GB2475578A - Surveillance system where captured security video is transmitted to owner's mobile phone - Google Patents

Surveillance system where captured security video is transmitted to owner's mobile phone Download PDF

Info

Publication number
GB2475578A
GB2475578A GB1009435A GB201009435A GB2475578A GB 2475578 A GB2475578 A GB 2475578A GB 1009435 A GB1009435 A GB 1009435A GB 201009435 A GB201009435 A GB 201009435A GB 2475578 A GB2475578 A GB 2475578A
Authority
GB
United Kingdom
Prior art keywords
video
mobile phone
signal
server
video feed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
GB1009435A
Other versions
GB2475578B (en
GB201009435D0 (en
Inventor
Khalid Al-Begain
Alhad Kuwadekar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GLAMEX SECURITY Ltd
Original Assignee
GLAMEX SECURITY Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GLAMEX SECURITY Ltd filed Critical GLAMEX SECURITY Ltd
Publication of GB201009435D0 publication Critical patent/GB201009435D0/en
Publication of GB2475578A publication Critical patent/GB2475578A/en
Application granted granted Critical
Publication of GB2475578B publication Critical patent/GB2475578B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19654Details concerning communication with a camera
    • G08B13/19656Network used to communicate with a camera, e.g. WAN, LAN, Internet
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19665Details related to the storage of video surveillance data
    • G08B13/19667Details realated to data compression, encryption or encoding, e.g. resolution modes for reducing data volume to lower transmission bandwidth or memory requirements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/102Gateways
    • H04L65/1023Media gateways
    • H04L65/103Media gateways in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/1063Application servers providing network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/61Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
    • H04L65/612Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2187Live feed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2343Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
    • H04N21/234363Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements by altering the spatial resolution, e.g. for clients with a lower screen resolution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/238Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams
    • H04N21/2381Adapting the multiplex stream to a specific network, e.g. an Internet Protocol [IP] network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/414Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
    • H04N21/41407Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance embedded in a portable device, e.g. video client on a mobile phone, PDA, laptop
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/414Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance
    • H04N21/4143Specialised client platforms, e.g. receiver in car or embedded in a mobile appliance embedded in a Personal Computer [PC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/643Communication protocols
    • H04N21/64322IP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/643Communication protocols
    • H04N21/6437Real-time Transport Protocol [RTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

A system and method of monitoring a location 102 for unauthorised access or activity comprising receiving a video feed using a first signal protocol from a video camera 100 monitoring the location, converting the first signal protocol into a second signal protocol compatible with a mobile phone, sending the video feed using the second signal protocol to a designated mobile phone 116, and to a second receiving device 118 in response to a user input on the designated mobile phone. A SIP application server 112 may wirelessly receive the video as an IP signal or RTP signal and translate it using a media gateway 114 into a 3G video signal for the mobile phone. The camera may be triggered in response to activity detected by a motion sensor 104. The resolution of the second signal may be optimised for the phone screen size. The second receiving device may be a computer 120 in a police or security service control room. If the video signal cannot be sent to the primary mobile phone, it may be forwarded to a secondary designated mobile phone 118.

