EP4092643B1 - Sicherheitsüberwachungssystem - Google Patents

Sicherheitsüberwachungssystem Download PDF

Info

Publication number
EP4092643B1
EP4092643B1 EP21174825.6A EP21174825A EP4092643B1 EP 4092643 B1 EP4092643 B1 EP 4092643B1 EP 21174825 A EP21174825 A EP 21174825A EP 4092643 B1 EP4092643 B1 EP 4092643B1
Authority
EP
European Patent Office
Prior art keywords
token
video camera
response
system controller
security monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP21174825.6A
Other languages
English (en)
French (fr)
Other versions
EP4092643C0 (de
EP4092643A1 (de
Inventor
Christian Westergren
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Verisure SARL
Original Assignee
Verisure SARL
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to PL21174825.6T priority Critical patent/PL4092643T3/pl
Application filed by Verisure SARL filed Critical Verisure SARL
Priority to EP21174825.6A priority patent/EP4092643B1/de
Priority to ES21174825T priority patent/ES2969462T3/es
Priority to PCT/EP2022/063376 priority patent/WO2022243345A1/en
Priority to BR112022026271A priority patent/BR112022026271A2/pt
Priority to ARP220101335A priority patent/AR125918A1/es
Publication of EP4092643A1 publication Critical patent/EP4092643A1/de
Application granted granted Critical
Publication of EP4092643C0 publication Critical patent/EP4092643C0/de
Publication of EP4092643B1 publication Critical patent/EP4092643B1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19697Arrangements wherein non-video detectors generate an alarm themselves

