WO2010009361A1 - Système de surveillance commandé par des événements à confidentialité améliorée et procédés associés - Google Patents

Système de surveillance commandé par des événements à confidentialité améliorée et procédés associés Download PDF

Info

Publication number
WO2010009361A1
WO2010009361A1 PCT/US2009/050927 US2009050927W WO2010009361A1 WO 2010009361 A1 WO2010009361 A1 WO 2010009361A1 US 2009050927 W US2009050927 W US 2009050927W WO 2010009361 A1 WO2010009361 A1 WO 2010009361A1
Authority
WO
WIPO (PCT)
Prior art keywords
charge
portal
image data
data
camera
Prior art date
Application number
PCT/US2009/050927
Other languages
English (en)
Inventor
L. Jean Camp
John F. Duncan
Original Assignee
Indiana University Research And Technology Corporation
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Indiana University Research And Technology Corporation filed Critical Indiana University Research And Technology Corporation
Publication of WO2010009361A1 publication Critical patent/WO2010009361A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/181Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a plurality of remote sources
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0438Sensor means for detecting
    • G08B21/0476Cameras to detect unsafe condition, e.g. video cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/02Alarms for ensuring the safety of persons
    • G08B21/04Alarms for ensuring the safety of persons responsive to non-activity, e.g. of elderly persons
    • G08B21/0438Sensor means for detecting
    • G08B21/0492Sensor dual technology, i.e. two or more technologies collaborate to extract unsafe condition, e.g. video tracking and RFID tracking

