The present invention relates to a mobile monitoring system, a mobile monitoring unit and a mobile monitoring method. For example, a security mobile monitoring system, a facility mobile monitoring system.
Surveillance of premises, e.g. buildings, complex, estates, have traditionally been handled by personnel who are stationed at such premises to carry out surveillance activities, e.g. patrolling. Personnel would survey the security and/or the facilities of the premise. Such activities are labour intensive and costly with increasing labour costs. With improvement of technology, the use of monitoring systems, e.g. cameras, sensors and alarms, have improved the efficiency and effectiveness of surveillance of such premises. Typically, the premise has a guard post or a command centre located within the premise to carry the monitoring activities. In an area where there are a number of premises, e.g. an estate of buildings, the number of personnel required to man the guard post or command centre can be substantial. The cost to maintain the number of personnel can also be very high. There have been examples where the monitoring of a plurality of premises is consolidated into a single guard post or command centre. However, the guard post or command centre is a single point of failure. In the event that the guard post or command centre is compromised, i.e. taken over or shut down by intruders, surveillance of the premises will no longer be possible. In such a situation, the premises will be left unguarded and property will be lost or damaged. Further, when there is an incident, e.g. security breach, power failure, at a premise, the number of personnel available to attend to the incident immediately is limited to the number of personnel on duty at the premise. Additional help provided by the city, e.g. police, fire brigade, may only arrive after a period of time. Therefore, the effectiveness and cost-efficiency of the current surveillance system is very low. While it is possible to have a multiple number of guard posts and command centres for one or a plurality of premises, the costs for running such a configuration will be very high.
It is therefore critical to provide a solution to the issues mentioned above. With the rising risks of terror attacks, it is more important to provide such a solution.
According to various embodiments, a mobile monitoring unit adapted to monitor at least one premise is provided. Mobile monitoring unit is adapted to receive alarm signals from the at least one premise and respond to the alarm signals. Mobile monitoring unit includes a communication module configured to transmit a takeover instruction to another communication module of another mobile monitoring unit, such that upon receiving the takeover instruction, the another mobile monitoring unit is configured to receive the alarm signals and respond to the alarm signals.
According to various embodiments, the communication module may be configured to receive a verification request from the another mobile monitoring unit to verify the transmission of the takeover instruction, such that the mobile monitoring unit may further include a verification module configured to verify the verification request from the another mobile monitoring unit.
According to various embodiments, the verification request may include a video access request to access a camera within the mobile monitoring unit to view within the mobile monitoring unit.
According to various embodiments, the communication module may be configured to transmit a signal list comprising one or more of the alarm signals received by the mobile monitoring unit to the another mobile monitoring unit.
According to various embodiments, the unit may further include an activation trigger configured to activate the transmission of the takeover instruction.
According to various embodiments, the unit may further include an activation module configured to process a set of conditions and activate the transmission of the takeover instruction if the set of conditions satisfy a pre-determined set of conditions.
According to various embodiments, the communication module of the another mobile monitoring unit may be configured to receive a set of operational instructions for operating the mobile monitoring unit from the another mobile monitoring unit.
According to various embodiments, the set of operational instructions may include a shutdown instruction to immobilise or shut down the mobile monitoring unit.
According to various embodiments, the unit may further include a shutdown module configured to immobilise or shut down the mobile monitoring unit after the takeover instruction has been transmitted.
According to various embodiments, the unit may further include a token module configured to receive a token from a mobile monitoring unit and transmit the token to another mobile monitoring unit, the token being configured to store the takeover instruction, such that the communication module may be configured to automatically transmit the token to the another mobile monitoring unit within a pre-determined period of time, such that the token may be configured to transfer the takeover instruction to the another mobile monitoring unit.
According to various embodiments, a monitoring method for monitoring at least one premise is provided. The method includes monitoring at least one premise; and transmitting a takeover instruction from a mobile monitoring unit to another mobile monitoring unit, such that the mobile monitoring unit may be adapted to receive alarm signals from the at least one premise and responding to the alarm signals, such that, upon receiving the takeover instruction, the another mobile monitoring unit may be configured to receive the alarm signals and respond to the alarm signals.