Definitions

  • the present invention relates to a security monitoring system for monitoring premises, a video camera for use with such a system and methods of configuring and operating such a monitoring system.
  • Security monitoring systems for monitoring premises typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events.
  • Such systems include sensors to detect the opening and closing of doors and windows, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones.
  • Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected.
  • Such installations typically include a control unit (which may also be termed a central unit), generally mains powered, that is coupled to the sensors, detectors, cameras, etc.
  • nodes and which processes received notifications and determines a response.
  • the central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit.
  • the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered.
  • a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a Central Monitoring Station (CMS) where, typically, human operators manage the responses required by different alarm and notification types.
  • CMS Central Monitoring Station
  • the central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system and the nature of the detected events.
  • the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station.
  • the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered.
  • While security monitoring systems are normally developed to protect premises, such as houses or apartments, some installations include one or more cameras, typically video cameras, arranged to monitor external spaces such as terraces, gardens and forecourts.
  • the (video) camera is associated with one or more movement sensors, the camera and the movement sensor(s) being arranged to cover a common surveillance area.
  • movement within the monitored surveillance area triggers the movement sensor, turning on the camera and alerting the central unit which in turn may signal an alarm condition to a central monitoring station.
  • Embodiments of the invention provide potential solutions to the problems, in systems with external surveillance areas, of false alarms being triggered by authorised persons.
  • a security monitoring system including: a system controller; a video camera, coupled to a motion sensor, arranged to monitor a surveillance area; a portable token storing a token ID; the video camera being configured on receipt of a motion detection signal from the motion sensor to send an alert to the system controller; the system controller being configured in an armed state, on receipt of an alert from the video camera, to start an event timer and to send an instruction to the video camera to broadcast a token activation signal, the instruction including an event identifier;
  • the video camera and motion sensor may be arranged to survey a surveillance area and the video camera configured to broadcast the token activation signal as a radio signal having an effective range that does not extend significantly beyond the surveillance area.
  • the portable token includes a processor coupled to a token movement sensor, and the token is configured to respond to token activation signals only if the processor determines that the token is moving.
  • the portable token includes a wake on radio receiver, and the video camera is configured to broadcast token activation signals as wake on radio signals to which the token is responsive.
  • the portable token may be configured to include RSSI data in its response to the token activation signal from the video camera, and the system controller may be configured to use the RSSI data included in the token response in determining whether to trust the received response. Furthermore, the system controller may be configured to regard the token response as invalid if the RSSI data included in the token response suggest that the response has come from outside the usual range of radio signals from the camera.
  • radio frequency transceivers of the portable token, the video camera and the system controller are configured to operate in the industrial, scientific and medical, ISM, radio bands.
  • the video camera is configured, on instruction from the system controller to transmit video images captured by the video camera using Wi-Fi.
  • the system controller is optionally configured, in an armed state, to disarm the security monitoring system if both comparisons provide a match.
  • system controller may be configured in an armed state, if both comparisons provide a match, to disarm the security monitoring system only in respect of the monitoring of the surveillance area.
  • the video camera for use in a security monitoring system according to any variant of the first aspect, the video camera including an image sensor, a radio frequency transmitter, a radio frequency receiver, and a processor operatively connected to the image sensor, the radio frequency transmitter and the radio frequency receiver, the processor being configured, on receipt of a motion trigger signal from a motion sensor to: transmit, using the radio frequency transmitter, a flag signal to the system controller of the security monitoring system; in response to receiving, via the radio frequency receiver, an instruction from the controller to cause the radio frequency transmitter to transmit a token activation signal.
  • the token activation signal is a wake on radio signal.
  • the motion sensor is part of the video camera.
  • the video camera's radio frequency transmitter and radio frequency receiver are configured to operate within the industrial, scientific and medical, ISM, radio bands, such as the 868 MHz band.
  • a video camera according to the second aspect may further comprise an RF transmitter configured to transmit Wi-Fi signals, and the video camera's processor may be configured, on instruction from the controller of a security installation to activate the RF transmitter to transmit via Wi-Fi video images captured by the video camera.
  • a method of configuring a security monitoring system comprising: providing a system controller; a remote video camera coupled to a motion sensor; and a portable token storing a token ID;
  • a method of operating a security monitoring system including: a system controller;
  • FIG. 1 is an overview of a security monitoring system according to a first aspect of the invention.
  • the Figure shows a rough plan view of a domestic dwelling 110, which may be a building such as a house or a secured space, such as an apartment, in a building and which is protected by a security monitoring system 100.
  • the dwelling has a front door 120, in a doorway that is a main entrance giving access to the protected interior of the dwelling.
  • the door 120 is fitted with a door sensor 130 to detect the opening of the door.
  • the door sensor 130 is typically, but not necessarily, a magnetically triggered switch which is fitted to the opening side of the door, opposite to the hinge side. It will be appreciated that the door sensor is an example of a detector to detect the breaching of the entrance represented by the doorway.
  • the breaching of an entrance may also be detected using a motion sensor such as a PIR sensor, a video camera or other image sensor, a floor-mounted pressure sensor, or some other contact or non-contact sensor, any of which may be used to detect the breaching of an entrance into a building, garden, farm, etc., and which may therefore generate an alarm trigger signal to indicate the breaching of a monitored entrance.
  • a motion sensor such as a PIR sensor, a video camera or other image sensor, a floor-mounted pressure sensor, or some other contact or non-contact sensor, any of which may be used to detect the breaching of an entrance into a building, garden, farm, etc., and which may therefore generate an alarm trigger signal to indicate the breaching of a monitored entrance.
  • the door sensor 130 includes an RF transmitter, not shown, that transmits an entry violation signal to a central unit 140 of the monitoring system 100 in the event that the door is opened.
  • a disarm node 150 is mounted on a wall.
  • the disarm node 150 has a user interface, including a touch screen or keypad to receive a user input to disarm the system, and a radio frequency transmitter, not shown, to transmit, in consequence of the user input, a disarm instruction to the control unit 140.
  • a similar disarm node 160 is also mounted on a wall of the kitchen near to a back door 170 which also gives access to the protected interior of the dwelling.
  • the dwelling is also provided with Windows, 180, and these are provided with one or more sensors to detect window opening, glass breakage, tampering or the like.
  • the security installation 100 also includes an exterior monitoring camera, here a video camera, 50 with which is associated to transceiver 55 and a movement detector, such as a PIR detector 60.
  • a movement detector such as a PIR detector 60.
  • the movement detector 60 and the video camera 50 are mounted to survey a monitored area, in this case a back garden associated with the domestic dwelling hundred and 10. The back garden being accessible through a garden gate 70.
  • the owner or occupier of the domestic dwelling 110 may, for example keep removable valuables, such as scooter 80, in the back garden, and the exterior monitoring camera can help protect such removable valuables.
  • the exterior monitoring camera 50 is not secured to the structure of the domestic dwelling 110, but rather is mounted remotely so that it can better survey both the rear exterior of the property and also the back garden.
  • the video camera 50 is activated in the event that the movement detector 60 detects movement, for example when the garden gate 70 is opened and someone enters the garden.
  • the video camera 50 uses the transceiver 55 to communicate with the central unit 140.
  • the central unit may be configured to enter an alarm state and, for example, communicate with a remote central monitoring station 190 wirelessly, or with a wired connection, for example via the Internet 195.
  • the central unit 140 may instruct the video camera 50 to transmit images using the transceiver 55, and then forward the images to the central monitoring station for review. Upon review at the central monitoring station, you may be decided to dispatch security personnel and/or raise an alarm with the police.
  • the present disclosure provides methods and apparatus to reduce the risk of such accidental triggering of alarm conditions.
  • FIG. 2 illustrates schematically the major elements of a camera 50 (here a video camera) according to an aspect of the disclosure.
  • the camera includes a camera module 200 that includes an image sensor and a lens.
  • the camera module 200 is controlled by a processor 210, which includes RAM memory 215.
  • Operatively coupled to the processor 210 is a further memory arrangement 220 for long term storage of program data and image data (although these may of course be stored in separate memories).
  • the camera 50 is powered by a battery power supply 230.
  • a photovoltaic arrangement 240 may be provided to provide supplementary power and to charge a rechargeable battery within the battery power supply.
  • the processor 210 is also operatively coupled to the camera's RF transceiver 55.
  • two transceivers 55' and 55" are provided, and at least one of these transceivers uses the industrial, scientific and medical (ISM) radio bands, and RF transceivers is configured to provide Wi-Fi functionality.
  • the two transceivers may be identical, or one may support ISM while the other supports Wi-Fi.