Definitions

  • Disclosed embodiments are directed to a system and methodologies that are implemented using ubiquitous computing, which can be used to improve the care and quality of life for elderly persons ("the elderly") or other individuals requiring or benefiting from some level of care giving while protecting privacy and improving the ease of use for care givers.
  • the elderly represent a vulnerable sub-population that constitutes an ever increasing segment of the world's total population. As of 2006, 37.3 million Americans are among the elderly; this figure is predicted to double by 2030. Of these elderly, 30.3% live alone; of those that live alone, the majority are women.
  • information security is a difficult problem that is rarely a focus for technology that is consumer targeted.
  • information security is a particular problem in instances when the application distributor is not the individual who is at risk of security compromises.
  • Camp et al. (Camp, L. J., Shankar, K., Connelly, K.: Systematic Design for Privacy in Ubicomp (2006)) describe the application of an approach for dealing with this problem, referred to as "value- sensitive design.” By producing a values statement to accompany a technology, adopters of that technology are able to make more informed choices, and system designers are encouraged to put more thought into development. Camp et al. suggest targeting data collection based on risk profiles, filtering data before storing it to minimize information leakage, and taking differing age groups' requirements into account during design.
  • Camp et al. also note that the Code of Fair Information practice forms the basis for evaluating the privacy preservation of such ubiquitous computing systems.
  • Correction can be particularly problematic in the case of eldercare, as patients with increasing dementia may be motivated to alter monitored data to conceal this, or may simply erase monitored data by mistake. Consent is important when considering which environments can be monitored; the elderly may have substantially different opinions than teens or middle-aged users, and require age-specific monitoring profiles. Some of these problems can be mitigated by providing adjustable levels of sensitivity, but again, the elderly may be motivated to hide troubling data by adjusting these levels.
  • Froomkin Froomkin, A. M.: The Death of Privacy?, Stanford Law Review 52,
  • Jiang advocates the philosophy of Lawrence Lessig, (i.e., users should exert market pressure and social pressure on designers and producers of systems to ensure that systems are privacy- aware).
  • Jiang advocates a principle of Minimum Asymmetry, in which data flow from users being monitored to those monitoring them is minimized, while feedback from the use of the system by data collectors produces increased data flow to those being monitored.
  • Jiang identifies data persistence, data accuracy, and data confidence (sensor -A- granularity, for example) as the three most important properties for privacy-aware systems to consider.
  • Hong et al. (Hong, J., Ng, J., Lederer, S., Landay, J.: Privacy risk models for designing privacy- sensitive ubiquitous computing systems, Conference on Designing Interactive Systems, 91-100 (2004)) provide an excellent overview of the design issues facing developers of privacy- aware ubiquitous computing systems. In particular, their focus on the development of privacy risk models that provide a reasonable level of privacy protection for the application's target users is extremely insightful, as are the questions Hong et al. propose for privacy risk analysis and social context awareness.
  • Camp et al. also discusses the implications of ubiquitous computing systems in eldercare, noting that the elderly are assured of losing substantial privacy if they move into a nursing home or shared assisted living space. For this reason, they are often more willing to assume the unknown privacy risks of many current ubiquitous computing systems, which often do not permit the elderly or their caregivers to conduct a detailed analysis of their designs. Caregivers especially face a difficult choice in this area; while they may initially rely on input from their charges, the nature of many of their charge's disabilities means that eventually the decision to move the elderly individual into a nursing home may be inevitable. [0019] Ho et al. (Ho, L., Moh, M., Walker, Z., Hamada, T., Su, C: A Prototype on
  • RFID and Sensor Networks for Elder Healthcare Progress Report, Proceedings of the ACM SIGCOMM workshop on Experimental Approaches to Wireless Network Design and Analysis, 70-75 (2005)) discuss a prototype system they developed to assist the elderly in taking correct dosages of medications.
  • This system makes use of a common tracking technology, Radio Frequency IDentification (RFID) tags.
  • RFID Radio Frequency IDentification
  • many systems that use RFID fail to consider the privacy implications of this technology, which often enables unwanted tracking due to RFID tags lacking the computational capability to support a mechanism for access control.
  • Ho et al. address this problem by primarily proposing to tag medications within a home and having elderly individuals wear a removable RFID tagged badge.
  • RFID tags also have small transmission ranges; therefore, the reasoning is that the system is "privacy sensitive" because an assailant able to read the signals would have to be inside a residence. Therefore, such an assailant would be able to access the medication and associated information anyway.
  • this assumption fails in two important ways.
  • an elderly individual may forget to interact safely with their RFID tagged badges; for example, by forgetting to don the badge, they may defeat the system's purpose.
  • an elderly individual may actually expose themselves to more security risk by RFID tracking by a third party.
  • This issue is of a particular problem in association with medicine containers. Ho et al. do not mention the way in which identifiers are assigned to medications; however, if there is some standard way of doing so, a security risk exists. If these containers are disposed of, the RFID tags on them would also need to be destroyed. Thus, an assailant need only drive by an individual's trash receptacle with the proper equipment to obtain a profile of the medications they are taking.
  • the Floerkemeier et al. system is designed to send reminders and alerts for conditions such as lapses in medication regimes or medication recalls to a patient's mobile phone.
  • the elderly may not possess or make much use of such mobile phones, but might benefit from this information being sent to a location they are more likely to access, e.g., a television.
  • Their caregivers on the other hand, would more likely benefit from receiving duplicates of these alerts transmitted to their mobile phones; moreover, some of these alerts may only be appropriate for caregivers, such as when the elderly individual suffers from cognitive impairment to such a degree that they may not be able to take proper action for an alert such as a recall.
  • Dishman discusses several systems in development by Intel's Proactive Health lab that implement the concept of "Aging in Place.” Citing the increased caregiver load (e.g., one third of American adults serve as caregivers), Dishman also discusses several solutions to help manage this difficulty. Dishman also cites the need to remotely be notified of important events as the primary caregiver desires. Dishman discusses systems designed to monitor resource usage with RFID tags, and to prompt the elderly to participate in these tasks if they forget to do so themselves. Aside from medication dispensing, Dishman also suggests simple tasks such as obtaining proper hydration or making phone calls to relatives and friends.
  • Xanboo is deficient in a number of aspects for the purpose of providing a solution for eldercare monitoring.