Description

S
Security System
Background of the Invention
The present invention concerns security systems. More particularly, but not exclusively, this invention concerns a security system set up to provide a video feed from a security camera to a mobile phone.
Many security systems exist in order to attempt to combat the crime of burglary. These include burglar alarms which may be installed at commercial or domestic premises.
The alarms may be triggered by a sensor connection being broken or motion/heat being detected by an associated sensor. However, many false alarms may be triggered by accident or because of a fault in the sensing equipment.
This diverts police resources away from real alarms, wasting police time and reducing their effectiveness in combating real crime. Alternative security systems include security cameras set up to monitor a particular area. While such arrangements may reduce the number of false alarms triggered, they work as a real-time alarm system only when monitored by user. Therefore, they are not as convenient as a burglar alarm arranged to detect motion (for example) The present invention seeks to mitigate the above-mentioned problems. Alternatively or additionally, the present invention seeks to provide an improved security system.
Summary of the Invention
The present invention provides a method of monitoring a location for unauthorised access or activity, comprising the steps of: receiving a video feed, using a first signal protocol, from a video camera arranged to monitor the location; translating the first signal protocol to a second signal protocol, the second signal protocol being native to a mobile phone; and sending the video feed using the second signal protocol to a designated mobile phone; requesting an input from the user of the mobile phone in response to the video feed sent to the mobile phone; and sending the video feed to an additional designated receiving device in response to the input received from the designated mobile phone.
The expression "native to a mobile phone" is being used in this application to mean a signal protocol a mobile phone is arranged to receive in normal use. For example, the second signal protocol may be any 3G signal, including, but not limited to GSM EDGE, UNTS, CDMA2000, HSPA, LTE, DECT and WIMAX. Advantageously, sending the video feed with a native signal protocol means that a mobile phone (for example, any 3G mobile phone) may receive and display the video feed as a one-way video call without requiring any additional modification to be made to the phone. This is advantageous over sending the video signal to a mobile phone via an internet protocol signal (for example), where a mobile phone may require additional software to be installed in order to display the video feed as a video call.
As a skilled person will appreciate, different communication systems use different "native" communication protocols. For example, communications over computer networks often use internet protocol (IP) and mobile phone -3-.
communication often uses 3G protocols (some of which are set out above) . The different communications protocols may not be compatible and one system may not be able to read the communication protocols used by a different system.
The video camera may be activated by a sensor in response to activity detected by said sensor.
The method may include the additional step of transcoding the video feed received from the video camera such that the second signal protocol provides the video feed at the optimum resolution receivable by the designated mobile phone. Advantageously, such a step enables the best quality video feed to be displayed on the designated mobile phone with no additional modification required by the designated mobile phone.
The method includes the step of requesting an input from the user of the designated mobile phone in response to the video feed sent to the mobile phone. The response of the user may be a personal identification number (PIN). The user may supply the input in order to verify whether or not the alarm is genuine and unauthorised access or activity is being undertaken. Involving the designated user in this way significantly reduces the number of false alarms.
The method further comprises the step of sending the video feed to an additional designated receiving device in response to the input received from the designated mobile phone. Details concerning the monitored location may also be sent to the additional designated receiving device in addition to the video feed. For example, the address details of the monitored location and/or the owner details of the monitored location may be sent to the additional designated receiving device along with the video feed. The
I
details may include location specific details, such as when the monitored location includes sensitive or hazardous materials. The additional designated receiving device may be a computer located within a police or security service control room, or another video-enabled mobile device, located for example in a police vehicle or a police officer patrolling near to the location being monitored. The additional designated receiving device may be monitored by a police or security services dispatcher who may be able to immediately direct other police or security service members to that location. The police or security services dispatcher may be able to forward the video feed to a video-enabled mobile device used by the police or security service members responding to the alarm.
The method may further comprise attempting to send the video feed using the second signal protocol to a primary designated mobile phone, and in response to being unable to send the video feed to the primary mobile phone attempting to send the video feed using the second signal protocol to a secondary designated mobile phone. Advantageously, should the primary designated user be unable to receive the video call and verify whether or not the alarm is genuine, a secondary user may receive the video call and verify the alarm.
