The present disclosure relates generally to building surveillance systems. The present disclosure relates more particularly to video devices for monitoring a building system.
A building can include surveillance or security equipment such as one or more video devices configured to record video inside and outside of the building. Such video devices can deter criminal activities to prevent dangers to employee health, reduce safety risks, prevent asset theft, prevent product contamination, and protect company stock value. However, there are instances in which the video devices may be inoperable, and the inoperability is not communicated to an entity that can quickly implement a repair. In such instances, the benefits of having video devices are defeated, and significant losses may occur as a result.
One embodiment of the present disclosure is a method for monitoring video devices of a plurality of buildings. The method comprises receiving video device data of a plurality of video devices of the plurality of buildings. The method further comprises determining a health state of each of the plurality of video devices based on video device data. The health state is a current state of the video device and includes a healthy state or an unhealthy state. The method also includes generating an alert in response to a determination that the health of one of the plurality of video devices is the unhealthy state and sending the alert to an external device. In response to the determination that the health of one of the plurality of video devices is the unhealthy state, the method includes automatically implementing an action to resolve the unhealthy state.
Another embodiment of the present disclosure is a system for monitoring video devices of a plurality of buildings. The system includes one or more memory devices configured to store instructions. When executed on one or more processors, the instructions cause the one or more processors to receive video device data of a plurality of video devices of the plurality of buildings. A health state of each of the plurality of video devices is determined based on the video device data of each of the plurality of video devices. The health state is a current state of the video device and is an healthy state or an unhealthy state. Determining the health state comprises comparing the video device data to a set of rules, the set of rules including a license warning rule associated with a software, a license length, and a warning length, where the health state of each of the plurality of video devices is based on the comparison. An alert is generated in response to a determination that the health of one of the plurality of video devices is the unhealthy state, and the alert is sent to an external device.
Another embodiment of the present disclosure is a building system comprising building equipment configured to operate to control one or more security conditions of the building, the building equipment comprising one or more video devices configured to collect video data. The building system further comprises a processing circuit configured to receive video device data of a plurality of video devices of the plurality of buildings. The processing circuit is also configured to determine a health state of each of the plurality of video devices based on the video device data of each of the plurality of video devices. The health state is a current state of the video device and is an healthy state or an unhealthy state. Determining the health state comprises comparing the video device data to a set of rules, the set of rules including a license warning rule associated with a software, a license length, and a warning length, where the health state of each of the plurality of video devices is based on the comparison. The comparison includes determining that a health state of the video device is the unhealthy state in response to a determination that the difference between a license start date of the software and the license length is the same or less than the warning length. An alert is generated in response to a determination that the health of one of the plurality of video devices is the unhealthy state, and the alert is sent to an external device. In response to determining the health state of one of the plurality of video devices is the unhealthy state, an action is implemented to automatically resolve the unhealthy state, and a graphical representation of the health state of each of the plurality of video devices is provided on a user display.
Various objects, aspects, features, and advantages of the disclosure will become more apparent and better understood by referring to the detailed description taken in conjunction with the accompanying drawings, in which like reference characters identify corresponding elements throughout. In the drawings, like reference numbers generally indicate identical, functionally similar, and/or structurally similar elements.
Referring generally to the FIGURES, systems and methods for monitoring video devices in a building system are shown, according to various exemplary embodiments. In some cases, there are a large number of video devices (e.g., security cameras, analysis systems, video storage systems, etc.) within a single building system. Oftentimes, a video management system (VMS) monitors one or more building systems. The VMS can include a monitoring platform configured to determine the health of a video device. In the case that a video device is unstable, the monitoring platform may generate and send an alert prompting for the resolution of a video device conflict. The conflict may be resolved remotely by a remote service resolution (RSR) team or on-site (e.g., dispatch service truck). In some embodiments, the monitoring platform may store video footage and/or video device statistics and other data.