  • Xanboo's system employs live video streams, which are made available to anyone with Internet access and the correct password. While this grants the ability to have more than one person share the burden of monitoring, this results in all the security weaknesses traditionally associated with password protected web sites; moreover, 24-hour monitoring of a charge requires that a caregiver be proactive (i.e., requiring constant monitoring of video feeds) rather than reactive.
  • the video streams appear to be stored for unlimited duration on a central web server, creating a potential single point of security failure.
  • Xanboo's video streams are sent without encryption or other protection to the site.
  • Xanboo also charges its users with maintaining their own security policy, and provides no suggestions for recovering from password compromise other than to change the current password.
  • system designs such as that employed by Xanboo are particularly lacking for the purposes of eldercare.
  • a monitoring system and methodologies are designed for use in conjunction with the care of elderly individuals.
  • a monitoring system and methodologies may be configured to be event-driven in nature and focus on protecting user privacy.
  • the monitoring system may be implemented using ubiquitous computing and the system may be hardened against privacy invasion issues.
  • the monitoring system and methodologies may be event-driven and may be configured to reduce cognitive load required for caregivers to utilize the system. As a result, such a system and methodologies may enable a caregiver to react more effectively than with passive monitoring technologies such as traditional security cameras.
  • FIGURE 1 illustrates an environment wherein embodiments of the invention may be utilized and illustrating various components utilized in the system.
  • FIGURE 2 illustrates an operational flow charge illustrating functional operations performed by various monitoring system components and other components with which the system components communicate to provide various points of utility of the disclosed embodiments.
  • a system and methodologies are provided that utilize signals from one or more sensors located at a residence premises to identify actual or potential safety or security problems while minimizing data leakage to the outside of the residence. Additionally, still images (image data) are captured by one or more cameras triggered by the one or more sensors. This image data is then transmitted to a remote device of a caregiver's choice, such as a mobile phone, etc. Still images may be used rather than live video because streaming live video may create more privacy risks for an elderly charge.
  • Transmission of the image data to a caregiver's device is performed rather than simply displaying events on a monitoring station such as a television within a charge's residence itself because the latter makes no provision for ensuring that a caregiver is made aware of the triggering event(s) in a timely manner.
  • a privacy-enhanced, event-driven monitoring system and methodologies are provided. This system and these methodologies may be implemented using ubiquitous computing, which can be used to improve the care and quality of life for the elderly without sacrificing their privacy. Therefore, in accordance with at least one embodiment, a monitoring system and associated methodologies are provided to assist in monitoring and ensuring the safety and security of the elderly, in particular, those elderly individuals living alone and potentially having some debilitating condition.
  • the burden of care giving may be conceptually thought of as being composed of two main areas: "work load,” which pertains to physical tasks associated with care giving including cooking, cleaning, etc.; and “cognitive load,” which pertains to the continuous or periodic monitoring of the elderly to ensure the health, happiness and safety of the elderly. While care giving workload can be outsourced to trusted third parties, the same is less true and may be perceived as less acceptable to caregivers. By decreasing the cognitive load on caregivers, caregivers are enabled to make more efficient use of their time and provide a better quality of care.
  • the work load associated with care giving can be shifted to some extent or another to qualified third parties other than a primary caregiver.
  • an adult daughter is the primary caregiver for her elderly (and potentially infirmed) father
  • she can engage a third party to assist with cleaning of her father' s residence, shopping for groceries for her father and/or providing other house keeping services for her father.
  • it is often more difficult and less acceptable to shift the cognitive load associated with care giving; this is because, for example, the ability to determine the physical and mental health status of the father may be more difficult to gauge by a third party regardless of their professional training.
  • an elderly charge e.g., in this example, the father
  • a mental health condition that provides moments of lucidity and moments of dementia.
  • an elderly charge recognizes that they are experiencing periods of mental or physical impairment and is actively hiding evidence of this impairment because of shame or fear.
  • a primary caregiver that has known the charge for an extended period of time or in a familiar way is capable of accurately determining a charge's true state of wellbeing.
  • a caregiver's other daily responsibilities and obligations may often require that the caregiver be physically apart from the charge (for example, due to work or familial obligations).
  • a monitoring system and associated methodologies are provided that may utilize what has been termed as "ubiquitous computing.”
  • a ubiquitous computing implementation may be designed to be placed inside an elderly individual's place of residence (e.g., home, house, apartment, etc.) and be configured to monitor activity across one or more portals, most likely the front or back door for the residence.
  • opening such a door may trigger a sensor module of the system, e.g., to trigger operation of one or more pre-positioned cameras that capture image data showing images of both sides of the door.
  • This provision and operation may be designed to enable capture of the most salient visual features associated with this event, e.g., the physical status of -lithe residence occupant (clothing and health) and the identity of the individual on the outside of the residence.
  • This visual image data may then be transmitted via message attachments (e.g., using electronic mail or one of various text message protocols that support transmission of images and other data, such as Enhanced Short Messaging Service (EMS) or Multi-media Messaging Service (MMS) protocols; this capability is also known generally as "picture messaging" to a pre-designated device.
  • message attachments e.g., using electronic mail or one of various text message protocols that support transmission of images and other data, such as Enhanced Short Messaging Service (EMS) or Multi-media Messaging Service (MMS) protocols; this capability is also known generally as "picture messaging
  • the image data may be transmitted along with data indicating a time and date that the image data was acquired. Additionally, depending on the configuration of the monitoring system, the image data may also be transmitted with data indicating the identity of the charge who's residence is being monitored ("Mr. Russell Parks) and/or the geographic location of that residence (e.g., "Apartment 4B").
  • FIGURE 1 illustrates one example of a system 100 designed in accordance with at least one disclosed embodiment. It should be appreciated that the illustration of FIG. 1 depicts the system 100 from a functional perspective and, therefore, the number of components illustrated is not determinative of the actual implementation. As illustrated in FIG.
  • a monitoring management module 110 is configured to be coupled to both a sensor 120 and one or more cameras including camera A 130 and camera B 140.
  • These cameras 130, 140 may be positioned inside and outside a residence portal 150 so as to provide image data showing images of the outside and inside of the residence portal 150.
