The following relates to systems and methods for characterizing and passively monitoring a property, in particular to identify events or behaviours affecting or relevant to occupants of the property.
There exist many people who are likely capable of and wanting to live independently, but for various reasons are considered or perceived to be at higher risk of life threatening events, such as accidents, heart attacks and strokes.
Services are in place in some areas, which allow for such people to receive regular visits from health and welfare agents. However, in several cases these services may be unavailable or unaffordable to some at-risk people.
The absence of such services then relies on close relatives or friends to make these visits, but that is dependent on the proximity, availability, and willingness of those individuals. Even when the services are available, it can still be several days or even weeks between visits, during which critical events may go unnoticed.
Solutions also exist to address these issues by providing “alert systems”, which can be triggered by the person in the event of an emergency. These systems can be useful in some situations, but require that the device be worn at all times, and that the person remains conscious and coherent enough to use the device in the event of an emergency.
It is also possible to use modern video monitoring and/or audio recording equipment to remotely view the person at risk and ensure that they are well, but few people are known to choose such a system due to the loss of privacy and the requirement for someone to be actively monitoring the person remotely to ensure their health.
It is an object of the following to address at least one of the above disadvantages.
A system and method are described herein, which can automatically detect events which require intervention and actively notify the appropriate individual or service provider, without unnecessarily or overly impeding on the privacy of the infirm.
The system and method are operable to characterize the “regular activity” within the environment of a monitored individual (e.g., an infirm person), and to actively notify individuals such as family or healthcare providers of events which fall outside of that regular activity.
In one aspect, there is provided a method of monitoring a property, the method comprising: analyzing data obtained from one or more sensor units deployed for monitoring the property to generate a signature of the property, the signature being indicative of normal activities associated with the property and/or one or more occupants of the property; obtaining current data acquired by the one or more sensors; analyzing the current data against the signature for the property to determine whether or not the current data is associated with normal activity, abnormal activity, a lack of activity, or an actionable event for the property; and having an alert or notification sent in response to analyzing the current data when abnormal activity, lack of activity, or an actionable event is detected.
In another aspect, there is provided a computer readable medium comprising computer executable instructions for performing the method.
In yet another aspect, there is provided a system comprising a processor, memory, and an interface for receiving data from sensor systems deployed in monitored properties, the system comprising computer executable instructions for performing the method.
In yet another aspect, there is provided a method of monitoring a property, the method comprising: analyzing data obtained from one or more sensor units deployed for monitoring the property to generate a signature of the property, the signature being indicative of normal activities associated with the property and/or one or more occupants of the property; providing the signature to a cloud-based system used to monitor the property; obtaining current data acquired by the one or more sensors; and sending the current data to the cloud-based system to have the cloud-based system analyze the current data against the signature for the property to determine whether or not the current data is associated with normal, abnormal, or a lack of activity at the property; and to have an alert or notification sent in response to analyzing the current data abnormal or lack of activity is detected.
In yet another aspect, there is provided a sensor system comprising one or more sensor units deployed for monitoring a property, a processor, and memory, the memory comprising computer executable instructions for performing the method above.
Embodiments will now be described by way of example only with reference to the appended drawings wherein:
The system described herein can monitor multiple aspects of an environment, in particular areas within (or an entire) dwelling such as a household. Aspects that may be monitored include, but are not limited to: temperature, water consumption, electricity or gas or other utility consumption, appliance or device usage, lighting, ambient noise, motion, ingress/egress to/from a building, air quality, etc.
The system can be operable to continuously analyze the environment to generate a model and signature that represents typical activity within the monitored property or portion thereof. This signature may then be used to identify unusual activities that may indicate situations which may require intervention. Thus, the system can measure multiple environmental aspects of the dwelling, and use this information to identify events requiring attention from interested individuals such as family, friends, health care providers, or monitoring services.