Customers in the video security market may install video surveillance systems to deter criminal activities to prevent dangers to employee health, safety risks, asset theft, product contamination, and protect company stock value. Video clips may be used as evidence for prosecution and insurance claims making video surveillance systems a critical security tool for protecting business operations. In some embodiments, cloud based video analytics can be integrated into existing video systems to extend value by improving store operations such as conversion sale rates and cash register controls. A majority of cameras installed in a video surveillance system may be “networked cameras,” meaning they connect directly into some form of video management system (VMS) through internet protocol (IP). VMS primary function is to give the security management team tools to setup and configure cameras, view video, record, search, and integrate adjacent edge devices (intrusion, access control, triggers, and light strobes). Video power over Ethernet (POE) systems are gaining rapid adoption because of the ease of install and compatibility into building management systems (BMS). Most commercial VMS systems allow for integration of intrusion and access control systems so events can trigger video. VMS are either boxed systems, server based, or hybrid using the Information Technology (IT) network for connectivity, but this is where IT's responsibility stops as the installation of devices, configuration, software licenses, maintenance, and service is typically the responsibility of security management team, which do not traditionally come from an IT background.
Video systems are increasingly complex and costly to manage. Security teams do not know when video cameras have malfunctioned potentially missing a nefarious incident and risking life safety and asset loss. Unlike an existing break/fix model of resolving equipment failures, after the critical need of recording, the event has passed. The critical event itself is usually the trigger to retrieve video; however customers quickly realize that if the video system or camera was non-functional, no evidence was preserved making threat avoidance, criminal conviction, and/or insurance claims much more difficult or impossible to prove. Additionally, VMS setup and configuration is difficult across a fragmented component market where compatibility testing isn't comprehensive and interoperability is trial and error. Security teams are responsible for managing interoperability across cameras, servers, SW licenses, storage, clients, accounts, configurations, and analytics.
A health monitoring platform for managing video services may help reduce overall cost to serve customers. The health monitoring platform may provide customers with increased system uptime and reduced year over year (YOY) maintenance costs. The key performance indicators (KPIs) of the platform may include first time fix and serviceability metrics, trackable service level agreements (SLAs), and overall peace of mind. The platform may allow for more remote fixes and reduce on-site fixes furthering the cost reduction. Equipment replace sales may increase because the monitoring platform can provide data that identifies failures and therefore provides sales leads.
The health monitoring platform and its company may encounter a few challenges. Security monitoring companies may have to implement measures to avoid cybersecurity attacks that damage the reputation of the company and exposes sensitive customer information. In addition, cloud data privacy policy is continually being reviewed and many European Union (EU) countries have implemented safe guards to keep certain data from leaving the country. These safe guards may make architecting the health monitoring platform more difficult and more expensive, particularly for EU customers.
Referring now to
Both the building 100 and the parking lot 110 are at least partially in the field of view of the security camera 102, in some implementations. In some embodiments, multiple security cameras 102 may be used to capture the entire building 100 and parking lot 110 not in (or in to create multiple angles of overlapping or the same field of view) the field of view of a single security camera 102. The parking lot 110 may be used by one or more vehicles 104 where the vehicles 104 may be either stationary or moving (e.g. delivery vehicles). The building 100 and parking lot 110 may be further used by one or more pedestrians 106 who can traverse the parking lot 110 and/or enter and/or exit the building 100. The building 100 may be further surrounded by a sidewalk 108 to facilitate the foot traffic of one or more pedestrians 106, facilitate deliveries, etc. In other embodiments, the building 100 may be one of many buildings belonging to a single industrial park or commercial park having a common parking lot and security camera 102. In another embodiment, the building 100 may be a residential building or plurality of residential buildings that share a common roadway or parking lot.
In some embodiments, a security system may reside in building 100. The security system may be comprised of, but is not limited to, one or more security cameras 102, a monitoring system, and/or an access control system. The security cameras 102 may be used to capture rooms, passageways, lobbies, offices, and/or stairwells. The footage captured on the security cameras 102 may be viewable via the monitoring system. Security guards of building 100 may use the monitoring system to review recent activity in building 100.