According to various embodiments, the method may further include receiving a verification request from the another mobile monitoring unit to verify the transmission of the key from the mobile monitoring unit.
According to various embodiments, the verification request may include a video access request to access a camera within the mobile monitoring unit to view within the mobile monitoring unit.
According to various embodiments, the method may further include transmitting a signal list comprising one or more of the alarm signals received by the mobile monitoring unit to the another mobile monitoring unit.
According to various embodiments, the method may further include receiving an activation signal and activating the transmission of the takeover instruction.
According to various embodiments, the method may further include processing a set of pre-determined conditions and activating, based on the set of predetermined conditions, the transmission of the takeover instruction.
According to various embodiments, the method may further include receiving a set of operational instructions for operating the mobile monitoring unit from the another mobile monitoring unit.
According to various embodiments, the set of operational instructions may include an instruction to immobilise or shut down the mobile monitoring unit.
According to various embodiments, the method may further include immobilising or shutting down the mobile monitoring unit after transmitting the takeover instruction.
According to various embodiments, the method may further include automatically transmitting a token from the mobile monitoring unit to the another mobile monitoring unit within a pre-determined period of time, such that the token may be configured to store the takeover instruction and download the takeover instruction to the another mobile monitoring unit.
According to various embodiments, a mobile monitoring system adapted to monitor a plurality of premises is provided. The system includes a plurality of mobile monitoring units described above adapted to monitor the plurality of premises, each of the plurality of mobile monitoring units may be adapted to receive alarm signals from the plurality of premises and respond to the alarm signals, such that a first mobile monitoring unit of the plurality of mobile monitoring units may be adapted to transmit a takeover instruction to a second mobile monitoring unit of the plurality of mobile monitoring units, such that upon receiving the takeover instruction, the second mobile monitoring unit may be configured to receive the alarm signals and respond to the alarm signals.
According to various embodiments, the second mobile monitoring unit may be configured to transmit a verification request to the first mobile monitoring unit to verify the transmission of the takeover instruction from the first mobile monitoring unit.
According to various embodiments, the verification request may include a video access request to access a camera within the first mobile monitoring unit to view within the first mobile monitoring unit.
According to various embodiments, the first mobile monitoring unit may be configured to transmit a signal list comprising one or more of the alarm signals received by the first mobile monitoring unit to the second mobile monitoring unit.
According to various embodiments, the first mobile monitoring unit may be configured to receive a set of operational instructions for operating the mobile monitoring unit from the second mobile monitoring unit.
According to various embodiments, the set of operational instructions may include an instruction to immobilise or shut down the first mobile monitoring unit.
According to various embodiments, the first mobile monitoring unit may be configured to be immobilised or shut down after the takeover instruction has been transmitted.
According to various embodiments, the plurality of mobile control units are configured to automatically transmit a token from one of the plurality of mobile monitoring units to another within a pre-determined period of time, such that the token may be configured to store the takeover instruction from the first mobile monitoring unit and transfer the takeover instruction to the second mobile monitoring unit.
As shown in
Mobile monitoring system 100 is able to provide a dynamic monitoring system to monitor a plurality of premises 10. Mobile monitoring system 100 may include a plurality of mobile monitoring units 110, e.g. two, three, four or five, to monitor a plurality of premises 10, e.g. five, fifteen, thirty, fifty buildings. For example, the mobile monitoring system 100 may include five mobile monitoring units 110 to monitor fifteen buildings. While each mobile monitoring unit 110 may be assigned a group of buildings, e.g. three buildings, to monitor, the number of mobile monitoring units 110 or the number of buildings under the purview of each mobile monitoring unit 110 may change depending on the situation of the premises 10. If necessary, the number of mobile monitoring units 110 for a group of buildings may be varied, e.g. increased or decreased. In other words, the number of buildings under the purview of each mobile monitoring unit 110 may vary, e.g. increase or decrease. Further, the mobile monitoring system 100 reduces the need to have a guard post or command centre at every premise, e.g. building. Consequently, the manpower required to monitor the same number of premises is reduced. In addition, when necessary, the number of mobile monitoring units 110 may increase for a group of premises 10 if necessary. In this way, the mobile monitoring system 110 provides an effective and cost-efficient system and method for monitoring a plurality of premises 10.