  • RF communication between the central unit and the nodes (including cameras 50), detectors and sensors of security monitoring systems according to embodiments of the invention use the industrial, scientific, and medical (ISM) radio bands, such as in Europe the 868MHz band. Within the 868 MHz band are several sub-bands dedicated to "non-specific SRD" which are of interest.
  • a transceiver 55 preferably uses Wi-Fi to transmit the data provided there is sufficient battery charge and sufficient available bandwidth.
  • Each of the transceivers has an associated antenna arrangement.
  • Figure 2 also shows the motion sensor 60, which may be a PIR sensor, incorporated within the camera 50 and operatively coupled to the processor. Also shown are an optional microphone 250 and loudspeaker 260, both of which are operatively coupled to the processor 210. The loudspeaker may be used to provide feedback to an authorised user, as will be discussed later, and to enable communications from the central monitoring station 190 to be heard in the vicinity of the camera 50. Finally, the camera may include an indicator light 265, to provide optical feedback under the control of the processor 210. Of course, the camera may also be associated with an infrared or other light source, not shown, for use in illuminating the monitored area and effectively improving the quality of images obtained by the camera 50.
  • the motion sensor 60 which may be a PIR sensor, incorporated within the camera 50 and operatively coupled to the processor.
  • an optional microphone 250 and loudspeaker 260 both of which are operatively coupled to the processor 210.
  • the loudspeaker may be used to provide feedback to an authorised user, as
  • Figure 3 shows schematically shows the main components of various devices of the security monitoring system and that may be involved in arming and, more particularly, disarming the system, specifically the main elements of the central unit 140, and disarm node 150, and a key fob or token 370.
  • the central unit 140 includes a processor 300 with an associated memory 310 which stores, among other things, identities for the key fobs that are registered to the system, identities for the door sensors and disarm nodes of the system together with an association between each disarm node and the door sensor for the access door closest to the relevant disarm node. These identities and associations are stored in a database 315 within the memory 310.
  • the central unit includes at least one RF transceiver 320, with associated antenna 322, for communication with the various nodes and sensors of the monitoring system. Typically, there will be a second transceiver 330 as shown, also with an associated antenna 332, for communication with the central monitoring station 190, as a backup or alternative to a wired data connection to the Internet via a network interface 340.
  • the antennas of the various transceivers will typically all be internal to the central unit.
  • the processor 300 is connected to, and controls, the memory 310, transceivers 320, 330 and the network interface 335.
  • the central unit generally draws power from the domestic power supply (generally referred to as a mains power supply) which feeds a power supply 336 within or associated with the central unit.
  • the central unit also includes a backup battery power supply which automatically becomes operational in the event that the external power supply fails.
  • the internal battery power supply is based on rechargeable cells 337 that are kept continuously topped up by the power supply 350.
  • the central unit may also include a user interface 325, including a display 326, a keypad or keyboard 327, a loudspeaker 328, and a microphone 329.
  • the keypad or keyboard may be a provided by making the display a touch-sensitive display, or as a unit distinct from the display.
  • the central unit may be arranged to accept through the keypad or keyboard a code or codes to arm and disarm the system.
  • the central unit may also include a near field communication (NFC) antenna and a corresponding NFC chip or equivalent circuitry which can be used, for example, to detect the presence of a "disarm dongle" provided to the user of the system and which can communicate with the central unit using Near Field Communication.
  • NFC near field communication
  • the key fobs may also be provided with an NFC antenna and chip or equivalent circuitry, so that they can be used as "disarm dongles" with the central unit and with NFC-enabled disarm nodes.
  • the disarm node 150 includes a processor 350 with an associated memory 351 that stores an ID of the disarm node.
  • the disarm node also includes a user interface 352 comprising indicators, e.g. LEDs, 353, a keypad, 354, and optionally a display 355 which may be present instead of or in addition to the LED indicators.
  • a transceiver 360 with an associated antenna 361 (which will typically be internal, rather than external as illustrated), is controlled by the processor 350, and is used for communicating with the central unit 140 and the key fob 370.
  • the transceiver 360 will typically be configured to operate in the 868MHz ISM bands (or equivalent available ISM bands in countries outside Europe).
  • the disarm node includes a battery power supply 362, and in general this will be the only power supply as typically it is preferred not to have to connect disarm nodes to the mains power supply.
  • a loudspeaker 363 is provided so that audible messages and instructions can be given to a user at the disarm node. These audible messages and instructions may be automated ones, generated by the central unit or by the disarm node itself, but additionally the loudspeaker 363 can be used to relay messages from a central monitoring station 190.
  • the disarm node may also store audio files for these messages and instructions on its internal memory, to avoid problems caused by use of a low-bandwidth channel (e.g., an 868MHz RF channel) between the central unit and the disarm node.
  • a low-bandwidth channel e.g., an 868MHz RF channel
  • a disarm node storing such audio files may then receive instructions from the central unit to play out particular messages, and do so using the stored audio files.
  • the loudspeaker may be used to provide a disarm success or failure message.
  • the disarm node may also store audio files for these messages and instructions on its internal memory, to avoid problems caused by the use of a low-bandwidth channel (e.g. an 868MHz RF channel) between the central unit and the disarm node.
  • a disarm node storing such audio files may then receive instructions from the central unit to play out particular messages and do so using the stored audio files.
  • the disarm node also includes a microphone 364 to permit a user at the disarm node to hold a conversation with a human operative in, for example, a central monitoring station 190, or even with the emergency services - for example if patched through by the central monitoring station.
  • the disarm node may not include a microphone but a co-located external microphone provided to enable a user to speak to operatives in the Central Monitoring Station or the emergency services.
  • the disarm node 150 is secured to the building protected by the security monitoring system, for example attached to an internal wall at a height convenient for user operation - for example fixed at a height between 1 metre and 1.5 metres from the floor.
  • the system is arranged to permit the system to be armed and disarmed from a disarm node.
  • the disarm node also includes a Near Field Communication antenna and chip 365 to enable a disarm dongle, such as an NFC-enabled fob, to be used to disarm or arm the system by bringing the dongle within a few centimetres of the disarm node - e.g., by bringing the fob into contact with the disarm node.
  • the disarm node may also be configured to encrypt its radio transmissions, and to decrypt received signals, so that secure communications with the central unit are possible.
  • the encryption may be based on a secret shared between the central unit 140 and the disarm node 150.
  • the key fob 370 includes a processor 375, with an associated memory 376 that stores an identifier for the fob, a transceiver 377, and a battery 378 that provides power to the processor and the transceiver.
  • Transceiver 377 is typically a conventional polling transceiver designed for low power consumption. Such a polling transceiver, when in a resting state, periodically powers just the front end of its receiver circuit to listen for polling signals. If a polling signal is detected, possibly subject to some power level minimum, the rest of the receiver circuit is energised to receive transmissions. Such a polling transceiver may listen for no more than about 100 - 125 ms each second, unless polling signals are detected.
  • the transceiver of whatever kind, is controlled by the processor and enables radio communication with the central unit 140, the disarm node 150 and the transceiver 55 of camera 50.
  • the key fob also includes a motion sensor 379, such as an accelerometer, which is used to determine whether the key fob is being carried by someone or whether it is stationary. E.g. whether it has been deposited inside the house. may also include one or more buttons 380 which a user can use to issue commands or responses.
  • the key fob may also include one or more visual indicators 385, for example one or more LEDs, to indicate a status, to confirm a button press, or the like.
  • a single multi-coloured indicator such as an LED, may be used to provide multiple different indications while keeping component count low and enabling the key fob dimensions to be made compact.
  • the key fob may also include one or both of a loudspeaker and a haptic transducer 390 for providing user feedback.
  • the key fob is preferably configured to encrypt its radio transmissions, and to decrypt received signals, so that secure communications with the central unit are possible.
  • the encryption may be based on a secret shared between the central unit and the key fob.
  • Figure 4 is a simplified schematic sequence diagram illustrating a method according to an aspect of the invention. In particular, it illustrates in a simplified way how a security monitoring system according to an aspect of the invention responds when an authorised person (someone carrying a registered key fob 370) enters a zone monitored by external security monitoring camera 50.
  • a security monitoring system e.g. house
  • the occupant opens the garden gate 70 and enters the area monitored by the security monitoring camera 50.
  • the opening of the garden gate 70 triggers, 400, the motion detector 60 associated with the camera 50, causing a motion trigger signal to be supplied to the processor 210 of the camera.
  • the processor 210 then activates one of the transceivers 55 to transmit, 410, a motion trigger signal to the central unit 140.
  • the central unit 140 starts, 420, an outdoor entry timer.
  • the central unit 140 also transmits, 430, a start wake on radio instruction to the camera 50.
  • the camera 50 uses one of its transceivers 55 to transmit, 440, a low power out of band wake up signal whose strength is sufficient to wake up any key fob 370 that is within the monitored area.
  • the occupant is carrying a key fob 370, her key fob wakes up and transmits, 450, a signal including the fob ID (which can be considered to be the start of a Login cycle).
  • the signal from the key fob is received by the central unit 140, and if the fob ID is registered with the central unit 140, the central unit pauses, 460, the outdoor entry timer.