Building 100 may have an access control system to monitor access to various entryways, rooms, floors, and restricted areas in general. In certain embodiments, the security system of building 100 may utilize biometrics and/or physical access cards. In some embodiments, biometrics (e.g., facial recognition) may be used to identify a user requesting access in building 100 and verify their identity. The biometrics access control system may scan a user's face, finger, and/or other body part to verify their identity. The scanned portion can be compared to existing data in the system for verification. Physical access cards may also be used to monitor access inside building 100. A user may obtain a physical identification (ID) card that provides them access to various entities of building 100. With the discussed methods of access control, a user may be given access to the entire building 100, a particular room, floor, or entryway, or a plurality of rooms, floors, and/or entryways. User access rights may be determined by the management of building 100.
Referring now to
Connected video server 204 may store data collected from buildings 100 and 206-210 via data collectors 212-218. As shown in
In some embodiments, one or more of data collectors 212-218 are “on-premises” collectors. These collectors may run building software (e.g., METASYS®) and may run “data collector” software. In some embodiments, one or more of data collectors 212-218 may be “hosted.” In this regard, the data collectors 212-218 may only run the data collector software while connected video software server 204 may run video device monitoring software. For this reason, connected video server 204 can be configured to perform the control functions of “on-premises” collectors.
When the data collectors 212-218 are hosted, data collectors 212-218 may be “lightweight” data collectors. These data collectors may have low processing power, low memory, and/or low data storage. In some embodiments, hosted data collectors may have a higher maximum point list than the on-premises collectors. The data collectors 212-218 may push collected data to the cloud (e.g., to a cloud server). In various embodiments, one of data collectors 212-218 may store collected data locally in a building server and/or use a local building server as a cloud server. This may accommodate multiple buildings at a particular site (e.g., a university campus). In some embodiments, instead of storing data in cloud storage (e.g., MICROSOFT AZURE®) the collected data may be stored in a local building server. In some embodiments, a particular data collector of the building may act as the local building server. However, a user may be able to access the locally stored data via the cloud even though the data is not automatically pushed to a cloud server.
In some instances, when Internet connection for one of buildings 100 and 206-210 is interrupted, the data collectors 212-218 for the building with an Internet outage may buffer data until Internet connection is reestablished. Then, after the Internet connect is reestablished, data collectors 212-218 may push the data to a cloud server and/or reconcile collected data. In some embodiments, communication between data collectors 212-218 and the cloud application is performed via a secure channel. In case of any connection issues between one of data collectors 212-218 and connected video server 204, connection information can be logged by both the collectors 212-218 as well on connected video server 204.
Still referring to
Network 202 may include services that facilitate managing the wireless and/or wired communication with data collectors 212-218. Network vendors may include, for example, cellular telecommunications providers as well as internet service providers. Communications via network 202 may leverage enterprise contracts and partnerships to optimize the cost of data transmission. Many network carriers provide a secure connection option as a part of premium services. However, a similar degree of network security can be achieved via employing trusted platform modules in data collectors 212-218 and using encrypted messaging. Data collectors 212-218 may use advanced message queuing protocol (AMQP) via an Internet-based secure transport. In various embodiments, each device and/or a portion of the devices communicating over network 202 use transport layer security (TLS), secure sockets layer (SSL), and/or any other cryptographic protocol to ensure integrity and/or security of the messages sent over network 202.
Still referring to
Connected video server 204 may partition data received from data collectors 212-218 based on customer. For example, building 100 and data collector 212 may be owned by customer A while buildings 206-208 and data collectors 212-218 may be owned by customer B. Both customer A and B can log into cloud server 432 via a URL and/or portal and see data relating to their respective equipment. The information may include customer name, serial numbers for data collectors 212-218, software versions for data collectors 212-218, video device settings, captured video, and status of a video device. In various embodiments, connected video server 204 may generate reports based on the information. Connected video server 204 may use the reports to generate a user interface to be displayed on an external user device.