A passive health monitoring system is described in greater detail below as one particularly advantageous implementation, which includes a variety of sensors which run autonomously to generate a model of typical behavior in the home. Typical behavior that can be identified may include, but is not limited to, use of the toilet, bath or shower, turning electronic devices or lights on and off, use of the kitchen and others, opening of doors or windows, etc. Using an array of sensors around the home, a “fingerprint” or “signature”, or other modeled output or indication of regular behavior can be determined, which is unique to the home and the resident(s) of that home.
This signature can be stored in a secure online database and may be used independently or in conjunction with 3rd party environmental data such as local weather to build a model of the home. Such a model of the home can include a single average model, or can include additional metrics such as seasons, days of the week, or to address other abnormal time periods such as vacations or holidays.
To address privacy concerns, the system can be operable to avoid directly discernible information of the home environment being made available to those monitoring the property, such as to family members or health care providers, without affecting the effectiveness of the system. For example, rather than flagging the use of the toilet or stove, the system can instead report at the metadata level informing subscribers of “normal activity”, “abnormal activity”, “lack of activity”, “unusual events”, etc. having been detected. Also, tracking audible alerts and alarms, rather than recording audio tracks in the home can avoid concerns with invasive monitoring. This ensures the privacy of the in0firm while providing actionable information to family and health care providers.
There are many reasons that typical behavior may vary, most of which are not critical, such as vacations, receiving visitors or other unusual events. In the event that unusual activity is detected, the activity may be automatically assessed for risk. Some events may have a high likelihood of requiring critical attention (unusual noise, continuous water flow) or less critical attention (lack of motion or irregular consumption of utilities) that may not trigger urgent attention, but may still be flagged for follow-up from either a family member or health care provider.
The system can be configured to notify one or more people in the case of a notable event detected by the system. Notifications could be accomplished through SMS, email, phone or other communication systems, performed automatically by the system as described below.
Turning now to the figures,
While the example configuration shown in
In addition to the cloud-based system 16, an online database 20 can be provided for storing the data collected by the system 16. One or more 3rd party data sources 22 can also be accessed to obtain additional information such as weather, news, and other data that could impact the utilities being monitoring on the various premises. Similarly, one or more 3rd party alarm/event services 24 can also be accessed or fed into the system 16, e.g., services for tracking weather alerts, emergency conditions, earthquakes, air quality warnings, water quality warnings, etc. As illustrated in
The communication connection 32 can be via a network 30 common to the sensor units 40 or, as illustrated in dashed lines, can be via a single master or “primary” sensor unit 40 that itself is responsible for accessing a home network or cellular network (or other available communication means) to relay data into the cloud 18. For example, other sensor units 40 deployed around the property for various purposes can each gather data and send that data to a primary sensor unit 40 to achieve connectivity to the cloud 18. Preferably, each sensor unit 40 has its own capability to connect into and through the communication connection 32. As such, it can be appreciated that various connectivity configurations are possible within the principles discussed herein.
In addition to standalone or purpose-built sensor units, existing devices and technologies can be used to track not only the property 14, but also the occupants. For example, an app 42 installed on a mobile device 44 such as a smart phone can be used to track activities, locations, and other information with respect to an occupant. Since such devices 44 are being more and more common for monitoring humans (e.g., fitness trackers, medical devices, etc.), such apps 42 can feed additional data into the cloud 18 for generating signatures of the properties 14 and occupant(s), and identifying normal and abnormal behaviour. As shown in
In
The transceivers 50, as noted above, are compatible within any existing or future network configuration that allows for at least one primary sensor unit 40 in the monitored property 14 to reach the cloud 18 via a long-range communication capability 32.