  • the outdoor entry timer may be paused for (in effect extended by) a configurable period chosen to be long enough to accommodate the usual coming and going of an occupier. For example, if the occupier keeps a bicycle in the back garden, the paused period should be long enough to enable the occupier to unlock her bicycle, stow the lock, don her helmet, and leave the garden shutting the gate behind her. This period might be of the order of one or two minutes. Meanwhile, the security monitoring system remains armed - so that opening a door or window, for example, will trigger the usual armed away response from the central unit. After the expiry of the paused period, the central unit may revert to its usual armed state, so that subsequently detected motion in the monitored area will again cause the central unit to start an outdoor entry timer.
  • the central unit 140 may be configured to disarm the security monitoring system at step 460 - so that, for example, if the fob-carrying occupier were to enter the house from the back garden through the back door 170, the monitoring system would not generate an alarm. If this behaviour is programmed into the central unit 140 then it is preferred for the relevant disarm node, here 160, to respond to the detection by the sensor 130 of the opening of the back door 170 by providing some kind of audible or visual indication signifying that the security monitoring system was disarmed as the result of the occupier's presence in the back garden having been detected by virtue of their registered fob.
  • the disarm node could voice a welcome back message confirming that "the monitoring system was armed but that it had been disarmed when we recognised you in the back garden".
  • a further option would be to configure the central unit to re-arm the system (to its previous armed state) in the event that no entry is attempted to the house within a certain period after the disarming of the system, and no motion has been detected in the monitored area for a certain time. In this way, if the occupier had just entered the back garden to take her bicycle or scooter and then left, the premises would once again by protected by the security monitoring system.
  • the security monitoring installation may include plural external cameras 50, each with its own respective monitored area, and the central unit can be configured to disarm the monitoring system, or suspend the outdoor entry timer, only in respect of the monitored area within which a key fob 370 has responded to a wake on radio wake up signal. If the system is configured to disarm just in respect of the relevant monitored area, it may be configured to re-arm the monitoring system in respect of the previously disarmed monitored area following a period of no motion triggers being received from the relevant camera 50.
  • Figure 5 is a sequence diagram showing, by way of contrast, what happens when an unauthorised intruder enters the area monitored by security monitoring camera 50.
  • the intruder triggers the motion detector 60 associated with the camera 50, causing a motion trigger signal to be supplied, 500, to the processor 210 of the camera.
  • the processor then activates one of the transceivers 55 to transmit, 510, a motion trigger signal to the central unit 140.
  • the central unit 140 On receiving the motion trigger signal from camera 50, the central unit 140 starts, 520, an outdoor entry timer.
  • the central unit 140 also transmits, 530, a start wake on radio instruction to the camera 50.
  • the camera 50 On receiving the start wake on radio instruction, the camera 50 uses one of its transceivers 55 to transmit, 540, a low-power, out of band wake up signal. Because the intruder is not carrying an authorised key fob 370, no response is received to the wake on radio signal, and consequently the outdoor entry timer expires. On expiry, 550, of the outdoor entry timer, the central unit 140 determines an alarm event, notifies the central monitoring station 190, and instructs the camera 50 to start transmitting image data which may be supplied to the central monitoring station 190. The central unit 140 may also trigger a siren or other alarm indicator at the premises and/or may trigger announcements, for example, from the speaker of the camera 50 to advise the intruder that they have been spotted.
  • Figure 6 is a timing diagram showing the sequence of events and actions of the various elements of the security system that characterise a method, according to an embodiment of the invention, of suspending an outdoor entry timer when the presence of an authorised user is detected.
  • the diagram concerns the operations of the entrance breach detector - e.g., the camera 50 including movement detector 60, the central unit 140, and the portable authentication device 370.
  • the method starts, 599, with the security monitoring system in an armed away state (the described method could equally be performed with the system in an armed at home status, but generally the issue of owner-induced false alarms caused by unintentional triggering of external monitored areas arises when systems are in the armed away state) at 599.
  • the motion sensor senses an event, for example the opening of the garden gate, in the monitored external area, and this results in the camera's processor 210 causing an RF transceiver 55 of the camera to transmit an entry violation message.
  • This entry violation message which includes the camera's ID, is received at a transceiver of the control unit 140.
  • the central unit 140 starts, at 610, an entry period timer, which is set for the duration of the period within which a disarm process needs to be completed before the control unit causes the system to enter an alarm condition - for example in the range 20 to 90 seconds (a period set based on the time needed for an occupant/user to disarm the arm - possibly including unlocking the back door, entering the house, and using the disarm node.
  • the central unit identifies the detector that transmitted the motion detection message (which can be considered a form of entry violation message) from the camera ID contained in the received message.
  • the central unit 140 includes the ID code for that camera in a message which it transmits, at 620, to the camera 50 to cause the camera to transmit, at 630, a beacon signal or polling signal to wake up the transceiver in any portable authentication device (or at least any portable authentication device which is moving or which has not had its transceiver shut down following a period of non-movement) within the vicinity of the targeted camera 50, and preferably includes a special identifier to be included in the beacon signal or polling signal, and details of a packet countdown (to be described later) to be used.
  • the special identifier will typically be a random or pseudo random number whose value changes at each use.
  • the portable authentication device 370 listens for beacon signals on one or more channels whose parameters are known to each of the portable authentication devices - for example by having been pre-programmed, but more preferably having been communicated to the or each portable authentication device when that portable authentication device first registered with the central unit (although of course the central unit could periodically update these parameters through an exchange of messages with the portable authentication device(s)).
  • the characteristics of the beacon or polling signal transmitted by the camera 50 are preferably chosen to make the effective range of the beacon signal small - preferably of the order of a few metres, e.g.
  • the transceiver 377 of a portable authentication device 370 that is within a few metres of the camera 50 (and that is not currently in a shut-down state following a period of non-movement as determined based on signals from the motion sensor 379) detects, 640, the beacon signal and wakes up.
  • the transceiver 377 receives and decodes the beacon signal, retrieving the special identifier (if used).
  • the controller 375 of the portable authentication device 370 then causes the transceiver 377 of the portable authentication device to transmit, at 650, a message including the portable authentication device ID and the special identifier (if used) to the central unit 140.
  • the central unit 140 checks that the special identifier (if used) is valid (meaning that it is one issued within the current period of the outdoor entry timer) and also checks to see whether the portable authentication device ID corresponds to one registered with the central unit. If both checks are passed (if a special identifier is being used), the central unit at 660, may suspend the system if the message from the portable authentication device 370, containing the portable authentication device id and the special identifier (if used), was received before expiry of the outdoor entry timer. The control unit 140 may also at this stage send, 670, a further message to the camera 50 to cause the camera to provide, 680, a notification of the fact that the presence of an authorised key fob 370 has been detected and that the outdoor entry period timer has been suspended.
  • the camera may activate an appropriate indicator light 265 and/or provide a "Welcome" sound or announcement through the loudspeaker 260.
  • the camera 50 may also be instructed to send, 685, a further message to the portable authentication device 370 to cause the fob to generate, 690, a signal indicating successful recognition - for example, by illuminating an indicator on the portable authentication device, making an announcement or sound, or vibrating in a characteristic way.
  • the disarm request message sent by the portable authentication device 370 to the control unit 140 may also include a report on the RSSI levels of messages received by the portable authentication device 370 from the camera 50, and the control unit 140 may use the information about measured RSSI levels in such a report in determining whether or not to trust the received disarm request - i.e. whether to disregard the disarm request as invalid on the basis that it is likely to have come from a rogue actor (outside the usual range of the camera) rather than from an authorised user within range of the camera.
  • the control unit identifies 140 an alarm state. If the system is backed up by a central monitoring station (CMS) 190, the central unit 140 will send a status change message to the CMS 190, typically with the identifier of the camera that first indicated movement (as an example of an entrance breach) event. The CMS 190 may then cause the central unit 140 to activate the camera (plus possibly other video cameras) or other image capture devices, audio capture devices, etc. and provide data feeds from these to the CMS 190. The CMS may also invoke human intervention as appropriate.
  • CMS central monitoring station
  • FIG. 7 is a flow chart illustrating one possible process for a portable authentication device 370 according to an embodiment of the invention to determine whether to respond to a received transmission.
  • the portable authentication device receives an RF transmission at its transceiver (the transceiver not having been shut down following a determination that the portable authentication device is stationary).
  • the portable authentication device determines whether the received transmission is a disarm instruction - that is, including a disarm transmission identifier of some kind, for example being a wake beacon (for example, from a camera 50 as previously described) or disarm success or failure message. If the determination is negative, i.e., it is not a disarm instruction, the process moves to step 1200.
  • step 1300 the movement status of the portable authentication device 370 is checked. If the portable authentication device is determined to be stationary, the process moves to step 1400. If the portable authentication device is configured to shut down its transceiver following a period of non-movement, when the fob 370 is deemed to be stationary, the portable authentication device will subsequently not receive any RF transmission (until after the portable authentication device is detected as having moved again) and hence this process does not take place. But if the portable authentication device is determined to be moving, at 1600, the process proceeds to step 1800.
