true EP4207119A1 (en) 2023-07-05

Family

ID=79025098

Family Applications (1)

Application Number Title Priority Date Filing Date
EP21218143.2A Pending EP4207119A1 (en) 2021-12-29 2021-12-29 Security monitoring systems

Country Status (2)

Country Link
EP (1) EP4207119A1 (en)
WO (1) WO2023126425A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4831438A (en) * 1987-02-25 1989-05-16 Household Data Services Electronic surveillance system
US4992866A (en) * 1989-06-29 1991-02-12 Morgan Jack B Camera selection and positioning system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4831438A (en) * 1987-02-25 1989-05-16 Household Data Services Electronic surveillance system
US4992866A (en) * 1989-06-29 1991-02-12 Morgan Jack B Camera selection and positioning system and method

Also Published As

Publication number Publication date
WO2023126425A1 (en) 2023-07-06

Similar Documents

Publication Publication Date Title
CN113396558A (en) Time-varying distribution of RF-based presence detection and/or location and message reception
US11329842B2 (en) Dynamic superframe slotting
JP5962349B2 (en) Wireless communication system, wireless communication method, and wireless communication apparatus
US20230111141A1 (en) Apparatus for lighting control
WO2023126380A1 (en) Remotely monitored premises security monitoring systems
US11425199B2 (en) Home network using multiple wireless networking protocols
EP4207119A1 (en) Security monitoring systems
EP4207122A1 (en) Intruder localisation
EP4231263A1 (en) Premises security monitoring system
EP4207123A1 (en) Premises security monitoring system
EP4207117A1 (en) Sensor node for security monitoring systems
EP4207126A1 (en) Premises security monitoring system
EP4207120A1 (en) Security monitoring system
US11244547B1 (en) Smart monitoring system
IL293263A (en) A security monitoring system
EP4207124A1 (en) Security monitoring systems
EP4207127A1 (en) Distraction burglary detection
EP4231266A1 (en) Peripheral for premises security monitoring systems
US11582746B2 (en) Dynamic, multi-frequency superframe slotting
US20240106592A1 (en) Superframe extension mode
US11756531B1 (en) Techniques for audio detection at a control system
WO2023033731A1 (en) Sensing mesh network
EP3828849A1 (en) A security monitoring system
EP3828848A1 (en) A security monitoring system
IL293262A (en) A security monitoring system

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20231214

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR