WO1997007486A1 - Event monitoring - Google Patents

Event monitoring Download PDF

Info

Publication number
WO1997007486A1
WO1997007486A1 PCT/US1996/013436 US9613436W WO9707486A1 WO 1997007486 A1 WO1997007486 A1 WO 1997007486A1 US 9613436 W US9613436 W US 9613436W WO 9707486 A1 WO9707486 A1 WO 9707486A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
event
memory
triggering event
stored
Prior art date
Application number
PCT/US1996/013436
Other languages
French (fr)
Inventor
Roger A. Boehringer, Jr.
Original Assignee
Prism Video, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Prism Video, Inc. filed Critical Prism Video, Inc.
Priority to AU68515/96A priority Critical patent/AU6851596A/en
Publication of WO1997007486A1 publication Critical patent/WO1997007486A1/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19665Details related to the storage of video surveillance data
    • G08B13/19669Event triggers storage or change of storage policy
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19665Details related to the storage of video surveillance data
    • G08B13/19676Temporary storage, e.g. cyclic memory, buffer storage on pre-alarm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/188Capturing isolated or intermittent images triggered by the occurrence of a predetermined event, e.g. an object reaching a predetermined position

Definitions

  • This invention is related to monitoring an environment and, in particular, to recording, for later evaluation, the state of the environment at times proximate to the occurrence of an event.
  • the invention can be used to record, for example, digital video or audio data representing the state of an environment immediately before, during and/or immediately after a triggering event.
  • An "environment" to be monitored can include, for example, an activity or a location (either physical or virtual) .
  • activity of particular interest occurs just before, during, or just after (i.e., "proximate to") the occurrence of a particular event or type of event.
  • Some monitoring systems have obtained and recorded analog data, such as an analog videotape recording, so that the state of the environment during the period of monitoring can be subsequently evaluated.
  • monitoring systems are inadequate in enabling quick review of a particular period of time proximate to a particular event of interest, since it may be necessary to search through the entire set of data (e.g., videotape) to locate the time period of interest and, even if the location of the time period of interest is known, it is often necessary to progress through a relatively large portion of the data before accessing that time period.
  • entire set of data e.g., videotape
  • Other monitoring systems have obtained and recorded digital data, such as digital video data, to enable later evaluation of the state of the environment.
  • the digital data has been recorded directly on a persistent storage medium, such as a hard disk.
  • a persistent storage medium such as a hard disk.
  • the rate at which data can be obtained and recorded by such monitoring systems is limited. For example, when digital video data is recorded on a hard disk, the data for a typical video monitoring system can only be obtained at a rate of approximately one frame per second.
  • This rate is far too slow to enable an acceptable moving picture display to be generated (for comparison, television pictures are updated at a rate of 30 frames per second) , and may be slow enough to cause critical data to be missed (e.g., a moving object may only appear during a time between frames) or misinterpreted (e.g., the direction of movement of a moving object that is seen in one of the frames may not be susceptible of determination) .
  • Hard disks having somewhat greater speed are technologically possible; however, their cost is prohibitive. Additionally, hard disks operating at high speeds have decreased reliability. Further, the large amount of storage capacity available on typical persistent storage media is often not necessary for recording activity that is proximate in time to the occurrence of a particular event. In such situations, if the persistent storage media is used to record all of the digital video data, a large amount of data that is not of interest is recorded. This may make it difficult or time consuming to find the data of interest.
  • the invention monitors an environment and records, for later evaluation, data representing the state of the environment at times proximate to the occurrence of an event. Any type of data or combination of types of data, such as video and/or audio data, can be used to monitor the environment.
  • the invention enables a high degree of flexibility in defining the particular data to be obtained: variable amounts of data can be obtained before the event, after the event, or both before and after the event.
  • the invention is implemented so that data can be obtained quickly, reducing the possibility that important data will be missed and enhancing the quality of the display of the data. Only the data of interest, i.e., the data proximate to the event, is stored, thereby minimizing the required storage capacity and enabling the data to be accessed quickly and easily.
  • the invention remotely monitors the environment by: 1) recording data representing the state of one or more characteristics of the environment; 2) detecting the occurrence of a triggering event in the environment; 3) transferring, to a remote location, event data that is proximate in time to the triggering event; and 4) presenting the event data for evaluation at the remote location.
  • the data is recorded in a memory that is partitioned into a multiplicity of blocks.
  • the data is successively stored in the memory blocks. Once data storage in a memory block is begun, data is stored in that memory block until the memory block is filled with data. Once data has been stored in each of the memory blocks, data storage begins again in the first memory block in which data was stored. The data is once again successively stored in the memory blocks.