The present invention also provides a security system comprising a video camera and a server, wherein the video camera is arranged to feed a video signal to the server using a first signal protocol and the server is arranged to translate the video signal into a second signal protocol such that it becomes suitable to be sent to, received, and displayed by a mobile phone with no further translation of the video signal and wherein the server includes the details of a plurality of designated mobile phones and the server is arranged such that, in response to receiving a video feed from the video camera, the server attempts to initiate a one-way video call showing the video feed with at least one of the designated mobile phones and in response to an input to the designated mobile phone to which the one-way video call has been initiated, the server is arranged to send the video signal to the computer or mobile device of an additional user.
Preferably, the security system also comprises a remote sensor unit (RSU), wherein the RSU is arranged to receive the streamed video signal from the video camera as a streamed internet protocol (IP) signal and stream the IP signal to the server. The video camera may be an IP video camera or an analogue video camera associated with a transcoding device arranged to transcode the analogue output to an IP output. Preferably, the IP stream is a real-time transport protocol (RTP) stream. Advantageously, such an arrangement can be conveniently used to send the video signal from the video camera to the server using the internet. As many premises have existing internet connections, it is particularly advantageous to send the video signal to the server in this way. The remote sensor unit may be arranged to send the IP signal to the server via a wireless router sited at the location under surveillance.
The RSU may control the security system. The security system may be turned on and/or off by a user entering a security code/PIN into the RSU. The RSU may be arranged to allow a user to step up and/or change a number of system preferences though a graphical user interface (GUI). The GUI may be a touch screen or keypad directly connected to the RSU. Alternatively the GUI may be a web interface on any computer connecting to the RSU via the Internet.
The video camera may be associated with one or more sensor devices. The sensor device or devices may be arranged to detect the presence of an intruder in the location monitored by the video camera with which the sensor device is associated. The sensor device or devices may be heat or motion sensors or other means of intrusion detection. The video camera may be arranged such that it only records when the sensor device has detected an intruder. The video camera may be arranged such that it only sends the video signal to the RSU when the sensor device has detected an intruder. Preferably, the server is only sent the video signal from the video camera when the sensor device has detected an intruder. A plurality of video cameras may be connected to the RSU. Advantageously, providing a plurality of video cameras connected to the RSU provides greater potential video coverage of the monitored location.
The server may be arranged to convert the IP signal received from the RSU into a 3G signal suitable for sending to and being received by a mobile phone. Advantageously, a 3G signal may be received by any 3G mobile phone without the phone requiring any special modification. As such, the security system may be arranged to establish a video connection over IP using appropriate IP signalling protocol, such as the Session Initiation Protocol (SIP) or other protocol. The connection establishment and maintenance signalling is translated by the server to a mobile network native signalling protocol, for example, SS7 protocol. Once the connection is established, the camera, via the RSU may send a video feed from the video camera to any designated user with a 3G mobile phone. Advantageously, the server is arranged to convert the video feed to adapt to the best quality that the mobile phone can accept when initiating a one-way video call with a designated mobile phone.
Preferably the video feed is sent to a mobile phone as a "live" video feed. It will be appreciated that there may be a partial delay in the feed of the video from the camera to a mobile phone as the video signal is manipulated for sending, but the "live" video feed shows what is occurring at the monitored location in approximately real time.
The server may comprise both a Session Initiation Protocol (SIP) application server and a Media Gateway (MGW) server. The SIP server may be arranged to receive the IP signal from the RSU and pass the signal on to the MGW server. The MGW server may be arranged to translate the IP signal into a 3G signalling in order that the video may be sent to and received by a 3G mobile phone. Advantageously, such an arrangement compensates for the situation when the first signal protocol as used by the RSU is different to the second signal protocol as can be received and displayed by a mobile phone. The server has a greater processing power than a mobile phone handset, which enables the first signal protocol to be translated into the second signal protocol more quickly than if the translation was undertaken by the mobile phone.
The server may be arranged to record the video signal in addition to sending the video signal to a mobile phone.
The video feed may also be recorded on the video camera and/or the RSU. Recording the video signal in such a way may provide an opportunity for a designated user to "rewind" the video feed in order to see the moment at which the camera was activated. Additionally, the stored video footage may be recovered/reviewed at a later date, for example to assist in the prosecution of an offender. The video feed recorded at the server, the video camera, and/or the RSU may be of a higher quality resolution than the video feed sent to the mobile phone.
The server may be arranged to include a database of designated mobile phones to which the server can send the video signal. The users of the designated mobile phones may be known as "keyholders". The server may be arranged to attempt to initiate a video call with a primary keyholder.