  • the portal 150 may be, for example, a front or back door to a residence such as a free standing house, townhouse, apartment or other residence inhabited by one or more elderly individuals.
  • the camera A 130 may be positioned within the residence and angled such that it provides images of the view seen when an individual is looking outside the portal 150.
  • the camera B 140 may be positioned outside the residence and angled such that it provides images of the view seen when an individual is looking inside the portal 150.
  • Such an implementation may have particular utility when the security of the camber B 140 is in question because, for example, an image associated with the outside of the portal 150 may provide evidence or an indication of an assailant attempting to breach the residence or harm an occupant of the resident; by positioning the camera that provides images of such an assailant inside the residence, there is, potentially, an increased level of security and decreased risk of tampering with that camera and/or image data.
  • the camera B 140 may be positioned to provide the outside view of the portal 150 and the camera A 130 may be positioned to provide the inside view of the portal 150; such an implementation may be acceptable when, for example, security of the camera B 140 located on the outside of the residence portal is not a significant concern and such positioning serves other purposes.
  • the monitoring management module 110, the sensor 120 and the cameras 130, 140 may be coupled together so as to enable communication of control instructions and acquired image data there between. Therefore, although the illustrated connections between those components do not illustrate bidirectional communication, it should be understood that bidirectional communication between these components may be possible.
  • Sensor 120 may be implemented in various forms and in alternative designs including for example, a sensor 120 coupled to a doorbell associated with the portal 150 such that, when the door bell is rung by an individual on the outside of the portal 150, the cameras 130, 140 are controlled to begin acquisition of image data.
  • the sensor 120 may be implemented as a contact sensor configured and positioned to sense when the portal 150 is open, e.g., when the door in the doorway has been opened to provide access to the residence.
  • Such an implementation for the sensor 120 may have particular utility in that the sensor 120 can acquire image data when an individual is entering or exiting the portal 150 as well as acquiring image data when the door is not fully closed (which would potentially pose a security threat to the resident who may not be aware of this status); thus, such an implementation may enable a caregiver to receive image data showing no individual on the exterior or interior of the portal 150, thereby indicating a need for someone (for example, the elderly charge) to check the door to ensure that it is properly closed.
  • the monitoring management module 110 may be implemented in a variety of different configurations. Therefore, the monitoring management module 110 may be, for example, a software application running on a general or special purpose computer and configured to provide instructions to the components 120-150 to provide at least some of the operations illustrated in FIGURE 2.
  • the monitoring management module 110 may be implemented on a personal computer present in the residence or on the premises of the residence (i.e., the land associated with the residence, for example, when more than one residence is present in an assisted living facility or senior living community); in such an implementation the module 110 could be software running on a desk top computer, a Personal Data Assistant (PDA) or mobile phone.
  • PDA Personal Data Assistant
  • image data may be received from the one or more cameras 130, 140 and transmitted to a recipient device 170 via the communication networks 160 without the need for a modem and hardwired connections; this is because the mobile device may optionally be configured to provide communication without hardwired connections.
  • the monitoring management module 110 may be implemented in software code running on one or more servers coupled to the components 120-140 via one or more networks that may include two or more computers that are linked in order to share resources (such as memory, interfaces, or peripherals), exchange files, or allow electronic communications via cables, telephone lines, radio waves, satellites, or infrared light beams linking the computers.
  • the monitoring management module 110 may be directly coupled to the cameras 130, 140, sensor 120 via hardwired connections or via a localized wireless network that enables those components to communicate over the network.
  • Such implementations may have particular benefit, for example, when the monitoring management module 110 is implemented on one or more servers and is used to control monitoring of a number of residences in a particular area, e.g., in an assisted living or senior living community.
  • one monitoring management module 110 may be configured to manage monitoring of many residence portals simultaneously by, for example, assigning IP addresses to the coupled components (e.g., sensors 120 and cameras 130, 140) for each residence and maintaining or having access to a database that associated the IP addresses with particular residences and, in turn, one or more recipient devices 170 to receive image data for the particular residences.
  • the coupled components e.g., sensors 120 and cameras 130, 140
  • the monitoring management module 110 may be implemented using one or more Application Specific Integrated Circuits (ASICs) to provide operational functionality (see FIG. 2) and other hardware including, for example, a modem or similar communication device to gather image data from the camera(s) 130, 140 and transmit the image data to communication network(s) 160.
  • ASICs Application Specific Integrated Circuits
  • the monitoring management module may be implemented using a Central Processing Unit (CPU) and circuit board (e.g., commercially available FOX Board LX832) and a GSM/MMS module (e.g., commercially available FOXGM expansion board with Telit GM862-QUAD Modem) as well as other conventionally available parts.
  • CPU Central Processing Unit
  • MMS GSM/MMS module
  • the monitoring management module 110 may be implemented using one or more servers coupled to cameras and sensors via a hub.
  • the monitoring management module 110 may be implemented using a PDA or mobile device.
  • the monitoring management module 110 may be implemented via a combination of hardware and software provided in a function specific configuration specifically designed to control operation of the cameras 130, 140 in response to stimulus from one or more sensors 120 and output the image data provided by those cameras 130, 140 to one or more communication networks 160 for subsequent delivery to one or more recipient devices.
  • image data transmission may occur only in a single direction, i.e., from the monitoring management module 110 to the device 170 via the communication network(s). Therefore, although FIG. 1 illustrated that there is bidirectional communication between the monitoring management module 110 and the communication network(s) 160, the downstream communication (i.e., from the communication network(s) 160 to the monitoring management module 110) may consist of only signaling communication that enables the transmission of the image data from the monitoring management module 110. Optionally, the downstream communication may also include remote configuration data transmission generated by the device 170 or from an entity associated with the provisioning of the monitoring system 100.