The set of secondary (slave) sensor units 40 are operable in a manner similar to the primary sensor units 40 in terms of monitoring and logging a respective activity, utility, device or appliance, but are distinguished from the primary sensor units 40 by relying on the long-range communication connection 32 of one or more primary sensor units 40. This is accomplished by providing a short-range communication capability in each secondary sensor unit 40 that is also provided in the primary sensor units 40 to enable short-range communications within the monitored property 14. For example, the primary and secondary sensor units 40 can be equipped with any available short-range radio that has a suitable range according to the expected distances between the primary and secondary sensor units 40. A suitable type of radio is a 915 mHz LoRA radio, which has a particularly long range and is particularly suitable for large properties such as multi-unit residential, commercial and industrial premises. It can be appreciated that other short-range communication connections such as Bluetooth are also possible. In other scenarios, as depicted in
As indicated above, each sensor unit 40 is deployed in a particular area of the monitored property 14 for a particular purpose. For example, in a household with an elderly or infirm occupant that is being monitored, different sensor units 40 can be arranged in locations within the home that are normally used by that occupant. This allows the sensor system 12 to be as simple or as complex as is necessary to properly model and determine a “signature” or “fingerprint” for the home and thus be able to assess normal activities of the home and its occupant(s).
In this example, the kitchen area includes two sensor units 40. This would allow, for instance, at least one sensor to monitor appliance or lighting usage, indicative of use of that room. Other sensors, such as motion sensors can be used to detect movement in and through the kitchen area. Additional sensors that can detect audible outputs, e.g., from smoke or CO detectors, timers, open door alerts, warm-up cycles, etc. Sensors tracking water flow, electricity or gas (or other utility) usage can also be placed in the kitchen. Any and/or all of these sensors can contribute at least some indication of not only usage in general, but particular types and patterns of usage. It can be appreciated that since each sensor unit 40 can include multiple sensors 48 (or sensor inputs), any one or more sensor units 40 can be deployed in order to monitor a particular area within the property 14. For example, as shown in
A bathroom area, is also a common example of a room that is expected to have frequent usage and could be monitored to both establish normal activities, and detect normal activities. For instance, with normal usage of the bathroom 3-4 times per day, and a period of 24-48 hours with little to no usage could signify an abnormal situation that should be investigated. Similarly, frequent usage during nighttime hours could signal a potential issue. As shown in
Returning to
A sensor unit 40 located in the garage can be used for entry detection, temperature monitoring, air quality (e.g., CO) monitoring, and motion detection. Such a sensor unit 40 is particularly useful for monitoring activities of a property 14 where the garage is used, either by the person being monitored, or healthcare providers. The temperature monitoring can also provide indications of a garage door being left open. Similarly, a sensor unit 40 can be positioned outside of the garage to monitor rear access entry. Such a sensor unit 40 could also be equipped with motion sensors for tracking activities in the rear yard (e.g., taking out garbage and recycling, watering gardens, and other activities performed by the monitored occupant).
Accordingly, it can be appreciated from the examples shown in
Further detail concerning the cloud-based system 16 is shown in
The cloud-based system 16 can be used to not only collect the data from the sensor systems 12 but also present, interpret, and act upon that data. For example, as shown in
The alerts engine 66 in this example includes an alerts determination module 88 which is used to determine from the data provided by the analytics engine 64 whether or not the deviation from the signature warrants an urgent alert, a reminder, or becomes part of a periodic report or log. Either the ongoing data monitoring engine 84 or the alert determination module 88 can abstract or otherwise anonymize the data to ensure the privacy of the occupant(s) being monitored. For example, if the analytics engine 64 determines that the toilet has not been flushed in two days, rather than incorporating this specific occurrence into an alert, a deviation from the norm can instead be reported, with various levels of granularity as desired by the monitoring entity and the monitored occupant. The alert determination module 88 can provide alerts, notification, reports, etc. to the communication channel interface(s) 72 via a communications engine 90. It can be appreciated that the configuration shown in
After registration, the cloud-based system 16 can provide data monitoring dashboards 94 for each registered user to allow that user or entity to view the data being collected by its devices. This allows, for example, home usage and occupant activity trends to be viewed and potentially remedial action taken according to the data observed. Other scenarios can be detected, such as abnormal or lack of activity for an occupant. Such dashboards D can be viewed and interacted with via a web-based interface or an app or widget, to allow any device 44, 46 with an internet connection to be used.