Referring now to
The process 280 may begin at a customer site, specifically building 100. Building 100 may have one or more of the characteristics described with reference to
Feedback loop reports may include closed work orders, equipment uptime, mean service response, and/or critical push notifications. Connected video server 204 may send an alert requesting a video device conflict to be resolved (258). Upon receiving an alert, a remote service resolution (RSR) team 262 may attempt to identify and categorize the problem and fix it remotely. In the case that the problem cannot be fixed remotely, an on-site fix (e.g., dispatch service truck 266) may be required. Conflict resolution reports may be displayed via a user device (264). For example, these conflict resolution reports may demonstrate the success rate of the fix and/or the amount of time the fix took.
Referring now to
Camera system 220 may send an alert to the connected video server 204 notifying it of some event (222). The alert may be an alarm such as a storage alarm, voltage sensor alarm, or a content age alarm. The alert may also indicate a failure (e.g. DVR board failure), a warning (e.g. license warning), or video disruption (e.g. video loss and camera disconnected). The connected video server 204 receives the alert and determines how to proceed. The connected video server 204 will log the alert and any relevant event data. For example, the connected video server 204 may receive a server “server offline” alert. This may not be a crucial event so the connected video server 204 may log the event and wait 15 minutes before acting upon it. Upon determining that an event requires a solution, the connected video server 204 may send data to an interface server 258 to display a user interface and start a case with the resolution team 260 (224). The interface server 258 will generate the necessary report to alert a member of the resolution team 260. A member of the resolution team 260 may view the case may be created within 2 hours of receiving information from the connected video server 204 and the resolution team 260 may monitor the case queue. A member of the resolution team 260 may first attempt to resolve the issue remotely. If unable to resolve remotely, a field service technician may be dispatched for an on-site solution. The case may then be closed with appropriate disposition.
Referring now to
Network interface 324 can include wired or wireless communications interfaces (e.g., jacks, antennas, transmitters, receivers, transceivers, wire terminals, etc.) for conducting data communications with client device, server 204 or other external systems or devices. In various embodiments, communications conducted via interface 324 can be direct (e.g., local wired or wireless communications) or via a communications network (e.g., a WAN, the Internet, a cellular network, etc.). For example, network interface 324 can include an Ethernet card and port for sending and receiving data via an Ethernet-based communications link or network. In another example, network interface 324 can include a WiFi transceiver for communicating via a wireless network. In another example, network interface 324 can include cellular or mobile phone communications transceivers. In one embodiment, network interface 324 is a power line communications interface and/or an Ethernet interface.
Processing circuit 302 is shown to include a processor 304 and memory 306. Processor 304 can be a general purpose or specific purpose processor, an application specific integrated circuit (ASIC), one or more field programmable gate arrays (FPGAs), a group of processing components, or other suitable processing components. Processor 304 is configured to execute computer code or instructions stored in memory 306 or received from other computer readable media (e.g., CDROM, network storage, a remote server, etc.).
Memory 306 can include one or more devices (e.g., memory units, memory devices, storage devices, etc.) for storing data and/or computer code for completing and/or facilitating the various processes described in the present disclosure. Memory 306 can include random access memory (RAM), read-only memory (ROM), hard drive storage, temporary storage, non-volatile memory, flash memory, optical memory, or any other suitable memory for storing software objects and/or computer instructions. Memory 306 can include database components, object code components, script components, or any other type of information structure for supporting the various activities and information structures described in the present disclosure. Memory 306 can be communicably connected to processor 304 via processing circuit 302 and can include computer code for executing (e.g., by processor 304) one or more processes described herein. When processor 304 executes instructions stored in memory 306, processor 304 generally configures connected video server 204 (and more particularly processing circuit 302) to complete such activities.