Mobile monitoring system 100 may include at least one mobile monitoring unit 110, i.e. a first mobile monitoring unit 110A and another mobile monitoring unit, i.e. a second mobile monitoring unit 110B. First mobile monitoring unit 110A that is monitoring a first group of buildings may communicate with the second mobile monitoring unit 11, which may be monitoring a second group of buildings. In the event of an emergency situation, e.g. there is a security breach in one of the buildings, the first mobile monitoring unit 110A may request the second monitoring unit for assistance. Preferably, the second mobile monitoring unit 110B is within close proximity to the first mobile monitoring unit 110A. If the second group of buildings are in normal condition, i.e. no incidents or alarm signal received from the second group of buildings, the second mobile monitoring unit 110B may partially or completely take over the monitoring of the first group of buildings so that the first mobile monitoring unit 110A may then respond to the situation, e.g. respond remotely, go to the building to investigate so as to attend to the cause of the alarm.
Second mobile monitoring unit 110B may either move to the location of the first mobile monitoring unit 110A or remain in its original location and monitor the group of buildings remotely. Second mobile monitoring unit 110B may be a backup and respond to the situation if necessary. As the second mobile monitoring unit 110B is in close proximity to the first mobile monitoring unit 110A, the second mobile monitoring unit 110B may be able to reach the location of the first mobile monitoring unit 110A, or the building with the emergency quickly. As shown, the mobile monitoring system 100 provides a dynamic monitoring system where the configuration of mobile monitoring units 110 may be rearranged to suit the situation of the plurality of premises 10.
Takeover instruction 120 may include an access module configured to access the computing device 114 of the first mobile monitoring unit 110A when activated. Access module may be configured to access the computing device 114 of the first mobile monitoring unit 110A. Access module may be configured to communicate with a camera of the first mobile monitoring unit, whereby the camera is in communication with the computing device 114. Access module may include a program configured to access the computing device 114 and/or the camera. Access module may display a link, e.g. a hyperlink, a button, to be activated to access the computing device 114. Upon receiving the takeover instruction 120, the access module may display on a display of the second mobile monitoring unit 110B. Personnel in the second mobile monitoring unit 110B may activate the access module, e.g. by clicking on the hyperlink or button, to activate the program. In an example, the second mobile monitoring unit 110B may view the interior of the first mobile monitoring unit 110A via a camera within therein to determine if the first mobile monitoring unit 110A is in working condition. Access module may be activated to transmit a message or an email to the first mobile monitoring unit 110A. Access module may be configured to dial into the telecommunication system of the first mobile monitoring unit 110A to allow the second mobile monitoring unit 110B to communicate with the first mobile monitoring unit 110A. In this way, the second mobile monitoring unit 110B may verify that the takeover instruction 120 is genuine.
Communication module 112 of the first mobile monitoring unit 110A may be configured to transmit a signal list having one or more of the alarm signals received by the first mobile monitoring unit 110A to the second mobile monitoring unit 110B. When the first mobile monitoring unit 110A receives alarm signals from at least one premise 10, it may maintain the signal list by recording details of each of the alarm signals, e.g. date, time, source, nature of alarm signal. When the takeover instruction 120 is transmitted, the takeover instruction 120 may include the signal list. In this way, the second mobile monitoring unit 110B may be able to retrieve the details of the alarm signals from the signal list and, if necessary, take the necessary action to respond and address the cause of the alarm signal. As mentioned, the second mobile monitoring unit 110B may take over the monitoring completely or partially from the first mobile monitoring unit 110A. A partially monitoring may include taking over the monitoring of some of the alarm signals from the plurality of premises 10. For example, monitoring a portion of the number of premises 10, some of the systems within a premise 10. A complete monitoring may include taking over the monitoring of all the alarm signals from the plurality of premises 10 that the first mobile monitoring unit 110A was monitoring. In certain situations when the first mobile monitoring unit 110A is no longer able to monitor the premises 10, e.g. when it needs to attend to emergencies at a premise 10, when the unit breaks down, when the unit is taken over by unauthorised personnel, the second mobile monitoring unit 110B would be able to take over the monitoring of the premises 10 that the first mobile monitoring unit 110A was monitoring.