If the primary keyholder accepts the video call from the server, the server may request identity verification prior to streaming the video feed to the designated mobile phone of the primary keyholder. The identity verification may be a personal identification number (PIN). Preferably the PIN is the same as the security code used to activate the security system. The server may be arranged such that if the video call to the primary keyholder is not accepted, the server attempts to initiate a video call with the mobile phones of one or more secondary keyholders until the video call is accepted by a keyholder. The server may be arranged such that in response to a command issued from the mobile phone to which the video feed is being sent (for example, the entry of a PIN), the server transmits the video feed to an additional designated receiving device. The server may transmit the video feed to the additional designated receiving device using the first signal protocol. The additional designated receiving device may be a computer located within a police or security control room. The additional designated receiving device may be a computer arranged to receive the video feed as an IP signal. The video feed to the additional designated receiving device may be the same IP signal that has been sent from the RSU to the server. Advantageously, the keyholder that has accepted the video call is able to view the video feed from the video camera and notify the police or security services when a break-in or unauthorised activity is taking place in the monitored location. As the police or security services are only notified when a keyholder has verified that a break-in or unauthorised activity is taking place, there is a greatly reduced chance of the police or security services having to respond to a false alarm.
In an additional embodiment of the invention, the video camera may be activated by a keyholder sending an activation code (for example texting a PII'T) via their designated mobile phone to the server. Alternatively, the video camera may be activated by a keyholder dialling a predetermined telephone number associated with the server. The server through the SIP server and an associated database may be arranged to identify the location/premises associated with the caller number. The server then may communicate with the RSU, which acts to activate the video camera and send the video feed back to the keyholder that sent the activation signal. The video feed may be sent in the way as described above, wherein the server converts the first signal protocol received from the RSU to a second signal protocol which may be received and displayed by a mobile phone, the server then initiating a video call with the keyholder mobile phone.
The video camera may include one or more actuators that may
S -10
be controlled by a keyholder entering commands on their designated mobile phone. The actuators may change the focus or zoom of the video camera, or change the direction in which the camera is pointing. Where a plurality of video cameras are connected to the RSU, the keyholder may be able to change the video camera which is supplying the video feed to the RSU by making appropriate inputs to their mobile phone. The keyholders may also start and/or stop the recording of the video feed on the RSU, video camera and/or server by using simple commands on the mobile phone.
In an additional embodiment of the invention, the security system may be activated in dependence on the location of the designated mobile phone of a keyholder.
Should the designated mobile phone be within a certain distance of the monitored location (such as an office) then the security system may be arranged not to be active.
Should the designated mobile phone of the keyholder move beyond a certain distance from the monitored location, the security system may be activated. The location of the designated mobile phone, in particular the distance from the monitored location, may be determined using Bluetooth <RTM> technology.
An alternative embodiment of the invention provides a method of monitoring a location for unauthorised access or activity, comprising the steps of: sending a video feed from a video camera arranged to monitor the location to a mobile phone, wherein the video feed is translated from a first signal protocol into a second signal protocol, the second signal being native to the mobile phone and sending the video feed to a receiving device at a secondary location in response to an input on the mobile phone.
-11 -A further alternative embodiment of the invention provides a method of monitoring a location for unauthorised access or activity, comprising the steps of: receiving a video feed from a video camera arranged to monitor the location on a mobile phone, wherein the video feed has been translated from a first signal protocol into a second signal protocol, the second signal protocol being native to the mobile phone and providing an input to the mobile phone in order to send the video feed to a receiving device at a secondary location.
It will of course be appreciated that features described in relation to one aspect of the present invention may be incorporated into other aspects of the present invention. For example, the methods of the invention may incorporate any of the features described with reference to the apparatus of the invention and vice versa. Also, features described with reference to one method according to the invention may be incorporated in to one or more other methods according to the invention.
Description of the Drawings
Embodiments of the present invention will now be described by way of example only with reference to the accompanying schematic drawings of which: Figure 1 shows a schematic view of a security system according to a first embodiment of the invention; -12 -Figure 2 shows a process diagram of the steps taken to initiate a video call with a designated mobile phone according to the invention; Figure 3 shows a process diagram of the steps taken to initiate a video call with one of a number of designated mobile phones according to the invention; Figure 4 shows a process diagram of the steps taken to stream the video footage to a police control room according to the invention; and Figure 5 shows a process diagram of the steps taken to activate the video camera using a keyholder mobile phone according to an alternative embodiment of the invention.