  • data storage can occur in any one of a number of ways in accordance with a pre-specified instruction or instructions.
  • data post-trigger data obtained after occurrence of the triggering event is first stored in the memory block (event block) into which data is being stored at the time the triggering event occurs until the memory block is filled with data, then subsequently stored in each of the remaining memory blocks until the remaining memory blocks are filled with data.
  • no post-trigger data is stored.
  • data storage in the event block is stopped and post-trigger data is stored then stored in each of the memory blocks until each of the memory blocks is filled with data.
  • post-trigger data is stored in the event block, and only the event block, until the event block is filed with data.
  • post-trigger data is stored for a predefined duration of time after occurrence of the triggering event.
  • the data is stored in a rapidly accessible memory such as a random access memory.
  • a rapidly accessible memory such as a random access memory.
  • the data can be obtained at a rate that is sufficiently fast to ensure that, for example, a moving picture display of the data is refreshed at a rate adequate to produce an acceptable display.
  • the data can be obtained at a rate that is sufficiently fast to greatly increase the likelihood that no important information regarding the state of the environment during any given period of time is missed.
  • the event data can be presented for evaluation by a human by, for example, generating a video display of the event data.
  • the event data can be evaluated automatically, by, for example, a computer, without intervention by a human.
  • the invention can be used with a variety of monitoring systems.
  • the invention can be used to monitor physical locations, such as stores, banks, prisons, restricted access areas, hazardous areas, and locations of suspected criminal activity.
  • the invention is useful to monitor activity at those locations during times that are proximate to an event of interest, such as a commission of a crime at the store or bank, an escape from the prison, an unauthorized intrusion into the restricted area, an accident in the hazardous area, or arrival or departure of persons from the suspected criminal location.
  • the invention can also be used to monitor a virtual "location," such as may exist on a computer network, to observe access to the location and, in particular, activity at the location during times proximate to the time of any suspicious or unauthorized access.
  • the invention can be used to monitor an activity (independent of the association of the activity with a physical location) , such as use of an automated bank teller machine or the performance of an automated manufacturing process, to observe the activity during time proximate to, for example, a malfunction in the automated manufacturing process or a theft from the automated bank teller machine.
  • FIG. IA is a block diagram of a system for remotely monitoring an environment.
  • FIG. IB is a block diagram of one implementation of the on-site data management system of the system of FIG. IA.
  • FIG. IC is a block diagram of one implementation of the remote data evaluation system of the system of FIG. IA.
  • FIG. 2 is a flow chart of a method according to the invention for obtaining data describing the state of an environment at times proximate to the occurrence of a triggering event.
  • FIG. 3 is a simplified representation of a memory partitioned into two blocks.
  • FIGS. 4A and 4B illustrate a combination of event data that can result from one definition of pre-trigger and post-trigger time according to the invention.
  • FIGS. 5A and 5B illustrate a combination of event data that can result from another definition of pre- trigger and post-trigger time according to the invention.
  • FIGS. 6A and 6B illustrate a combination of event data that can result from yet another definition of pre- trigger and post-trigger time according to the invention.
  • FIGS. 7A and 7B illustrate a combination of event data that can result from still another definition of pre- trigger and post-trigger time according to the invention.
  • FIGS. 8A through 8F illustrate several combinations of event data that can result from another definition of pre-trigger and post-trigger time according to the invention.
  • the invention monitors an environment for the occurrence of a predefined type of event ("triggering event") and records the state of the environment at times proximate to the occurrence of the triggering event, so that the state of the environment at those times can be evaluated at a later time.
  • triggering event a predefined type of event
  • environment is used broadly and can be used generally to refer to anything that can be monitored, such as an activity or location.
  • environments that can be monitored by the invention include stores, banks, prisons, restricted access areas, hazardous areas, areas of suspected criminal activity, locations on a computer network, automated bank teller machines and automated manufacturing processes.
  • the state of the environment is recorded by storing any appropriate data, such as, for example, video data, audio data or transaction data (e.g., equipment status) .
  • the type of data stored depends on the environment and the aspects of the environment that are of interest. For example, in monitoring a store, video data and, perhaps, audio data can be stored. For an environment such as an automated bank teller machine, data regarding activations of the machine can be stored.
  • the invention stores data ("event data") that is proximate in time to the triggering event.
  • the invention enables a high degree of flexibility in defining the particular time period (or set of transactions) during which event data is obtained.
  • the invention can be used to store event data that occurs before the triggering event, after the triggering event, or both before and after the triggering event.
  • the invention allows variation of the amount of data obtained before and/or after the triggering event.