Transmission of the takeover instruction 120 may be activated manually or automatically. Mobile monitoring unit may include an activation trigger 116 configured to activate the transmission of the takeover instruction 120. Transmission of the takeover instruction 120 may be activated by manually activating the activation trigger 116. Activation trigger 116 may include a physical button or switch located within the mobile monitoring unit, e.g. at the driver's panel. Activation trigger 116 may be a graphical user interface displayed on the display of the computing device 114 in the mobile monitoring unit 110. Activation trigger 116 may be triggered by a personnel of the mobile monitoring unit 110 when necessary, e.g. when unit breaks down, when attacked by intruders. Transmission of the takeover instruction 120 may be automated. Mobile monitoring unit 110 may include an activation module configured to process a set of conditions and activate the transmission of the takeover instruction 120 if the set of conditions satisfy a pre-determined set of conditions. Activation module may be stored in the system memory 114B of the computing device 114. Mobile monitoring unit 110 may include sensors for detecting the conditions of the mobile monitoring unit 110. Sensors may detect in and outside of the mobile monitoring unit 110. Sensors may be in communication with the computing device 114. Sensors may include, motion sensors, heat sensors, shock sensors, etc. Computing device 114 may receive a set of conditions from the sensors. A set of pre-determined conditions may be configured by the personnel controlling the mobile monitoring unit 110. The set of pre-determine conditions may include breakdown of vehicle, collision of vehicle, etc. As shown, when the set of conditions is fulfilled, the takeover instruction 120 may be automatically transmitted. As there may be a possibility that the set of pre-determined conditions may be satisfied unintentionally, e.g. due to sensor malfunction, and causing the activation trigger 116 to be activated to transmit the takeover instruction 120, it is preferable, if not necessary, to have the verification by the second mobile monitoring unit 110B so as to avoid unintentional taking over of the mobile monitoring unit 110.
First mobile monitoring unit 110A may be configured to store a set of operational instructions for operating the first mobile monitoring unit 110A. The set of operational instructions may be stored in the system memory 114B of the computing device 114. The set of operational instructions may be a set of standard operating procedures or protocols for taking over the first mobile monitoring unit 110A, a set of instruction to monitor the plurality of premises 10, etc. Takeover instruction 120 may include the set of operational instructions. Upon activation of the activation trigger 116, the set of operational instructions may be transmitted to the second mobile monitoring unit 110B. Communication module 112 of the second mobile monitoring unit 110B may be configured to receive the set of operational instructions for operating the first mobile monitoring unit 110A from the first mobile monitoring unit 110A. Set of operational instructions may be APIs to communicate between the communication modules 112A,112B of the first mobile monitoring unit 110A and the second mobile monitoring unit 110B. Set of operational instructions may include a shutdown instruction to immobilise or shut down the mobile monitoring unit 110, e.g. the first mobile monitoring unit 110A. Shutdown instruction may be transmitted to the second mobile monitoring unit 110B so that the second mobile monitoring unit 110B may, upon receipt of the shutdown instruction, activate it to shut down the first mobile monitoring unit 110A. Shutdown instruction may be encrypted and may only be decrypted by the computing device 114 of the first mobile monitoring unit 110A. It is not possible for anyone to shut down the mobile monitoring unit 110 unless the person is in possession of the shutdown instruction and activates it. By transmitting the shutdown instruction to the second mobile monitoring unit 110B, the second mobile monitoring unit 110B will be able to shut down the first mobile monitoring unit 110A if the second mobile monitoring unit 110B determines that the situation requires the first mobile monitoring unit 110A to be shut down, e.g. when first mobile monitoring unit 110A is taken over by unauthorised personnel. First mobile monitoring unit 110A may be configured to be shutdown automatically once the takeover instruction 120 has been transmitted. First mobile monitoring unit 110A may include a shutdown module configured to immobilise or shut down the first mobile monitoring unit 110A after the takeover instruction 120 has been transmitted. Shutdown module may include the shutdown instruction for shutting down the first mobile monitoring unit 110A. As the personnel in the first mobile monitoring unit 110A may recognise that in the event that the takeover instruction 120, e.g. a complete takeover instruction 120, is to be transmitted, it may be due to drastic condition and necessary to shut down the first mobile monitoring unit 110A. Therefore, the shutdown module may be configured to shut down the first mobile monitoring unit 110A after the takeover instruction 120 is transmitted. As shown, any mobile monitoring unit 110 may be configured to be shut down and monitoring of the premises may be migrated from the mobile monitoring unit 110 to another. This configuration allows multiple backups to be possible and enables an efficient and cost-effective security and facility monitoring system and method.