Detailed Description
Figure 1 shows a schematic diagram of a security system according to a first embodiment of the invention. A video camera 100 is situated at a location 102 which requires protection. In this case, the camera 100 is located within the living room of a house. The camera 100 includes a motion detector 104 arranged to activate the camera should motion be detected. The camera 100 is arranged to communicate with a remote sensor unit (RStJ) 106. The RSU 106 includes a touch-screen control-panel at which an operator (keyholder) may activate and deactivate the security system with the input of a PIN. The RSU 106 is arranged to communicate with a wireless router 108. The wireless router 108 is arranged to provide the RSU with access to the internet. Via the internet, the RSU 106 is -13 -arranged to communicate with a central server unit 110.
When the security system is activated, and the motion sensor 104 detects movement, the video camera 100 is activated.
The video camera 100 sends a live video feed using an RTP signal to the RSU 106 which begins to record the video feed.
The RSU 106 also sends the video feed to the central server unit 110, also in the form of an RTP signal. The central server unit 110 is made up of a Session Initiation Protocol (SIP) application server 112 which receives the IP signal from the RSU 106. Upon receiving the signal, the SIP application server also begins to record the video feed.
Additionally, the SIP application server includes the details of at least one nominated "keyholder" mobile phone 116. The details of the keyholder mobile phones are set up when the security system is installed and typically they will include a mobile phone of the homeowner. There may be several keyholders, for example, a person that lives in the house and perhaps a neighbour or friend of the homeowner.
In this case, there is a primary keyholder with a mobile phone 116 and a secondary keyholder with a mobile phone 118.
At the same time as recording the video feed, the SIP application server retrieves the details of the primary keyholder and sends these details along with the IP signal to the media gateway (MGW) server 114. The MGW server 114 is arranged to translate the signalling associated with the video feed in the form of an IP signal into a video feed in the form of a 3G signal in order that a mobile phone video call may be made. The MGW server 114 then attempts to initiate a one-way video call with the mobile phone 116 of the primary keyholder via a media gateway server 114. If the primary keyholder accepts the video call, the video feed -14 -from the camera 100 is sent to the mobile phone 116 of the primary keyholder in the form of a video call. As the video feed has been recorded by the SIP application server 112, the primary keyholder may rewind the video footage on their mobile phone 116 to the moment at which the video camera 100 was activated by the motion sensor 104. If the video feed shows a genuine break-in to the monitored location 102 the primary keyholder may enter an "alarm" code or PIN to their mobile phone 116 which is sent back to the central server unit 110 with a single key push. If the primary keyholder does not accept the video call, the video call is transferred to the mobile phone 118 of the secondary keyholder who follows the same sequence of actions. The video call may be cycled through the nominated keyholders until the call is accepted by one of the}eyho1ders Should the one of the keyholders enter the alarm code, the central server unit 110 reacts by sending the video feed to a police control room computer 120. The keyholder details and monitored location 102 details are screened alongside the video feed, allowing swift police response when appropriate. In this case, the video feed is sent from the SIP application server 112 to the police control room computer 120 as a RTP signal. There is no need to translate the signal from the RTP signal when it is being sent to a
suitable computer.
Should the keyholder review the video feed and see that security has not been comprised, for example, it is a neighbour feeding the cat, they may simply end the video call without entering the alarm code. The video feed will not be sent to the police control room computer 120 and a false alarm will be avoided. Alternatively, the keyholder
I
-15 -may enter a "false alarm" code or PIN to their mobile phone 116 which is sent to the central server unit 110. This then may be sent to the RSU 106 via the wireless router 108 in order to deactivate the camera 100.
The arrangement of figure 1 may be used in an alternative, or additional way to that described above. For example, a keyholder may dial a predetermined phone number or enter a code into their mobile phone 116, 118, and send the code to the central server 110. The central server 110 may establish a connection to the RSU 106 via the Internet and the wireless router 108. Upon receiving the code, the RSU turns on the video camera 100 and the resulting video feed may be sent back to the mobile phone 116, 118 that sent the code in the same way as described above.
In an alternative arrangement, the security system may be activated in dependence on the proximity of a keyholder to a particular location rather than through entry of a PIN at the RSU. A proximity detector 122 may be associated with the RSU and be arranged to monitor the proximity of a mobile phone of a keyholder to the proximity detector 122. The distance may be monitored using Bluetooth <RTM> technology.
The RSU may be arranged to sense the proximity of the designated mobile phone. If the phone is within a predefined distance from the RSU, the motion detector (or other suitable sensor devices) that is associated with the video camera may be deactivated. If the phone is further than a predefined distance from the RSU, the system may be activated automatically and, on detection of activity by the motion sensor, will operate to stream the video to the designated mobile phone as described above.