  • the processor 375 determines whether the portable authentication device 370 should be deemed to be stationary, for example by checking a count (or some other measure of elapsed time) since the portable authentication device was last determined to be moving. If the count is less than a predetermined threshold count, the portable authentication device 370 is determined, 1500, to be a "live" portable authentication device which can be used to provide a disarm instruction to the central unit (that is, the portable authentication device is not deemed to be stationary), and the process proceeds to step 1800. If the portable authentication device is deemed to be stationary, then no disarm message will be transmitted by the portable authentication device 370, and the process ends at 1700.
  • the period of inactivity that is accepted as indicating that a portable authentication device 370 is "live” may be set differently in different installations, but typically this period will be no more than about 60 seconds. A cut off at 30 seconds will often be long enough for most users, although for system installations where the occupants or users of the secured space are elderly or infirm 30 seconds may not be long enough. Preferably the cut off period is kept relatively short, at no more than a minute or so.
  • step 1300 If at step 1300 the portable authentication device is determined to be moving 1600, the process proceeds to step 1800.
  • the portable authentication device generates a transmission message that includes the portable authentication device ID, and the disarm transmission identifier (if used), and such other parameters as the system requires (for example, a report of measured RSSI).
  • the portable authentication device may be programmed simply to read the transmission and act on the contents, or to check for a certain flag or flags and to respond differently based on the flag(s) determined to be present.
  • the monitoring system may be so arranged that the portable authentication device 370 is configured to receive an instruction other than a disarm instruction via the transceiver, including a flag, from the control unit to perform an action; and wherein in the event that the other instruction includes the flag, the processor is configured to cause the portable authentication device to perform the instructed action whether or not, when the instruction is received, the portable authentication device is determined to be stationary.
  • Portable authentication devices 370 configured in this way can be activated by an RF signal, from the control unit or from a disarm node, enabling the status of all portable authentication devices in range to be checked and/or updated. It would also be possible to perform an audit of all the portable authentication devices in range of, say, the central unit. If such a portable authentication device 370 were to include one or more of a visual indicator 385, an audio transducer 390, a haptic transducer 390, and were further configured to generate an output using one or more of these when so instructed by a received instruction including the flag, a mislaid portable authentication device could be made to announce itself.
  • Portable authentication devices 370 may be configured to listen for instructions related to hands free disarm (including transmissions from external cameras 50 as previously described) only on a particular channel or channels, with given frequency and given modulation, but to listen to another channel or channels on a different frequency and possibly with different modulation for other kinds of instructions.
  • Disarm instructions received from a disarm node do not typically contain a portable authentication device ID - because, if more than one portable authentication device is registered with the central unit, it cannot be assumed which if any portable authentication device is being carried by the person who opened the door whose opening has been sensed. But other message may be targeted to a particular portable authentication device or to a group of portable authentication devices that is a subset of all the registered portable authentication devices. Consequently, a portable authentication device according to embodiments of the invention may also be arranged to check the contents of received messages for the presence of that portable authentication device's ID. In this way, the control unit 140 can target an individual portable authentication device 370 or group of portable authentication devices.
  • a "announce myself” message could be transmitted by the central unit flagged with the ID of the particular portable authentication device that has been mislaid. If other portable authentication devices receive the message, they do not respond to it, because it is flagged as an "announce myself” message and does not contain their ID. Whereas the missing portable authentication device sees that the message is flagged as an "announce myself” message, recognises its own ID, and announces its presence using one or more of its inbuilt indicators (for example one or more LEDs, or providing a haptic announcement - by "buzzing" or vibrating).
  • monitoring systems will not be configured to transmit only disarm messages to portable authentication devices, but will also be configured to send other types of messages to portable authentication devices 370.
  • a portable authentication device In systems that do only send portable authentication devices 370 disarm messages, a portable authentication device just needs to recognise a received message as a disarm message and respond with the disarm transmission identifier (if used) and the portable authentication device ID (although, as will be explained later, portable authentication devices may be required to perform RSSI measurements and include these, or a report based on these, as part of the response).
  • a central unit may be configured to instruct the portable authentication device involved in a hands free disarm event to provide a disarm success indicator on a successful disarm event.
  • Such an instruction will preferably include the ID of the portable authentication device that transmitted the disarm request to the central unit (the portable authentication device ID having been included in that disarm request).
  • Messages may be sent to portable authentication devices 370 at least from the control unit (of which, in some systems, there may be more than one), disarm nodes 150, and external monitoring cameras 50. Where there are multiple message types, they may be labelled Disarm Message, Group, and Targeted - labels which can be considered to be class flags. If finer granularity is required, a further level of flags may be provided - so that a message type is indicated by a primary flag (Disarm Message, Group, or Targeted), and (at least for Group and Targeted) a secondary flag that indicates the specific message type within the class. Alternatively, a single level of flags may be provided, with typically multiple flags for each of the Group and Targeted classes.
  • the sub-band between 869.7 and 870Mhz is particularly interesting for use when transmitting short-range beaconing signals from the disarm nodes because it provides a relatively wide channel, the beacon channel, which allows the use of a high data rate, e.g. 250 kbit/s, which is helpful in reducing the effective range of the beacon signal.
  • the effective radiated power ceiling of 5mW also poses no significant constraint for this application.
  • this sub-band between 869.7 and 870Mhz is the preferred frequency band for the short-range transmissions from the disarm node - and which are used for communication with portable authentication devices, e.g., for the transmission of wake up messages.
  • a sensor that detects the breaching of an entrance transmits an alarm trigger signal, including a sensor identifier, that is detected by the control unit.
  • the control unit recognises the sensor identifier and uses this to retrieve the identifier for the disarm node that is associated with the relevant sensor.
  • the control unit then transmits a message, which may be a wake up message, including the relevant disarm node identifier which has the effect of causing the relevant disarm node to listen for signals from fobs (portable identification devices).
  • the control unit then transmits a fob wake up signal receivable by any fob adjacent any of the disarm nodes.
  • Any fob that receives the fob wake up signal from the control unit then responds by transmitting a response signal, including its own identifier, that is only detectable by a disarm node within no more than about 2 metres of the fob (using appropriately selected transmission characteristics of power, data rate, etc. to ensure a short effective transmission range).
  • a disarm node receiving the fob response signal then transmits a signal, including the fob identifier, to the control unit which then determines whether the fob identifier is for a registered fob. In this way only the disarm node whose identifier was included in the transmission from the control unit detects the fob response.
  • the disarm node may be configured to generate an alarm trigger signal that is transmitted to the control unit in response to receiving an entrance breach signal from a sensor configured to detect the breaching of an entrance to the building or secured space. That is, the sensor transmits a signal in respect of a detected breach, which signal is received by the associated disarm node rather than by the control unit.
  • the control unit transmits a fob wake up signal receivable by any fob adjacent any of the disarm nodes. Any fob that receives the fob wake up signal from the control unit then responds by transmitting a response signal, including its own identifier, that is only detectable by a disarm node within no more than about 2 metres of the fob.
  • a disarm node receiving the fob response signal then transmits a signal, including the fob identifier, to the control unit which then determines whether the fob identifier is for a registered fob. In this way only the disarm node whose identifier was included in the transmission from the control unit detects the fob response.
  • this approach is less preferred than the alternatives already mentioned, because if the signal from the sensor detecting the breach of an entrance is only received by the control unit through the disarm node, rather than directly, the security of the system is reduced - the disarm node becomes a point of weakness, because if it is disabled or its signals blocked in some way by a bad actor, the control unit will not receive any alarm trigger signal in respect of the breach.
  • anti-tampering features in the disarm node, such as sensors to detect and report on attempts to open the disarm node, and possible also implementing a "heartbeat" function in which the disarm node periodically "checks-in” with the control unit - the failure of the control unit to receive the heartbeat, or the reception of a tamper message from the disarm node causing the control unit to determine an alarm condition which is reported to the central monitoring station (if present) and to provide alarm signals (audio and optical) through the alarm installation - as well as sending reports to the user's phone - email, as appropriate.
  • Such extra security features may also be present in disarm nodes according to any of the other embodiments and variants.