  • the invention can be embodied in a variety of systems including remote surveillance systems such as can be used for security monitoring (e.g., monitoring of stores or restricted areas) , monitoring of areas dangerous to humans (e.g., radioactive areas in nuclear power plants, hazardous waste areas, underwater locations) or monitoring of suspected criminal activities by law enforcement agencies.
  • the invention can also be embodied in, for example, teleconferencing systems that are increasingly used by geographically dispersed businesses.
  • FIG. IA is a block diagram of a system 100 for remotely monitoring an environment.
  • the system 100 includes a microphone 101, a video camera 102, an on-site data management system 103 and a remote data evaluation system 104.
  • the microphone 101 acquires audio data and transmits it to the on-site data management system 103.
  • the video camera 102 acquires video data and transmits it to the on-site data management system 103.
  • any appropriate data acquisition apparatus can be used to acquire data regarding the system being monitored; the microphone 101 and video camera 102 are shown for purposes of illustration and do not represent a limitation upon the invention.
  • the on-site data management system 103 accepts the data from the microphone 101 and video camera 102.
  • the on-site data management system 103 stores a continually updated set of current data in a first memory device.
  • a set of current data (event data) obtained proximate in time to the triggering event is selected according to a set of pre-determined specifications and stored permanently in a second memory device.
  • the on-site data management system 103 sends the event data to the remote data evaluation system 104 via a communication line 105. Any appropriate communication line can be used.
  • the remote data evaluation system 104 can then be used to evaluate the event data.
  • FIG. IB is a block diagram of one implementation of the on-site data management system 103 of the system 100 of FIG. IA.
  • the on-site data management system 104 includes a processor 111, a data capture device 112, a first memory device 113, a second memory device 114 and a communications device 115.
  • the processor 111, data capture device 112, and communications device 115 are interconnected by a communications bus (not shown) , which can be, for example, a conventional ISA bus.
  • Acquired data is input to the on-site data management system 104 through the data capture device 112.
  • the data capture device 112 can be implemented, for example, by a multiplicity of discrete interconnected electronic components or a single integrated circuit chip.
  • the data capture device 112 is configured to accept data, in a manner known to those skilled in the art, from whatever data acquisition apparatus is being used with the system 100. In addition to accepting data from the data acquisition apparatus, the data capture device 112 can perform other functions. For example, the data capture device 112 can be configured to perform data compression, condition the data in a desired manner (e.g., for video data, the data capture device 112 may be configured to perform line averaging and/or frame averaging) , or zoom into a portion of the data. Again, each of these functions can be implemented on the data capture device 112 in a manner known to those skilled in the art. Illustratively, the data capture device 112 can be one of the capture cards made by Prism Video, Inc. located in Irvine, California.
  • the obtained data is transmitted from the ' data capture device 112 along the communications bus to the processor 111.
  • the processor 111 can be any appropriate commercially available computer processor.
  • the processor 111 mediates the operation of the on-site data management device 104. For example, as data is obtained by the data capture device 112, the processor 111 transmits the data to a first memory device 113 that is used to store a set of the most current obtained data. Additionally, when updates to the data in the first memory device 113 necessitate that older data be eliminated from the first memory device 113, the processor 111 causes the older data to be removed from the first memory device 113 and replaced with the updated data. (The manner in which the data stored in the first memory device 113 is updated is explained in more detail below with respect to FIG.
  • the processor 111 causes the event data to be transferred from the first memory device 113 to the second memory device 114 after the event data has been completely obtained.
  • the processor 111 also causes data to be transferred from the second memory device 114 to the communications device 115 for transmission to the remote data evaluation system 104.
  • the first memory device 113 can be embodied by any appropriate conventional commercially available memory that can be accessed easily and rapidly.
  • the first memory device is a random access memory (RAM) .
  • the RAM is implemented as a RAM disk, so that moving data out of the RAM is easier than would be the case in a standard RAM.
  • the storage capacity of the first memory device 113 determines the amount of current data that can be stored at any one time and, therefore, affects the amount of event data used to represent the state of the environment at times proximate to the triggering event. For a typical television picture, use of an 8 MB RAM enables approximately 1 minute of event data to be obtained at a frame rate of 7.5 frames per second.
  • a RAM rather than, for instance, a hard disk to store the current data is advantageous for several reasons.
  • the second memory device 114 is used to permanently store the event data.
  • the second memory device 114 can be embodied by any persistent memory device such as, for example, a conventional hard disk (illustrated in FIG. IB) ; any appropriate commercially available such device having adequate storage capacity can be used. Since, according to the invention, only the event data is permanently stored, the second memory device 114 can have much less storage capacity than has been the case with memories of other, similar monitoring systems. Further, permanently storing only the event data enables the event data to be located quickly and easily when it is desired to evaluate the event data.