-16 -Figure 2 shows a process diagrani detailing the basic steps undertaken when the video camera 100 begins recording and an attempt is made to initiate a video call to a designated mobile phone 116. The figure uses a combination of SIP signalling and functional block description. The RSU 106, via the wireless router 108 sends an INVITE command to the SIP application server 112. The SIP application server responds with a "100 Trying" signal. The database in the SIP application server is reviewed in order to obtain the details of the keyholder mobile phone 116 to which the video call should be directed. The SIP application server sends an INVITE command to the MGW server. The MGW server responds to the SIP application server with a "100 trying" signal. The NGW server sends a SETUP command to the mobile phone 116, and CALL PROC and ALERTING commands are sent from the mobile phone 116 to the MGW server. The MGW server sends a "180 Ringing" signal to the SIP application server, which sends a "180 Ringing" signal to the RSU. When the keyholder receives the call the mobile phone 116 sends a CONNECT command to the MGW server, and the MGW server sends a "200 OK" signal to the SIP application server and the SIP application server sends a "200 OK" signal to the RSU. ACK commands are sent from the RSU to the SIP application server and from the SIP application server to the MGW server. The MGW server sends a CONNECT ACK command to the mobile phone 116 and a reliable signal from the RSU to the mobile phone is set up. Once the signal from the RSU to the mobile phone has been set up, the video feed from the video camera 100 to the mobile phone 116 begins. As can be seen, the one-way video signal is sent on RTP from the RSU to the MGW server.
The MGW server translates the signal into a 3G signal, and -17 -sends the 3G signal on to the mobile phone 116. When the mobile phone user wishes to end the call, they push the relevant button on their phone which results in a DISCONNECT command being sent to the MGW server. BYE commands are sent from MGW server to the SIP server, and from the SIP server to the RSU. "200 OK" responses are sent from the RSU to the SIP application server, and from the SIP application server to the MGW server. A RELEASE command is sent from the MGW server to the mobile phone and the release is completed and the call ended.
Figure 3 shows a process diagram of the steps taken when trying to contact one out of a plurality of keyholder mobile phones. The initial calling procedure is the same as described with reference to figure 2. However, there is a time limited "180 Ringing" period after which the SIP application server attempts to initiate a phone call with an alternative keyholder mobile phone. The database includes details of these mobile phones together with the order in which to contact them. The SIP application server cycles through the keyholder mobile phones until a call is accepted, after which the video call is completed as described with reference to figure 2.
Figure 4 shows a process diagram of the steps taken when a video call is initiated and a keyholder verifies the alarm and sends the video feed onto a police control room computer. The steps taken up to the 3G video feed being sent to the mobile phone are as described with reference to figure 2. When the keyholder receives the video footage of their mobile phone 116 they are requested to enter a four digit PIN to verify that a genuine unauthorised act is being undertaken. If this is the case, the keyholder enters the -18 -four digit PIN and sends it to the MGW server. The MGW server sends an INFO command to the SIP application server including the PIN. The database of the SIP server is consulted in order to check whether the correct PIN has been entered. If an incorrect PIN is entered, the SIP server invokes the NGW server to display "Incorrect PIN" on the video feed to the mobile phone, and the video feed is sent via 3G to the mobile phone. The keyholder may then attempt to enter the correct PIN once more. When the correct PIN is entered, the SIP application server invokes the MGW server to display "Correct PIN" on the video feed to the mobile phone, and the video feed is sent via 3G to the mobile phone. Additionally, the SIP server sends an INFO command to the RSU to start streaming the video feed to the police monitoring centre computer. The RSU sends an INVITE command to the SIP application server including the necessary details to contact the nearest police monitoring centre.
The SIP application server then sends an INVITE command to the police monitoring centre and a call is set up in the usual way. Once the call has been set up, the RSU begins to stream the one-way video over RTP to the police monitoring centre computer. Additionally, the SIP application server consults the database and provides the address details of the location being monitored which is displayed on the computer alongside the video. This allows a prompt response to the alarm call.
Figure 5 shows a process diagram of an alternative embodiment of the invention where the video camera is turned on by an input at the keyholder mobile phone and the video streaming to the mobile phone follows. As the call procedure has already been described in detail, the skilled -19 -person will understand the procedure as illustrated in figure 5 without requiring any further explanation.
Whilst the present invention has been described and illustrated with reference to particular embodiments, it will be appreciated by those of ordinary skill in the art that the invention lends itself to many different variations not specifically illustrated herein.
Where in the foregoing description, integers or
elements are mentioned which have known, obvious or foreseeable equivalents, then such equivalents are herein incorporated as if individually set forth. Reference should be made to the claims for determining the true scope of the present invention, which should be construed so as to encompass any such equivalents. It will also be appreciated by the reader that integers or features of the invention that are described as preferable, advantageous, convenient or the like are optional and do not limit the scope of the independent claims. Noreover, it is to be understood that such optional integers or features, whilst of possible benefit in some embodiments of the invention, may not be * desirable, and may therefore be absent, in other embodiments.