Still referring to
Memory 306 includes complex event processing (CEP) engine 308 configured to handle all video device events in some embodiments. Complex event processing engine 308 is shown to include an event processor 310, an event log 312, and an alert service 314. Event processor 310 may be configured to process all of the incoming events. Event processor 310 may determine how severe the event is and may determine if a solution is necessary. Event processor 310 may determine that the event needs to be logged, for example in an event log 312. Event log 312 stores video device events with any relevant information (e.g., time, severity, etc.). For instance, if a particular video camera is down for 30 minutes, the event may be categorized as “high” severity and may be logged in the event log 312. Upon logging video device events, alert service 314 may generate alerts regarding the status of a video device. For example, in the case that a video device is down, an alert may be generated to alert the appropriate party (e.g., resolution team) that a solution is needed to bring the video device back up. Alert service 314 may receive the necessary data from event log 312, data storage 320, and/or video storage 322.
Connected video server 204 is shown to include a user interface manager 318. User interface manager 318 may generate user interfaces regarding video device information. Generated user interfaces may include reports for a resolution team and/or building management. In some embodiments, user interface manager 318 may generate user interfaces to display video footage from a video device. Examples of user interfaces generated by user interface manager 318 are explained in greater detail with connection to
Still referring to
Connected video server 204 is shown to include a video storage 322. Video storage 322 may store video footage received from data collector 212 via network interface 324. Video footage may originate from any of the video devices (e.g., security camera) at a customer site. Data collector 212 may send all video footage or a limited quantity of video footage (e.g., pending storage limits and thresholds of data sending) from a video device to be stored in video storage 322. In some embodiments, video storage 322 may be a database. For example, video storage 322 may be a relational database, object-oriented database, network database and/or hierarchical database. In certain embodiments, video storage 322 may be a data structure. For example, video storage may be stored in an array or list in video storage 322. Video data may be retrieved from the video storage 322, for example by the equipment monitor 316 and/or user interface manager 318.
Still referring to
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
Referring now to
The construction and arrangement of the systems and methods as shown in the various exemplary embodiments are illustrative only. Although only a few embodiments have been described in detail in this disclosure, many modifications are possible (e.g., variations in sizes, dimensions, structures, shapes and proportions of the various elements, values of parameters, mounting arrangements, use of materials, colors, orientations, etc.). For example, the position of elements may be reversed or otherwise varied and the nature or number of discrete elements or positions may be altered or varied. Accordingly, all such modifications are intended to be included within the scope of the present disclosure. The order or sequence of any process or method steps may be varied or re-sequenced according to alternative embodiments. Other substitutions, modifications, changes, and omissions may be made in the design, operating conditions and arrangement of the exemplary embodiments without departing from the scope of the present disclosure.
The present disclosure contemplates methods, systems and program products on any machine-readable media for accomplishing various operations. The embodiments of the present disclosure may be implemented using existing computer processors, or by a special purpose computer processor for an appropriate system, incorporated for this or another purpose, or by a hardwired system. Embodiments within the scope of the present disclosure include program products comprising machine-readable media for carrying or having machine-executable instructions or data structures stored thereon. Such machine-readable media can be any available media that can be accessed by a general purpose or special purpose computer or other machine with a processor. By way of example, such machine-readable media can comprise RAM, ROM, EPROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code in the form of machine-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer or other machine with a processor. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a machine, the machine properly views the connection as a machine-readable medium. Thus, any such connection is properly termed a machine-readable medium. Combinations of the above are also included within the scope of machine-readable media. Machine-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.
Although the figures show a specific order of method steps, the order of the steps may differ from what is depicted. Also two or more steps may be performed concurrently or with partial concurrence. Such variation will depend on the software and hardware systems chosen and on designer choice. All such variations are within the scope of the disclosure. Likewise, software implementations could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various connection steps, processing steps, comparison steps and decision steps.
This application claims the benefit of and priority to U.S. Provisional Application No. 62/721,526 filed Aug. 22, 2018, the entire disclosure of which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
62721526 | Aug 2018 | US |