  • Such an option to enable remote configuration data may, in at least one disclosed embodiment, enable a caregiver or an entity supporting the monitoring system 100 to remotely program certain parameters associated with the monitoring, e.g., pausing monitoring for a period of time when, for example, the charge has been temporarily transferred to an interim care facility, altering lighting or image capture settings based on changing environmental conditions near the portal 150, performing remote diagnostic tests on components of the system to eliminate or reduce the need for a service call to the charge's residence, etc.
  • the capability to remotely manage system parameters may create associated security risks discussed below.
  • the image data may be transmitted to the recipient device(s) 170 in one or more different formats including one or more picture messaging (sometimes referred to as "photo messaging").
  • the communication network(s) 160 used to deliver the image data transmitted from the monitoring management module 110 to the recipient device(s) 170 may be of various types and are not central to the utility of the disclosed embodiments. Therefore, it should be appreciated that the communication network(s) 160 may be comprised of one or more private and public communication networks including but not limited to the Internet, one or more mobile communication networks, and/or one or more Plain Old Telephone Service (POTS) or landline networks (for example, to provide long distance transmission of image data via originating mobile networks).
  • POTS Plain Old Telephone Service
  • the communication network(s) 160 need simply be configured to enable transmission of image data to a recipient device 170 in one or more formats and using one or more different transmission protocols.
  • the recipient device 170 that receives image data (e.g., one or more visual images) in response to a triggering event may be, for example, a mobile communication device, e.g., a mobile phone, smart phone, personal data assistant, a computer terminal, etc.
  • a guardian or caretaker can monitor this device 170 to ensure the safety and wellbeing of elderly individual, e.g., that the elderly individual has not left the residence in a vulnerable state, had an encounter with a known threat or been approached by an unknown party.
  • the recipient device 170 may be a personal computer or the like, accessible to a caregiver.
  • the configuration of the event-driven system is such that utility is provided by the implementation of what may be thought of as an "active” or “reactive” event-driven monitoring system, wherein a monitoring individual is prompted to respond to transmitted data; this differs significantly from what may be considered to be a "passive" monitoring system.
  • passive monitoring systems are conventionally known and provide a continuous feed of data to a monitoring individual or organization; in such system configurations, the monitoring individual or organization is relied upon to review the provided data in a conscientious and timely basis to detect events of interest.
  • Such systems are conventionally known in high-level security premises wherein a security guard is charged with continuously monitoring video data provided on one or more monitors to detect any unusual or unwanted activity.
  • passive systems include the use of one or more security cameras configured to record video data on a premises wherein the recorded video data is stored and available for later playback if theft or damage occurs on the premises.
  • security cameras configured to record video data on a premises wherein the recorded video data is stored and available for later playback if theft or damage occurs on the premises.
  • passive systems do not effectively serve the needs of an elderly individual or their caregiver who would benefit from the ability to receive alerts when particular events of interest occur but who also lack the ability to provide 24 hour personnel charged with monitoring passive feeds of video data.
  • the disclosed embodiments address these deficiencies by providing event-driven monitoring that enables a caregiver to be notified when a particular triggering event occurs, e.g., the opening of an entrance/exit portal for their charge's residence.
  • Such triggering events are recognized as a potential source of heightened risk for their charges based on the charges' potential susceptibility to nefarious individuals, propensity to wander, etc.
  • the caregiver is empowered with the opportunity to be vigilant while reducing the cognitive load associated with monitoring their charge.
  • FIGURE 2 illustrates one example of a methodology provided by at least one of the disclosed embodiments.
  • the methodology begins at 200 and control proceeds to 205, at which one or more sensors detect at least one triggering event. Subsequent to that detection, control proceeds to 210, at which the one or more sensors transmit data indicating the existence of the triggering event(s) to premises hardware to trigger operation of one or more cameras. It should be appreciated that such premises hardware may simply be incorporated into the monitoring management module and/or cameras and be configured to trigger operation of the cameras.
  • image data is acquired via the one or more cameras; as explained above, the image data may incorporate a plurality of images taken from one or more cameras and showing multiple views of the charge's residence environment around a residence portal.
  • Control then proceeds to 220, at which the image data is transmitted from the cameras to a monitoring management module; as explained in detail above, the monitoring management module may have various different hardware and software implementation configurations.
  • the image data is configured for transmission to one or more recipient devices and transmission of that image data is initiated by the monitoring management module.
  • transmission media may optionally include data indicating a time and/or date associated with the capture of the image data, a location of the image data and/or the identity of an individual associated with the residence at which the image data was captured.
  • Operations performed as part of the initiation of the transmission of the image data may differ significantly depending on the selected transmission media; for example, the operations performed by the monitoring management module to initiate transmission of an MMS message providing image data differ significantly from the operations performed to initiate transmission of an electronic mail message providing the image data.
  • Such delivery is performed using one or more communication networks; therefore, it should be appreciated that the entities controlling or administering one or more of those communication networks may or may not have an association or affiliation with an entity providing the components or associated services in conjunction with the disclosed embodiments. Therefore, it should be understood that the transmission of image data from the monitoring management module to one or more recipient devices may not be required to constitute practicing of the technology of the disclosed embodiments.
  • Control proceeds to 235, at which the image data transmitted to the one or more recipient devices is output to the recipient device(s) and optionally stored thereon.
  • the output and storage of the transmitted image data is not necessarily under the control of an entity providing the components or associated services in conjunction with the disclosed embodiments.
  • the operations performed by the monitoring management module are performed under the control of hardware and/or software included in that module; therefore, it should be understood that the module may by implemented in various implementations, as discussed herein. Therefore, it should be understood that the monitoring management module may include hardware and/or software sufficient for the module to perform the functionality described herein; accordingly, it is foreseeable that the hardware implementing the module may include one or more computer processing units and one or more memory devices configured to store computer program instructions that control and facilitate the above-described operations.