Claims (18)

  1. -20 -Claims 1. A method of monitoring a location for unauthorised access or activity, comprising the steps of: receiving a video feed, using a first signal protocol, from a video camera arranged to monitor the location translating the first signal protocol to a second signal protocol, the second signal protocol being native to a mobile phone; and sending the video feed using the second signal protocol to a designated mobile phone; requesting an input from the user of the designated mobile phone in response to the video feed sent to the mobile phone; and sending the video feed to an additional designated receiving device in response to the input received from the designated mobile phone.
  2. 2. A method as claimed in claim 1, wherein the video camera is activated by a sensor in response to activity detected by said sensor.
  3. 3. A method as claimed in claim 1 or claim 2, further comprising the step of transcoding the video feed received from the video camera such that the second signal protocol provides the video feed at the optimum resolution receivable by the designated mobile phone.
  4. 4. A method as claimed in any preceding claim including sending details concerning the monitored location to theS-21 -additional designated receiving device in addition to the video feed.
  5. 5. A method as claimed in any preceding claim wherein the additional designated receiving device is a computer located within a police or security service control room.
  6. 6. A method as claimed in any preceding claim including attempting to send the video feed using the second signal protocol to a primary designated mobile phone, and in response to being unable to send the video feed to the primary mobile phone attempting to send the video feed using the second signal protocol to a secondary designated mobile phone.
  7. 7. A security system comprising a video camera and a server, wherein the video camera is arranged to feed a video signal to the server using a first signal protocol and the server is arranged to translate the video signal into a second signal protocol such that the signal is suitable for being sent to, received, and displayed by a mobile phone with no further translation of the video signal being undertaken; and wherein the server includes the details of a plurality of designated mobile phones and the server is arranged such that, in response to receiving a video feed from the video camera, the server attempts to initiate a one-way video call showing the video feed with at least one of the designated mobile phones and in response to an input to the designated mobile phone to which the one-way video call has been -22 -initiated, the server is arranged to send the video signal to the computer or mobile device of an additional user.
  8. 8. A security system as claimed in claim 7, further comprising a remote sensor unit (RSU), wherein the RSU is arranged to receive the video signal from the video camera and send the signal to the server.
  9. 9. A security system as claimed in claim 7 or claim 8, wherein the first signal protocol is an internet protocol (IP) signal.
  10. 10. A security system as claimed in any of claims 7 to 9, wherein the first signal protocol is a real-time transport protocol (RTP) signal.
  11. 11. A security system as claimed in of claims 7 to 10, further comprising a wireless router arranged to facilitate the video signal output of the video camera being sent to the server.
  12. 12. A security system as claimed in any of claims 7 to 11, further comprising a sensor device associated with the video camera, the sensor device being arranged to activate the video camera should the sensor unit detect a stimulus.
  13. 13. A security system as claimed in any of claims 7 to 12, wherein the server comprises a Session Initiation Protocol (SIP) application server arranged to receive the video signal in the form of an IP video signal, and a Media Gateway (MGW) server arranged to translate the IP signalS-23 -into a 3G video signal suitable for being sent to and received by a mobile phone.
  14. 14. A security system as claimed in any of claims 7 to 13, wherein the additional user is a police or security service control room.
  15. 15. A server arranged for use in a security system as claimed in any of claims 7 to 14.
  16. 16. A kit of parts comprising a video camera and a RSU, suitable for use in a security system as claimed in any of claims 7 to 15.
  17. 17. A method of monitoring a location for unauthorised access or activity, comprising the steps of: sending a video feed from a video camera arranged to monitor the location to a mobile phone, wherein the video feed is translated from a first signal protocol into a second signal protocol, the second signal being native to the mobile phone and sending the video feed to a receiving device at a secondary location in response to an input on the mobile phone.
  18. 18. A method of monitoring a location for unauthorised access or activity, comprising the steps of: receiving a video feed from a video camera arranged to monitor the location on a mobile phone, wherein the video feed has been translated from a first signal protocol into a second signal protocol, the second signal protocol being native to the mobile phone and providing an input to the mobile phone in -24 -order to send the video feed to a receiving device at a secondary location.
GB1009435.7A 2009-11-20 2010-06-04 Security system Expired - Fee Related GB2475578B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GBGB0920395.1A GB0920395D0 (en) 2009-11-20 2009-11-20 Security system