Each of the mobile monitoring unit 110 may maintain an activity log to record the activities carried out by the mobile monitoring unit 110. Based on the above example, when transmitting the takeover instruction 120, the activity log may be transmitted at the same time so that the second mobile monitoring unit 110B may know the activities carried out by the first mobile monitoring unit 110A. Computing device 114 may store a substantial amount data from the activities carried out by the mobile monitoring unit 110. For example, the computing device 114 may store the video and audio files, the activity log, etc. Large-sized files may be backed-up to the data storage at base stations when the mobile monitoring unit 110 returns to the base. Activity log may include links to the video and audio files so that the second mobile monitoring unit 110A may access the files if need be after receiving the takeover instruction. In this way, the file size of the data to be transmitted can be minimised for fast transmission.
Each of the mobile monitoring units 110 may include a key for operating the mobile monitoring unit 110. The key may be configured to authorise the operation of the mobile monitoring unit 110. Mobile monitoring unit 110 may be configured such that, without the key, the mobile monitoring unit 110 and the systems therein may not be operable. Key may be a digital key, e.g. a code, an alphanumeric string. Takeover instruction 120 may include the key. Mobile monitoring unit 110 may be shut down by removing the key. A digital key may be removed by deleting or changing the code for the key. When the activation trigger is activated, the key may be attached to the takeover instruction to be transmitted. Key may be removed or deleted by a pre-determined time period after the transmission of the takeover instruction.
Each of the mobile monitoring unit 110 may have an identifier for identifying the mobile monitoring unit 110. Takeover instruction 120 may include the identifier so that the second mobile monitoring unit 110B may identify the source of the takeover instruction 120 when it receives the takeover instruction 120. When the second mobile monitoring unit 110B transmit the verification request, the identifier of the second mobile monitoring unit 110B may be attached to the verification request so that the first mobile monitoring unit 110A may verify the identity of the source of verification request.
Token 130 may be transmitted upon activation of the activation trigger 116. Each mobile monitoring unit 110 may include a token 130 transfer sequence list which records the sequence of transmission between the plurality of mobile monitoring units 110. Referring to
Processor 114A may include but not limited to a microprocessor (μP), a microcontroller (μC), a digital signal processor (DSP), or any combination thereof. Processor 114A may include one more levels of caching, such as a level one cache and a level two cache, two or more processor cores, and registers. Processor core ay include an arithmetic logic unit (ALU), a floating point unit (FPU), a digital signal processor core (DSP Core), or any combination thereof. Processor 114A may include a memory controller 1520. Processor 114A may include a location prediction module configured to facilitate prediction of a location of a given memory address based upon a memory address distribution table of memory addresses stored by the on-chip caches of one or more of the processor cores.