  • the selective monitoring provided by the event-driven monitoring system reduces the amount of monitoring data transmitted outside of the charge's residence. Accordingly, the system also has improved sensitivity for a charge's privacy.
  • the use of still images rather than video may also improve the privacy sensitivity of the monitoring system. This is because video data provides more information than still images; for example, video data provides information regarding the way in which an individual is moving, the period of time that is required for an individual to perform certain tasks, etc.
  • such information may be a source of sensitivity and potential embarrassment to the charge because, for example, the charge's physical prowess may be deteriorating and recording of the diminished ability of the charge may be offensive or shame- inducing to the charge.
  • such information may not be necessary for the effective monitoring of a charge's wellbeing; this is particularly true when a triggering event is the activation of a portal to facilitate interaction with the environment outside the charge's residence and/or to facilitate interaction with one or more individuals in that environment. What may be of primary importance for such an event is the presence and appearance of the charge and the presence, appearance and identification of an individual interacting with the charge via the portal.
  • Such data are discernable via still images; as a result, the use of video data may not be beneficial or necessary in the monitoring system.
  • the system may be configured to conduct no other surveillance; as a result, the system is configured to avoid a conventional problem of "dead air" (i.e., wherein a monitoring system is providing no meaningful information because no activity is occurring to be monitored) that affects many continuous monitoring systems.
  • the monitoring system provides utility in that the security configuration of the system and protection against system intrusion by an assailant is both simply implemented and effective.
  • the security of the system may rely largely on physical security (for the sensors and cameras) and conventional security practices for the various implementations of the monitoring management module discussed above. More specifically, it should be appreciated that a system assailant may be motivated to: (1) obtain monitoring capability of his own; or (2) damage or render inoperable the monitoring capability of the system.
  • an assailant desires to exploit the system to obtain monitoring capability of his own, there may be two potential entry points into the monitoring system.
  • the assailant may attempt to physically splice into the cameras and gain access at this point; alternatively, the assailant may attempt to compromise the monitoring management module through its connection to the communication network(s) (see 160 illustrated in FIG. 1).
  • Attempting to physically attack the cameras may be the most direct attack and the easiest to implement; however, as a result, such an attack may also be the easiest to address.
  • both cameras may transmit image data over physical lines to the monitoring management module.
  • this transmission could be provided for example, via a hub, which may be connected to a server running software that provides the functionality of the monitoring management module; thus, in such an implementation all system components (with the exception of one of the cameras) on the premises could be located inside the charge's residence. Therefore, the camera located outside the residence portal would be the most susceptible to attack due to its vulnerable outside location.
  • a would-be assailant would need to be physically present to tamper with the camera itself or the wiring leading to the other system components located in the charge's residence.
  • the assailant would need to include hardware of their own to retrieve and transmit the image from that camera.
  • such an attack is unlikely to occur because the assailant would gain little and would be required to expend a large amount of effort to successfully complete the attack.
  • a wireless network e.g., a Wireless Local Area Network (WLAN) or the like
  • WLAN Wireless Local Area Network
  • WPA Wi-Fi Protected Access
  • a situation may occur when there is an actual or perceived threat of a Denial of Service (DoS) attack on the system via, for example, a physical or software based attack on a camera or the server implementing the monitoring management module.
  • DoS Denial of Service
  • a technically savvy assailant may attempt to saturate a server's bandwidth, preventing it from carrying out desired functions.
  • One mechanism for minimizing a server's vulnerability would be to restrict alteration of system parameters to on-site users. Doing so makes management and maintenance of the system components more difficult; however, such an approach also enables the system to be hardened against incoming data traffic; thus, the equipment provided at the charge's residence may be configured to ignore any incoming data traffic from outside the premises.
  • the monitoring management module may be implemented using dedicated hardware with minimal functionality to capture and transmit image data with highly limited storage.
  • the monitoring management module may be implemented using a PDA or mobile device that may be programmed or run a software application configured to provide the functionality of the monitoring management module.
  • the PDA or mobile device could be installed inside the house and draw power via connection to a wall outlet.
  • Sensors and/or cameras could be connected to a data input port of the PDA or mobile device using special adapters (or alternatively, the components may be configured to transmit data and image data to the PDA or mobile device via wirelessly).
  • Such an implementation may provide the same or similar functionality provided in a server implemented monitoring management module configuration but potentially has a much smaller security impact because of the device isolation available with the PDA or mobile device. More specifically, by replacing a server with a dedicated piece of communication equipment running an application that enables only upstream data communication, security risks associated with server(s) implementation are mitigated.
  • the PDA or mobile device may be configured such that incoming call functions are disabled, thereby removing the threat of DoS attacks and data leakage through a network compromise.
  • physical security measures may remain the same; thus, an assailant must physically penetrate the charge's residence to disable the monitoring system.
  • An added point of utility for a PDA or mobile device implementation is that the amount of memory available for storage of image data will be limited, thereby reducing potential issues related to long-term data retention on system components. It should be appreciated, however, that one or more caregiver(s) may request transmission of image data and associated time/date stamp data to one or more recipient devices for the purposes of archiving the data for their individual future use. As a result, the monitoring system enables the capability to archive monitoring data but does not require that the system itself archive such data to provide the monitoring functionality.
  • the system may use no permanent local storage, eliminating the possibility of compromise of a central data vault.
  • conditional consent may be obtained by empowering those who are entrusted with the care of the elderly to decide how to act on information provided via the monitoring.
  • the disclosed embodiments have utility for care giving for any individual that actually or is perceived as suffering from intermittent, constant and/or deteriorating/improving impairment of physical and/or mental abilities. Therefore, it should be understood that the disclosed embodiments may have particular utility in care giving for individuals who are susceptible to intermittent lapses of lucidity, individuals who are recuperating from a physical accident and are temporarily incapacitated, and/or individuals that suffer from long term disabilities (e.g., blindness).