  • Achieving effective battery life of nodes and sensors in alarm and monitoring systems is a constant concern, because battery failure disables the relevant node or sensor, which can lead to loss of security, and battery replacement may involve a site visit by the system supplier - which is expensive and inconvenient.
  • loss of battery power means that the portable authentication device stops working, which is inconvenient for the user, and the cause of the failure may not be apparent to the user so that the user may require a site visit to identify and fix the problem. Consequently, we are interested in reducing power consumption in all of the battery powered components of the system, including the portable authentication device. For this reason the use of a wake on radio receiver in the portable authentication device is attractive although acceptable battery life can also be obtained using a more conventional radio receiver that periodically wakes to listen (poll) for beacon signals.
  • a first detection stage of the transceiver of the portable authentication device may be used to perform a first step which involves just checking an RSSI level.
  • the transceiver in the portable authentication device may perform periodically a brief RSSI check polling the beacon channel, using just the RF front end of the transceiver, for example for a first period of less than a few milliseconds, preferably a fraction of a millisecond, e.g. around 0.5 milliseconds, and then revert to its rest state if the sensed RSSI level is below some pre-set threshold.
  • the portable authentication device listens for a brief period for a synch word from the disarm node - for example for a second period of a few milliseconds, for example for less than 10 milliseconds, e.g. 5ms. If no synch word is detected, the transceiver reverts to its rest state. But if a synch word is detected, the transceiver starts the full radio receiver which remains powered up, for example for a third period of between say 8 to 16ms, for example 10ms, to receive the full wake up packet. Each packet will typically last of the order of 220 ⁇ s, and the disarm node may transmit for 2 to 4 seconds, e.g.
  • RSSI detection can be achieved by activating just front end components of the transceiver, avoiding the need to power up all of the transceiver. If the detected RSSI level is below a threshold, the portable authentication device determines that there is unlikely to be valid data available and halts its RSSI check until the next cycle.
  • the cycle period determines the length of time for which the disarm node needs to transmit its beacon and also sets a lower bound on how quickly hands-free disarm is likely to occur on average.
  • the portable authentication device wake up interval which is controlled by a clock in the portable authentication device, will typically be chosen based on the duration of the disarm node beacon.
  • a portable authentication device wake up interval of one second would provide a good likelihood that a f portable authentication device within range of a broadcasting disarm node would be able to wake and retrieve the necessary information from the beacon signal.
  • a portable authentication device wake up of interval (period between polling events) of 2 seconds will often be frequent enough when the disarm node is configured to transmit its beacon signal for 3 seconds.
  • the portable authentication device wake up interval can conveniently be set at between a quarter and two thirds of the beacon duration.
  • a shorter relative cycle time is not technically problematic, but it is likely to use proportionally more battery power and hence shorten battery life commensurately.
  • the cycle time could be more than one half of the beacon duration, provided the system enables the portable authentication device to capture the beacon quickly after wake up, so that the necessary special ID (if used) can be recovered by the portable authentication device.
  • the disarm node transmits a beacon signal, on the beacon channel, which preferably includes the special codeword (shown as ID in Figure 8 ) received from the control unit for this hands free disarm event.
  • the beacon signal will be made up of a sequence of packets, each beginning with a preamble, followed by a synch word, then an identifier which is the special ID from the central unit.
  • each packet includes a countdown value, the countdown value decreasing by one in each subsequent packet (to zero in the final packet of the sequence) and indicating the number of packets until the end of the sequence of packets.
  • the beacon signal is recognised as such by the portable authentication device, because it is the only message of that kind with the relevant format in that channel, causing the portable authentication device to transmit a response including the special codeword (special I.D.).
  • the portable authentication device By including sequence information in the beacon from the disarm node, it becomes possible for the portable authentication device to determine when the beacon transmission will end. Using this information, the portable authentication device can delay transmitting its response to the central unit until after the disarm node has finished transmitting - so that it is easier for the central unit to detect the response from the portable authentication device without local interference. This means that portable authentication device transmit power can be kept low, prolonging the life of the portable authentication device's battery, while still enabling the control unit to receive the portable authentication device 's response. In addition, when the portable authentication device captures beacon packets, it can calculate how long it will be before the sequence ends. If the captured packets are early in the sequence, the portable authentication device can "snooze" or power down while waiting for the sequence to end, and then wake again in order to transmit its response to the central unit just after the sequence ends.
  • the portable authentication device will listen to multiple packets to be able to use statistics to get a reliable RSSI figure, and may report on the RSSI figure for each of the packets detected.
  • the portable authentication device controller 375 may use movement information from the portable authentication device's built-in movement sensor 379 to control the polling by the portable authentication device's transceiver 377. That is, polling may be suspended in the event that the processor deems that the portable authentication device is stationary - e.g. if movement sensor detects no movement, and the processor determines that a count since the portable authentication device was last determined to be moving is more than a predetermined threshold count, the portable authentication device is deemed to be stationary and polling may be suspended completely or the frequency of polling reduced (the preferred option, since that means that "lost" portable authentication devices can be made to announce themselves when they next poll).
  • the frequency of polling may be reduced to between a half and a twentieth, or less, of the usual frequency.
  • the processor determines that the portable authentication device is still moving, or has recently been moving (so that the portable authentication device is not deemed to be stationary)
  • the usual polling frequency is maintained.
  • the processor of the portable authentication device may be configured to cease generating the running count of the time since the portable authentication device was last in motion after the count of the time since the fob was last in motion reaches the predetermined threshold value, as this can reduce portable authentication device energy consumption, which is good for improving battery life.
  • the radio beacon In order to reduce the effective range of the radio beacon, it is transmitted from the disarm node at a low power (e.g. -20dBm or less) with a high data rate (for example, 250kbps or more, say 400 kbps) and with a low modulation index, to give an effective range of no more than about 5 metres.
  • a suboptimal modulation index we achieve three things: quickly send a lot of packets, reduce sensitivity to decrease range and to fit inside the given spectrum.
  • Sensitivity is in the range of around -90dBm at this settings and we try to be in line of sight, meaning that the distance from the transmitter is given as the fading of the channel with distance, using the Friis formula .
  • Encryption for example based on shared keys, is preferably used for all transmissions from and to the control unit in each of the embodiments of the invention.
  • the portable authentication device may include in the response message sent to the control unit details of the results of RSSI determinations made by the portable authentication device.
  • the disarm node may be configured to send a series of wake up messages upon being prompted by the control unit to send a disarm instruction, preferably including a unique disarm transmission identifier, to the portable authentication device .
  • the portable authentication device may be configured to determine the RSSI level of each of the messages of the series that are received from the disarm node.
  • the portable authentication device may be configured to include in the disarm request sent to the central unit a report based on the determined RSSI levels.
  • the portable authentication device may be configured to send a summary of the RSSI levels measured, such as the number of messages/packets measured or measured above a certain level, maximum RSSI level, average RSSI level, etc.
  • RSSI data can be used by the system to reduce the susceptibility of the system to "relay attacks” of the type used to fool passive entry systems (PES) of cars.
  • PES passive entry systems
  • the portable authentication device would report RSSI values as, for example, max/min values, and an average, and the central unit may hold factory pre-set values for a "real" disarm, and/or these may be supplemented or replaced with real world values obtained during commissioning/testing of the system.
  • the disarm node(s) could include a list of registered portable authentication devices and for the disarm node(s) rather than the control unit to perform the check of authentication device identity on receipt of the authentication devices response to the wake up signal/beacon.
  • the disarm node would, on successful authentication transmit an alarm deactivation message to the control unit.
  • Such an approach would of course require that the control unit update the disarm node(s) with additions and deletions to the list of registered authentication devices. This is a less preferred approach because of the need for the increased burden of keeping up to date lists in both the control unit and the disarm node(s).
  • any disarm transmission identifier or event ID has been generated by the central unit and then transmitted to a disarm node for inclusion in a wake up message from the disarm node
  • the disarm node could itself generate a disarm transmission identifier or event ID and either provide this to the central unit for the central unit to check any received fob transmission for the presence of the correct disarm transmission identifier or event ID or itself check any received fob transmission for the presence of the correct disarm transmission identifier or event ID and transmit the result of the check to the central unit.
  • disarm transmission identifier or event ID it is preferable for the disarm transmission identifier or event ID to be generated and checked by the central unit, rather than devolving either or both these functions to a disarm node, because this reduces the risk of a bad actor adopting the guise of a disarm node to fool the system.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Claims (20)