System memory 114B may include but not limited to volatile memory (such as RAM), non-volatile memory (such as ROM, flash memory, etc.) or any combination thereof. System memory 114B may include an operating system 1210, one or more applications 1220, and program data 1230. Application 1220 may be arranged to operate with program data 1220 on the operating system 1230. Application 1220 may include algorithm for the method 1000, the verification module, the activation module, the token module, etc. Program data 1230 may include the key 132, signal list 139, token 130, etc. Computing device 114 may include a bus/interface controller 1400 configured to facilitate communication between the processor 114A/system memory 114B and a data storage device 1600 via the storage interface bus 1500.
As shown in
System memory 114B, removable storage devices 1620, non-removable storage devices 1640 are examples of computer storage media. Computer storage media may also include RAM, ROM, EEPROM, flash memory, CD-ROM, optical storage, e.g. DVD, magnetic cassettes, magnetic tape, magnetic disk storage, etc.
Computing device 114 may include various interface devices, e.g. output device 1720, peripheral interfaces 1740, communication devices 1760. Computing device 114 may include an interface bus 1800 configured to facilitate communication between the processor 114A, system memory 114B, storage devices 1600 and the interface devices.
Output devices 1720 may include a graphics processing unit (GPU) 1722 configured to communicate to a display and an audio process unit (APU) 1724 configured to communicate with a speaker via one or more A/V ports 1720.
Peripheral devices 1740 may include a serial interface controller (SIC) 1742 or a parallel interface controller 1744 configured to communicate with external devices such as input devices (e.g., keyboard, mouse, pen, voice input device, touch input device, etc.) or other peripheral devices (e.g., printer, scanner, etc.) via one or more I/O ports 1746.
Communication device 1760 may include a network controller 1762, configured to facilitate communications with one or more other computing devices 1002 over a network communication link via one or more communication ports 1764. For example, the computing device 114 of the first mobile monitoring unit 110A may communicate with computing device 114 of the second mobile monitoring unit 110B.
Network communication link may be one example of a communication media.
Communication media may typically be embodied by computer readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and may include any information delivery media. A “modulated data signal” may be a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. For example, communication media may include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), microwave, infrared (IR) and other wireless media.
The term computer readable media as used herein may include both storage media and communication media.
Computing device 114 may be a portable (or mobile) electronic device, e.g. a cell phone, a personal data assistant (PDA), a personal media player device, a wireless web-watch device, a personal headset device, an application specific device, or a hybrid device that include any of the above functions. Computing device 114 may also be a personal computer including both laptop computer and non-laptop computer configurations, e.g. desktop.
It should be appreciated that all the information in system database may be maintained in one or more databases or on each of a plurality of databases using distributed database technology. Further, it should be appreciated that the modules may be hosted on one server or a plurality of servers connected via the network.
As shown above, the mobile monitoring system 100 provides a solution in delivering the security and facility monitoring services needed in our advanced global city. Mobile monitoring unit 110 may also be fitted with a drone so that in situations where closer surveillance is needed, the personnel of the mobile monitoring unit 110 can quickly deploy the drone to carry out close monitoring. Such mobile monitoring units 100 may be used to house a robot, in which the robot can attend to dangerous situation such as bomb disposal, so that personnel can be carry out the disposal safely. It is also possible to include water vessels in the mobile monitoring unit 110 to provide cross water monitoring operations. In the event of any hostile and dangerous activities, e.g. shooting in a compound, the mobile monitoring unit 110 with its surveillance capability may provide an effective platform for the police units to monitor the situation and carry out rescue operations more accurately and swiftly. In this way, they will be able to save lives. With multiple mobile monitoring units 110 in deployment and with the capability of capturing surveillance data from its monitoring systems, e.g. CCTV installation, in its cluster of areas, they can provide a good deterrence to any pre-planned terrorist activities or threats. As such terrorist activities do not happen in an ad-hoc manner, premises that are under constant surveillance can be a deterrence to such activities.
A skilled person would appreciate that the features described in one example may not be restricted to that example and may be combined with any one of the other examples.
The present invention relates to a mobile monitoring system, a mobile monitoring unit and a mobile monitoring method generally as herein described, with reference to and/or illustrated in the accompanying drawings.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/SG2018/050263 | 5/29/2018 | WO | 00 |