  • the disclosed embodiments may have utility in providing piece of mind to potentially fully functioning individuals (or caregivers of such individuals) who live alone in a residence that is geographically isolated from others and/or caregivers; in such a situation, the caregiver or the isolated individual may perceive a sense of comfort from the monitoring of their residence portals that would justify the limited invasion of the individual's privacy resulting from the implementation of the system.
  • the illustrated embodiments have been disclosed with reference to the capture of only still image data and associated time and date indicia, it is foreseeable that the system may be configured to provide some amount of video data and/or audio data in association with a triggering event.
  • components of the system provided at a charge's residence may include an override unit with a cognitive indicator.
  • Such an override unit may be configured to prevent signals generated from one or more trigger event sensors from triggering operation of the cameras to capture image data.
  • the override module may be a wired component of the system and may have a timeout period, which is determined during installation. To activate the override unit, the charge must indicate cognitive awareness the performance of one or more cognitive activities, e.g., simple games, answering queries, etc. [0093]
  • the software and/or hardware implementing the override unit may be incorporated in whole, in part or completely separately from the monitoring management module.
  • the override unit may include a keypad, button pad and/or other user input/output interface device components necessary to support the evaluation of a charge's mental state.
  • a sensor associated with the door signals the monitoring management module, which is configured to trigger operation of one or more cameras to capture image data from both sides of the portal (e.g., door). Transmission of this image data is then, as disclosed above, initiated by the monitoring management module to one or more recipient devices.
  • the monitoring system may be configured to provide time and date information associated with transmitted image data
  • the system may also capture and transmit to a recipient device associated information indicating, for example, the time between arrival of a visitor to a charge's residence and the residence door opening, and/or the time between arrival of the charge at the door and the door opening; such information may be considered sufficiently valuable to a care giver in determining the status of their charge while taking into consideration the sensitivity of the information provided to the caregiver for the purposes of maintaining the charge's personal privacy.
  • a monitoring system provided in accordance with at least one disclosed embodiment may be integrated with another system or system components to permit a caregiver to remotely grant or deny access through the charge's residence portal based on captured image data.
  • additional components or functionality may have particular utility when a charge suffers from an impairment that results in temporary and potential serious incapacitation events (e.g., epileptic attacks, recurrent strokes, etc.) or that results in intermittent delusions and/or paranoia (which may result in the charge refusing to grant entry to caregivers, professional safety or medical personnel, etc.)
  • An additional camera, mounted on the outside of the residence door may be recommended in such an implementation, if for example, an interior mounted camera configured to provide a view of the outside of the door would have its view blocked when the residence door is shut.
  • a system configured in accordance with at least one disclosed embodiment may include and be triggered by one or more doorbell sensors.
  • the system may include a digital display on the inside of the residence door that transmits live video data provided by an auxiliary camera providing image data showing the outside of the door; in such a way, the residence door may be made effectively transparent, aiding the visually impaired individual in identifying a visitor on the outside of the door.
  • this digital display may also be coupled with a system or computer application providing face recognition and a suitable database of friends and hostile parties could enable the system to automatically recognize and deny entry to threats, while broadcasting the arrival of known friendly parties, enabling the elderly with complete visual loss to recognize arrivals prior to opening the door.
  • an additional, door-mounted, outward-facing camera may be needed for this system.
  • the monitoring system may optionally also include hardware that is configured to provide simple and quick connection to public safety infrastructure such as the 911 system; such an implementation may be of particular utility where a charge or resident of a resident has a history of instigating or becoming victim to domestic violence situations or threats thereof.
  • the components may also include hardware and/or software that may be configured to transmit image data (still image and/or video and/or audio) as part of an automated police request.
  • image data may be transmitted to a caregiver's recipient device in many different formats and using various different protocols; therefore, although electronic mail and messaging protocols have been discussed, it should be understood that other formats and protocols may be used including Instant Messaging (IM).
  • IM Instant Messaging
  • the cameras may be controlled to capture image data for a finite period of time once their operation has been triggered by the output signal output by the sensor located at the residence portal; alternatively, the cameras may be configured or controlled to capture image data as long as the sensor detects that the residence portal is open.
  • the functionality described in connection with various described components of various invention embodiments may be combined or separated from one another in such a way that the architecture of the invention is somewhat different than what is expressly disclosed herein.
  • there is no essential requirement that methodology operations be performed in the illustrated order therefore, one of ordinary skill in the art would recognize that some operations may be performed in one or more alternative order and/or simultaneously.
  • a triggering event that triggers data collection may be one of various potential events associated with a charge's location and is not limited to the opening of a door.
  • disclosed embodiments may be useful in collecting data indicating the status of a charge and/or an identity of a threat source actually or potentially interacting with the charge (whether that threat source is a human being, a piece of physical equipment, physical circumstance, environmental condition or event).
  • triggering events may include a charge's use of a major appliance such as a stove, the charge's entry to a bathroom or other confined space that may be difficult to maneuver into or out of without falling, etc.
  • the limited collection of remote data indicating the status of the charge may be beneficial to a caregiver; by providing this capability while safeguarding a charge's privacy, a beneficial balance may be established.
  • system components may be implemented together or separately and there may be one or more of any or all of the disclosed system components. Further, system components may be either dedicated systems or such functionality may be implemented as virtual systems implemented on general purpose equipment via software implementations. [00105] Although the utility of various invention embodiments has been described in connection with the distribution of promotional content, it should be understood that distributed information is not limited to promotional content but may also or alternatively include non- promotional material.