After registration of one or more sensor units 40, the user may also receive alerts 98 or other details concerning events or notifications that would necessitate a real-time or dedicated message. In this example, the alert 98 is sent to a mobile device 44, e.g., via an app or SMS message, but could also be sent via email to other electronic devices 46 such as a home or work PC.
The measurements taken by the primary unit 40 and received from the secondary unit(s) 40 are collected at step 110 and this data is sent to the cloud 18 at step 112, similar to what is shown in
The analytics engine 64 can also utilize artificial intelligence, machine learning, and/or other algorithmic tools to detect new and never before seen signatures at step 164, which allows the system 16 to continually evolve and determine what additional information it may need, or determine a follow-up action at step 166 (i.e. a decision as to what to do next).
The signature that is generated for that monitored property 14 is then output at step 160 to enable normal, abnormal, and lack of activity to be monitored against the signature.
For simplicity and clarity of illustration, where considered appropriate, reference numerals may be repeated among the figures to indicate corresponding or analogous elements. In addition, numerous specific details are set forth in order to provide a thorough understanding of the examples described herein. However, it will be understood by those of ordinary skill in the art that the examples described herein may be practiced without these specific details. In other instances, well-known methods, procedures and components have not been described in detail so as not to obscure the examples described herein. Also, the description is not to be considered as limiting the scope of the examples described herein.
It will be appreciated that the examples and corresponding diagrams used herein are for illustrative purposes only. Different configurations and terminology can be used without departing from the principles expressed herein. For instance, components and modules can be added, deleted, modified, or arranged with differing connections without departing from these principles.
It will also be appreciated that any module or component exemplified herein that executes instructions may include or otherwise have access to computer readable media such as storage media, computer storage media, or data storage devices (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape. Computer storage media may include volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer readable instructions, data structures, program modules, or other data. Examples of computer storage media include RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by an application, module, or both. Any such computer storage media may be part of the sensor units 40 or systems 10, 12, 16, any component of or related thereto, etc., or accessible or connectable thereto. Any application or module herein described may be implemented using computer readable/executable instructions that may be stored or otherwise held by such computer readable media.
The steps or operations in the flow charts and diagrams described herein are just for example. There may be many variations to these steps or operations without departing from the principles discussed above. For instance, the steps may be performed in a differing order, or steps may be added, deleted, or modified.
Although the above principles have been described with reference to certain specific examples, various modifications thereof will be apparent to those skilled in the art as outlined in the appended claims.
This application is a continuation of PCT Application No. PCT/CA2017/050368 filed on Mar. 23, 2017, which claims priority to U.S. Provisional Patent Application No. 62/312,837 filed on Mar. 24, 2016, both incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
20050137465 | Cuddihy et al. | Jun 2005 | A1 |
20060055543 | Ganesh et al. | Mar 2006 | A1 |
20060267780 | Adams | Nov 2006 | A1 |
20140074504 | Nelson et al. | Mar 2014 | A1 |
20160171866 | Dupasquier | Jun 2016 | A1 |
20180330591 | Tilkin | Nov 2018 | A1 |
Number | Date | Country |
---|---|---|
2472487 | Jul 2012 | EP |
2472487 | Jul 2012 | EP |
2444107 | May 2008 | GB |
2014173432 | Oct 2014 | WO |
Entry |
---|
Halloran, B.; International Search Report from corresponding PCT Application No. PCT/CA2017/050368; search completed May 31, 2017. |
Number | Date | Country | |
---|---|---|---|
20180365957 A1 | Dec 2018 | US |
Number | Date | Country | |
---|---|---|---|
62312837 | Mar 2016 | US |
Number | Date | Country | |
---|---|---|---|
Parent | PCT/CA2017/050368 | Mar 2017 | US |
Child | 16115509 | US |