Publications (3)

Publication Number Publication Date
GB201009435D0 GB201009435D0 (en) 2010-07-21
GB2475578A true GB2475578A (en) 2011-05-25
GB2475578B GB2475578B (en) 2014-02-26

Family

ID=41565644

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB0920395.1A Ceased GB0920395D0 (en) 2009-11-20 2009-11-20 Security system
GB1009435.7A Expired - Fee Related GB2475578B (en) 2009-11-20 2010-06-04 Security system

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB0920395.1A Ceased GB0920395D0 (en) 2009-11-20 2009-11-20 Security system

Country Status (1)

Country Link
GB (2) GB0920395D0 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9515769B2 (en) 2013-03-15 2016-12-06 Src, Inc. Methods and systems for exploiting sensors of opportunity
CN110072156A (en) * 2018-01-24 2019-07-30 北京视联动力国际信息技术有限公司 A kind of data processing method and device of view networking

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959643A (en) * 2016-06-17 2016-09-21 乐视控股(北京)有限公司 Monitoring method, device and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040080410A1 (en) * 2002-10-25 2004-04-29 Tung-Hsing Pan Antitheft system with signals transmitted by mobile phone network
US20040252197A1 (en) * 2003-05-05 2004-12-16 News Iq Inc. Mobile device management system
US20050128072A1 (en) * 2003-12-16 2005-06-16 Li Shih H. Security system for a building
EP1905225A1 (en) * 2005-05-13 2008-04-02 Capture-Cam IP Pty Ltd Method and system for transmitting video to a mobile terminal
US20080111684A1 (en) * 2006-11-14 2008-05-15 Zinser Duke W Security System and Method for Use of Same
US20080129498A1 (en) * 2006-12-01 2008-06-05 Embarq Holdings Company, Llc System and method for receiving security content from wireless cameras
EP1958173A1 (en) * 2005-12-06 2008-08-20 Mihail Kostaridakis Deterrent - preventive security system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040080410A1 (en) * 2002-10-25 2004-04-29 Tung-Hsing Pan Antitheft system with signals transmitted by mobile phone network
US20040252197A1 (en) * 2003-05-05 2004-12-16 News Iq Inc. Mobile device management system
US20050128072A1 (en) * 2003-12-16 2005-06-16 Li Shih H. Security system for a building
EP1905225A1 (en) * 2005-05-13 2008-04-02 Capture-Cam IP Pty Ltd Method and system for transmitting video to a mobile terminal
EP1958173A1 (en) * 2005-12-06 2008-08-20 Mihail Kostaridakis Deterrent - preventive security system
US20080111684A1 (en) * 2006-11-14 2008-05-15 Zinser Duke W Security System and Method for Use of Same
US20080129498A1 (en) * 2006-12-01 2008-06-05 Embarq Holdings Company, Llc System and method for receiving security content from wireless cameras

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9515769B2 (en) 2013-03-15 2016-12-06 Src, Inc. Methods and systems for exploiting sensors of opportunity
CN110072156A (en) * 2018-01-24 2019-07-30 北京视联动力国际信息技术有限公司 A kind of data processing method and device of view networking

Also Published As

Publication number Publication date
GB0920395D0 (en) 2010-01-06
GB2475578B (en) 2014-02-26
GB201009435D0 (en) 2010-07-21

Similar Documents

Publication Publication Date Title
US11475745B2 (en) Self-contained security system including voice and video calls via the internet
US20140293046A1 (en) Web based security system
US20060152594A1 (en) Mobile communication device having call-triggered image taking and sending capability and method of operation thereof
US8081070B2 (en) Mobile security monitoring method and system and an alarm security node in the system
US20140052775A1 (en) Forwarding information to designated user terminal
JP2000235688A (en) Controlling method for personal security, its system and storage medium recording its control program
JP3876900B2 (en) Remote monitoring system and method
KR100857073B1 (en) Realtime remote monitoring system
KR20150041939A (en) A door monitoring system using real-time event detection and a method thereof
KR20020000473A (en) Safe guarding system using internet
GB2475578A (en) Surveillance system where captured security video is transmitted to owner&#39;s mobile phone
KR20180004846A (en) Indoor and outdoor monitoring device using movie motion detection of wallpad and its method
WO2008077343A1 (en) A security monitor and a method and system to realize the security monitor
KR20160060018A (en) Ip/sip/ims camera, private security system with ip/sip/ims camera and control method thereof
KR20140129762A (en) Ip/sip/ims camera, private security system with ip/sip/ims camera and control method thereof
JP2007201876A (en) Camera system and network camera
KR101124455B1 (en) Bi-diretional system
EP2153614B1 (en) System and method for exchanging data between a first data processing system and a second data processing system via an at least partly public communication network
JP4240218B2 (en) Monitoring system, monitoring notification device, and communication method in monitoring system
GB2416897A (en) A Remote Monitoring System
KR20100043579A (en) Method for providing security service by using internet protocol television and security service system thereof
KR101458365B1 (en) Video recoder voice alarm system and operating method thereof
KR101636933B1 (en) Automatic Safety Setting and Clearing System of Safety Area by Using Sensor System with Wireless Communication Module and Mobile Terminal
KR200203248Y1 (en) Safe guarding system using internet
KR101704466B1 (en) Crime prevention controlling system using blackbox

Legal Events

Date Code Title Description
PCNP Patent ceased through non-payment of renewal fee

Effective date: 20180604