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Gerontology & Geriatric Medicine (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

L'invention concerne un système et des procédés de surveillance qui sont conçus pour une utilisation en association avec l'administration de soins à des personnes âgées. Le système et les procédés de surveillance peuvent être configurés pour être commandés par des événements par nature et centrés sur la protection de la vie privée de l'utilisateur. Malgré le fait qu’il s’agisse d’un exemple d'informatique omniprésent, le système peut être renforcé contre des problèmes d'intrusion dans la vie privée. Puisque le système et les procédés de surveillance sont commandés par des événements et peuvent être configurés pour réduire la charge cognitive, le système et les procédés peuvent permettre à un soignant de réagir plus efficacement qu'avec des technologies de surveillance passives telles que des caméras de sécurité classiques.
PCT/US2009/050927 2008-07-17 2009-07-17 Système de surveillance commandé par des événements à confidentialité améliorée et procédés associés WO2010009361A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13515108P 2008-07-17 2008-07-17
US61/135,151 2008-07-17

Publications (1)

Publication Number Publication Date
WO2010009361A1 true WO2010009361A1 (fr) 2010-01-21

Family

ID=41550725

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2009/050927 WO2010009361A1 (fr) 2008-07-17 2009-07-17 Système de surveillance commandé par des événements à confidentialité améliorée et procédés associés

Country Status (1)

Country Link
WO (1) WO2010009361A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105686816A (zh) * 2016-01-20 2016-06-22 深圳市岸基科技有限公司 一种智能养老系统
WO2018071141A1 (fr) * 2016-10-10 2018-04-19 Lifesite, Inc. Système informatique doté d'un mécanisme de guidage d'évènement, et son procédé de fonctionnement
US10277235B2 (en) 2015-04-15 2019-04-30 Mitsubishi Electric Corporation Synthesizer
US11496472B2 (en) * 2018-11-16 2022-11-08 Mutualink, Inc. System and method for secure access to camera systems

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5633627A (en) * 1994-09-23 1997-05-27 Bed-Check Corporation Hard-wired monitoring system for hospital bed or short term care patients
US6221010B1 (en) * 1999-07-02 2001-04-24 Donald A. Lucas Home medical supervision and monitoring system
US6970183B1 (en) * 2000-06-14 2005-11-29 E-Watch, Inc. Multimedia surveillance and monitoring system including network configuration
US20060089542A1 (en) * 2004-10-25 2006-04-27 Safe And Sound Solutions, Inc. Mobile patient monitoring system with automatic data alerts
US20070085690A1 (en) * 2005-10-16 2007-04-19 Bao Tran Patient monitoring apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5633627A (en) * 1994-09-23 1997-05-27 Bed-Check Corporation Hard-wired monitoring system for hospital bed or short term care patients
US6221010B1 (en) * 1999-07-02 2001-04-24 Donald A. Lucas Home medical supervision and monitoring system
US6970183B1 (en) * 2000-06-14 2005-11-29 E-Watch, Inc. Multimedia surveillance and monitoring system including network configuration
US20060089542A1 (en) * 2004-10-25 2006-04-27 Safe And Sound Solutions, Inc. Mobile patient monitoring system with automatic data alerts
US20070085690A1 (en) * 2005-10-16 2007-04-19 Bao Tran Patient monitoring apparatus

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10277235B2 (en) 2015-04-15 2019-04-30 Mitsubishi Electric Corporation Synthesizer
CN105686816A (zh) * 2016-01-20 2016-06-22 深圳市岸基科技有限公司 一种智能养老系统
WO2018071141A1 (fr) * 2016-10-10 2018-04-19 Lifesite, Inc. Système informatique doté d'un mécanisme de guidage d'évènement, et son procédé de fonctionnement
US11496472B2 (en) * 2018-11-16 2022-11-08 Mutualink, Inc. System and method for secure access to camera systems

Similar Documents

Publication Publication Date Title
US9513364B2 (en) Personnel authentication and tracking system
US9135807B2 (en) Mobile wireless device with location-dependent capability
US8922335B2 (en) Safe weapon container for securely releasing a defense weapon
KR101990803B1 (ko) IoT를 이용한 취약계층 보호관리 시스템
US7397371B2 (en) Security system access control and method
US20110058034A1 (en) Sharing of video surveillance information
US20120314063A1 (en) Threat based adaptable network and physical security system
WO2009079648A1 (fr) Système de sécurité de réseau et physique adaptable basé sur des menaces
CN106355693A (zh) 一种家居安防系统及其实现方法
Senior et al. Privacy protection and face recognition
US9959425B2 (en) Method and system of privacy protection in antagonistic social milieu/dark privacy spots
CN105931316A (zh) 一种智能区域监控方法
Hussein et al. Digital surveillance systems for tracing COVID-19: Privacy and security challenges with recommendations
CN105929696A (zh) 一种智能家居安防方法
WO2010009361A1 (fr) Système de surveillance commandé par des événements à confidentialité améliorée et procédés associés
Handler et al. Security and privacy issues in healthcare monitoring systems: a case study
Krempel et al. A privacy-aware fall detection system for hospitals and nursing facilities
CN105264483A (zh) 用于管理场所安全的门户网站
CN105989685A (zh) 一种智能社区监控管理方法
CN105991975A (zh) 一种智能多级安防监控方法
Wu et al. A home security system for seniors based on the beacon technology
Ali et al. Risk assessment framework of mHealth system vulnerabilities: A multilayer analysis of the patient hub
CN103186969A (zh) 小区安防监测系统
SE1351104A1 (sv) Trygghetssystem och elektronisk låsanordning för användningdäri, och en tillhörande metod för att övervaka omhändertagande av en trygghetslarmhändelse i ett trygghetslarmsystem
JP2005094642A (ja) 監視カメラシステム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 09798783

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 09798783

Country of ref document: EP

Kind code of ref document: A1