  1. Sicherheitsüberwachungssystem mit:
    einer Systemsteuerung,
    einer mit einem Bewegungssensor (60) gekoppelten Videokameraanordnung (50), die zur Überwachung eines Überwachungsbereichs eingerichtet ist,
    einem tragbaren Token (370), auf dem eine Token-Identifikation gespeichert ist,
    wobei die Videokamera (50) so ausgebildet ist, dass sie bei Empfang eines Bewegungsmeldesignals von dem Bewegungssensor (60) einen Alarm an die Systemsteuerung sendet,
    wobei die Systemsteuerung so ausgebildet ist, dass sie in einem scharfgeschalteten Zustand bei Empfang eines Alarms von der Videokamera (50) einen Ereigniszeitgeber startet und eine Anweisung an die Videokamera (50) zur Aussendung eines Signals zur Aktivierung des Tokens (370) sendet, wobei die Anweisung eine Ereigniskennung enthält,
    wobei die Videokamera (50) ferner so ausgebildet ist, dass sie bei Empfang der Anweisung von der Systemsteuerung ein Signal zur Aktivierung des Tokens (370) aussendet, das die Ereigniskennung enthält,
    wobei das tragbare Token (370) so ausgebildet ist, dass es auf den Empfang eines Signals zur Aktivierung des Tokens (370) von der Videokamera (50) reagiert, indem es eine Antwort aussendet, die die Token-Identifikation und die Ereigniskennung enthält,
    wobei die Systemsteuerung ferner so ausgebildet ist, dass sie:
    bei Empfang einer Antwort von dem Token (370):
    die in der Antwort enthaltene Ereigniskennung mit der in der Anweisung an die Videokamera (50) enthaltenen Ereigniskennung vergleicht,
    die in der Antwort enthaltene Token-Identifikation mit einer oder mehreren gespeicherten Token-Identifikationen vergleicht
    und den Ereigniszeitgeber aussetzt, wenn beide Vergleiche eine Übereinstimmung ergeben,
    wenn entweder keine Antwort empfangen wird oder einer oder beide Vergleiche keine Übereinstimmung ergeben, bei Ablauf des Ereigniszeitgebers ein Alarmereignis feststellt.
  2. Sicherheitsüberwachungssystem nach Anspruch 1, bei dem die Videokamera (50) und der Bewegungssensor (60) so eingerichtet sind, dass sie einen Überwachungsbereich erfassen, und die Videokamera (50) so ausgebildet ist, dass sie das Signal zur Aktivierung des Tokens (370) als Funksignal mit einer wirksamen Reichweite aussendet, die sich nicht wesentlich über den Überwachungsbereich hinaus erstreckt.
  3. Sicherheitsüberwachungssystem nach Anspruch 1 oder Anspruch 2, bei dem das tragbare Token (370) einen Prozessor aufweist, der mit einem Bewegungssensor des Tokens (370) gekoppelt ist, und das Token (370) so ausgebildet ist, dass es auf Signale zur Aktivierung des Tokens (370) nur dann reagiert, wenn der Prozessor feststellt, dass sich das Token (370) bewegt.
  4. Sicherheitsüberwachungssystem nach einem der vorhergehenden Ansprüche, bei dem eine HF-Kommunikationseinrichtung des tragbaren Tokens (370) einen Wecken-Ein-Funkempfänger (Wake-On-Funkempfänger) aufweist und die Videokamera (50) so ausgebildet ist, dass sie Signale zur Aktivierung des Tokens (370) als Wecken-Ein-Funksignale (Wake-On-Funksignale) aussendet, auf die das Token (370) anspricht.
  5. Sicherheitsüberwachungssystem nach einem der vorhergehenden Ansprüche, bei dem das tragbare Token (370) so ausgebildet ist, dass es in seine Antwort auf das Signal zur Aktivierung des Tokens (370) von der Videokamera (50) RSSI-Daten einbezieht.
  6. Sicherheitsüberwachungssystem nach Anspruch 5, bei dem die Systemsteuerung so ausgebildet ist, dass sie die in der Antwort des Tokens (370) enthaltenen RSSI-Daten bei der Feststellung verwendet, ob die empfangene Antwort vertrauenswürdig ist.
  7. Sicherheitsüberwachungssystem nach Anspruch 6, bei dem die Systemsteuerung so ausgebildet ist, dass sie die Antwort des Tokens (370) als ungültig betrachtet, wenn die in der Antwort des Tokens (370) enthaltenen RSSI-Daten darauf hindeuten, dass die Antwort von außerhalb der üblichen Reichweite der Funksignale von der Kamera stammt.
  8. Sicherheitsüberwachungssystem nach einem der vorhergehenden Ansprüche, bei dem Hochfrequenz-Sender/Empfänger (55) des tragbaren Tokens (370), der Videokamera (50) und der Systemsteuerung so ausgebildet sind, dass sie in den Funkbändern für Industrie, Wissenschaft und Medizin (ISM-Funkbändern) arbeiten.
  9. Sicherheitsüberwachungssystem nach einem der vorhergehenden Ansprüche, bei dem die Videokamera (50) so ausgebildet ist, dass sie auf Anweisung der Systemsteuerung von der Videokamera (50) aufgenommene Videobilder unter Verwendung von WLAN überträgt.
  10. Sicherheitsüberwachungssystem nach einem der vorhergehenden Ansprüche, bei dem die Systemsteuerung so ausgebildet ist, dass sie in einem scharfgeschalteten Zustand das Sicherheitsüberwachungssystem deaktiviert, wenn beide Vergleiche eine Übereinstimmung ergeben.
  11. Sicherheitsüberwachungssystem nach einem der Ansprüche 1 bis 9, bei dem die Systemsteuerung so ausgebildet ist, dass sie in einem scharfgeschalteten Zustand dann, wenn beide Vergleiche eine Übereinstimmung ergeben, das Sicherheitsüberwachungssystem nur bezüglich der Überwachung des Überwachungsbereichs deaktiviert.
  12. Videokamera (50) zur Verwendung bei einem Sicherheitsüberwachungssystem nach einem der vorhergehenden Ansprüche, wobei die Videokamera (50) einen Bildsensor, einen Hochfrequenzsender, einen Hochfrequenzempfänger und einen Prozessor aufweist, der wirkungsmäßig mit dem Bildsensor, dem Hochfrequenzsender und dem Hochfrequenzempfänger verbunden ist, wobei der Prozessor so ausgebildet ist, dass er bei Empfang eines Bewegungsauslösesignals von einem Bewegungssensor (60):
    unter Verwendung des Hochfrequenzsenders ein Markierungssignal an die Systemsteuerung des Sicherheitsüberwachungssystems sendet,
    als Reaktion auf den Empfang einer Anweisung von der Steuerung über den Hochfrequenzempfänger bewirkt, dass der Hochfrequenzsender ein Signal zur Aktivierung des Tokens (370) sendet.
  13. Videokamera (50) nach Anspruch 12, bei der das Signal zur Aktivierung des Tokens (370) ein Wecken-Ein-Funksignal (Wake-On-Funksignal) ist.
  14. Videokamera (50) nach Anspruch 12, bei der der Bewegungssensor (60) Teil der Videokamera (50) ist.
  15. Videokamera (50) nach einem der Ansprüche 12 bis 14, bei der der Hochfrequenzsender und der Hochfrequenzempfänger der Videokamera so ausgebildet sind, dass sie in den Funkbändern für Industrie, Wissenschaft und Medizin (ISM-Funkbändern) arbeiten.
  16. Videokamera (50) nach Anspruch 15, bei der der Hochfrequenzempfänger und der Hochfrequenzempfänger so ausgebildet sind, dass sie im 868-MHz-Band arbeiten.
  17. Videokamera (50) nach einem der Ansprüche 12 bis 16, ferner mit einem HF-Sender, der dazu ausgebildet ist, WLAN-Signale zu übertragen.
  18. Videokamera (50) nach Anspruch 17, bei der der Prozessor so ausgebildet ist, dass er auf Anweisung der Steuerung einer Sicherheitsanlage den HF-Sender so aktiviert, dass dieser von der Videokamera (50) aufgenommene Videobilder über WLAN überträgt.
  19. Verfahren zum Ausbilden eines Sicherheitsüberwachungssystems, wobei das Verfahren Folgendes umfasst:
    Bereitstellen einer Systemsteuerung,
    einer entfernten Videokamera (50), die mit einem Bewegungssensor (60) gekoppelt ist, und
    eines tragbaren Tokens (370), auf dem eine Token-Identifikation gespeichert ist,
    wobei die Videokamera (50) so ausgebildet ist, dass sie bei Empfang eines Bewegungsmeldesignals von dem Bewegungssensor (60) einen Alarm an die Systemsteuerung sendet,
    wobei die Systemsteuerung so ausgebildet ist, dass sie bei Empfang eines Alarms von der Videokamera (50) einen Ereigniszeitgeber startet und eine Anweisung an die Videokamera (50) zur Aussendung eines Signals zur Aktivierung des Tokens (370) sendet, wobei die Anweisung eine Ereigniskennung enthält,
    wobei die Videokamera (50) ferner so ausgebildet ist, dass sie bei Empfang der Anweisung von der Systemsteuerung ein Signal zur Aktivierung des Tokens (370) aussendet, das die Ereigniskennung enthält,
    wobei das tragbare Token (370) so ausgebildet ist, dass es auf den Empfang eines Signals zur Aktivierung des Tokens (370) von der Videokamera (50) reagiert, indem es eine Antwort aussendet, die die Token-Identifikation und die Ereigniskennung enthält,
    wobei die Systemsteuerung ferner so ausgebildet ist, dass sie:
    bei Empfang einer Antwort von dem Token (370):
    die in der Antwort enthaltene Ereigniskennung mit der in der Anweisung an die Videokamera (50) enthaltenen Ereigniskennung vergleicht,
    die in der Antwort enthaltene Token-Identifikation mit einer oder mehreren gespeicherten Token-Identifikationen vergleicht
    und den Ereigniszeitgeber aussetzt, wenn beide Vergleiche eine Übereinstimmung ergeben,
    wenn entweder keine Antwort empfangen wird oder einer oder beide Vergleiche keine Übereinstimmung ergeben, bei Ablauf des Ereigniszeitgebers ein Alarmereignis feststellt.
  20. Verfahren zum Betreiben eines Sicherheitsüberwachungssystems, wobei das Sicherheitsüberwachungssystem Folgendes aufweist:
    eine Systemsteuerung,
    eine mit einem Bewegungssensor (60) gekoppelte Videokamera (50), die zur Überwachung eines Überwachungsbereichs eingerichtet ist, und
    ein tragbares Token (370), auf dem eine Token-Identifikation gespeichert ist,
    wobei das Verfahren Folgendes umfasst:
    Überwachen des Überwachungsbereichs mittels der Videokamera (50) und des Bewegungssensors (60),
    Senden eines Alarms an die Systemsteuerung bei Empfang eines Bewegungsmeldesignals vom Bewegungssensor (60) durch die Videokamera (50),
    wobei bei Empfang eines Alarms von der Videokamera (50) die Systemsteuerung einen Ereigniszeitgeber startet und eine Anweisung an die Videokamera (50) zur Aussendung eines Signals zur Aktivierung des Tokens (370) sendet, wobei die Anweisung eine Ereigniskennung enthält,
    wobei die Videokamera (50) bei Empfang der Anweisung von der Systemsteuerung ein Signal zur Aktivierung des Tokens (370) aussendet, das die Ereigniskennung enthält,
    wobei das tragbare Token (370) auf den Empfang des Signals zur Aktivierung des Tokens (370) von der Videokamera (50) reagiert, indem es eine Antwort aussendet, die die Token-Identifikation und die Ereigniskennung enthält,
    wobei die Systemsteuerung: bei Empfang einer Antwort von dem Token (370) die in der Antwort enthaltene Ereigniskennung mit der in der Anweisung an die Videokamera (50) enthaltenen Ereigniskennung vergleicht,
    die in der Antwort enthaltene Token-Identifikation mit einer oder mehreren gespeicherten Token-Identifikationen vergleicht
    und den Ereigniszeitgeber aussetzt, wenn beide Vergleiche eine Übereinstimmung ergeben,
    wenn entweder keine Antwort empfangen wird oder einer oder beide Vergleiche keine Übereinstimmung ergeben, bei Ablauf des Ereigniszeitgebers ein Alarmereignis feststellt.
EP21174825.6A 2021-05-19 2021-05-19 Sicherheitsüberwachungssystem Active EP4092643B1 (de)

Priority Applications (6)

Application Number Priority Date Filing Date Title
EP21174825.6A EP4092643B1 (de) 2021-05-19 2021-05-19 Sicherheitsüberwachungssystem
ES21174825T ES2969462T3 (es) 2021-05-19 2021-05-19 Un sistema de vigilancia de seguridad
PL21174825.6T PL4092643T3 (pl) 2021-05-19 2021-05-19 System monitorowania bezpieczeństwa
BR112022026271A BR112022026271A2 (pt) 2021-05-19 2022-05-18 Um sistema de monitoramento de segurança
PCT/EP2022/063376 WO2022243345A1 (en) 2021-05-19 2022-05-18 A security monitoring system
ARP220101335A AR125918A1 (es) 2021-05-19 2022-05-19 Sistema de monitoreo de seguridad

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP21174825.6A EP4092643B1 (de) 2021-05-19 2021-05-19 Sicherheitsüberwachungssystem

Publications (3)

Publication Number Publication Date
EP4092643A1 EP4092643A1 (de) 2022-11-23
EP4092643C0 EP4092643C0 (de) 2023-12-20
EP4092643B1 true EP4092643B1 (de) 2023-12-20

Family

ID=76011862

Family Applications (1)

Application Number Title Priority Date Filing Date
EP21174825.6A Active EP4092643B1 (de) 2021-05-19 2021-05-19 Sicherheitsüberwachungssystem

Country Status (6)

Country Link
EP (1) EP4092643B1 (de)
AR (1) AR125918A1 (de)
BR (1) BR112022026271A2 (de)
ES (1) ES2969462T3 (de)
PL (1) PL4092643T3 (de)
WO (1) WO2022243345A1 (de)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7015806B2 (en) * 1999-07-20 2006-03-21 @Security Broadband Corporation Distributed monitoring for a video security system
US9681103B2 (en) * 2012-11-13 2017-06-13 International Business Machines Corporation Distributed control of a heterogeneous video surveillance network
US9325949B2 (en) * 2012-11-19 2016-04-26 Qualcomm Incorporated Intrusion detection
US9472077B2 (en) * 2014-08-01 2016-10-18 Francis Joseph Coviello Surveillance of a secure area

Also Published As

Publication number Publication date
ES2969462T3 (es) 2024-05-20
EP4092643C0 (de) 2023-12-20
BR112022026271A2 (pt) 2023-12-05
EP4092643A1 (de) 2022-11-23
AR125918A1 (es) 2023-08-23
PL4092643T3 (pl) 2024-04-22
WO2022243345A1 (en) 2022-11-24

Similar Documents

Publication Publication Date Title
US10467887B2 (en) Systems and methods of integrating sensor output of a mobile device with a security system
US9672705B2 (en) Systems and methods of intrusion detection
US10692340B2 (en) Smart barrier alarm device
JP3874122B2 (ja) 携帯アラームシステム
US10165401B2 (en) Adjusting security in response to alert communications
US7106193B2 (en) Integrated alarm detection and verification device
US20180066861A1 (en) Systems and methods of detection with active infrared sensors
AU2024202157A1 (en) A security monitoring system
US9734697B1 (en) Automatic notify mode for security system
US20080094203A1 (en) Method and apparatus for reducing false alarms in a security system
EP4369321A2 (de) Sicherheitsüberwachungssystem
EP4092643B1 (de) Sicherheitsüberwachungssystem
RU148910U1 (ru) Автономный радиоканальный gsm-сигнализатор
WO2020221844A1 (en) Disarm node and security monitoring system including such a node
RU2303289C1 (ru) Система для индивидуальной охраны недвижимого имущества
JP4530696B2 (ja) 警備システム
WO2022268922A1 (en) A security monitoring system
EP2390854B1 (de) Verfahren und System zur Aktivierung und Deaktivierung
KR100807814B1 (ko) 협력 방범 시스템

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION HAS BEEN PUBLISHED

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE

17P Request for examination filed

Effective date: 20221130

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20230713

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

RAP3 Party data changed (applicant data changed or rights of an application transferred)

Owner name: VERISURE SARL

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: GB

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602021007807

Country of ref document: DE

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

U01 Request for unitary effect filed

Effective date: 20240117

U07 Unitary effect registered

Designated state(s): AT BE BG DE DK EE FI FR IT LT LU LV MT NL PT SE SI

Effective date: 20240125

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20240321

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20240321

REG Reference to a national code

Ref country code: ES

Ref legal event code: FG2A

Ref document number: 2969462

Country of ref document: ES

Kind code of ref document: T3

Effective date: 20240520