  • the communications device 115 enables transmission of data from the on-site data management system 104 through a communications line to the remote data evaluation system 104.
  • Any appropriate type of communications line can be used.
  • the communications line can be a conventional telephone line and the communications device 115 can be any conventional commercially available modem.
  • the modem has as fast a baud rate as practical or economically feasible.
  • Other possible communications alternatives include a high-speed phone line such as ISDN, a very high-speed phone line such as Tl, satellite systems, connection over the Internet, or communication over a serial cable.
  • FIG. IC is a block diagram of one implementation of the remote data evaluation system 104 of the system 100.
  • the remote data evaluation system 104 includes a digital computer 121, a user input device 122, a display device 123 and a communications device 124.
  • the digital computer 121, user input device 122, display device 123 and communications device 124 are interconnected by a communications bus (not shown) , which can be, for example, a conventional ISA bus.
  • the communications device 124 enables communication to and from the remote data evaluation system 104.
  • the communications device 124 can be any conventional commercially available modem. Preferably, the modem has as fast a baud rate as practical or economically feasible.
  • the digital computer 121 is used to control operation of the remote data evaluation system 104 and includes a processor and memory. Any appropriate commercially available digital computer can be used.
  • the digital computer 121 includes a conventional processor, non- persistent memory device, and persistent memory device.
  • the digital computer also includes a data display device that is similar to the data capture device 112 (FIG. IB) and performs similar functions, such as decompression of compressed data.
  • the user input device 122 is used by a user to control operation of the remote data evaluation system 104.
  • the user input device 122 can be, for example, a keyboard or a mouse.
  • the display device 123 can be used to display the obtained data.
  • the display device 123 can be any conventional display device that is appropriate for the type of data that is obtained. For example, a television might be used to display video data and an audio speaker might be used to display audio data.
  • the display device 123 can used for continuous real-time display of the data as it is obtained.
  • the display device 123 can also be used to display the event data.
  • the display device 123 might also be used to communicate to the user when a triggering event has occurred.
  • an appropriate computer program can be implemented on the digital computer 121 and processor 111 to give a user various options regarding how to display the event data.
  • One option allows the user to implement the data compression technique implemented on the data capture device 112; another option allows the user to bypass compression of the event data. Compression of the event data enables the event data to be sent to the remote data evaluation system 104 more quickly, so that the user can evaluate the event data as soon as possible; however, the display of the event data by the display device 123 will lose some resolution. Conversely, if the event data is not compressed, the event data is sent to the remote data evaluation system 104 more slowly; however, the display of the event data by the display device 123 will have the best possible resolution.
  • the user can also choose to use the zoom feature implemented on the data capture device 112 to cause a desired portion of the data to be displayed in greater detail. Without zoom, the entire set of event data is displayed.
  • FIG. 2 is a flow chart of a method 200 according to the invention for obtaining event data describing the state of an environment at times proximate to the occurrence of a triggering event.
  • the method 200 can be implemented, for example, in the system 100 of FIG. 1.
  • the method 200 causes event data to be obtained for a period of time that is defined by one or more pre-specified instructions.
  • the event data can be obtained before the triggering event, after the triggering event, or both before and after the triggering event.
  • the periods of time before and/or after the triggering event for which data is obtained can be varied according to the pre-specified instructions.
  • the invention enables a high degree of flexibility in defining the particular time period during which event data is obtained.
  • the size of the memory in which the data to be obtained will be stored is determined. This size is determined as whatever portion of the memory is not being used by other applications. This size of the memory is used, together with the number of blocks into which the memory is partitioned (see step 202) , to determine the amount of data that can be stored in each of those blocks.
  • the memory is partitioned into blocks.
  • the memory can be partitioned into any number of blocks.
  • the number of blocks into which the memory is partitioned can affect the amount of event data that the method 200 stores for each triggering event.
  • the number of blocks increases, a larger amount of event data will tend to be stored, since the increased granularity of the memory partitioning decreases the likelihood that the obtaining of post-trigger data will leave large portions of one or more blocks vacant (see, e.g., some of FIGS. 4A through 8F below) .
  • the size of each block decreases, the possibility that relatively large portions of memory blocks will be left vacant increases.
  • a memory 300 is partitioned into two blocks 301 and 302.
  • a block of memory is determined into which data will first be stored.
  • the method 200 stores the obtained data in successive memory blocks, filling each memory block before beginning to store data in another memory block.
  • the blocks of memory are assigned a particular order.
  • the processor 111 can check the value of a trigger flag (e.g., a bit of a register in the RAM in which the data is stored) , which can take on one of two values, one value indicating that no triggering event has occurred and the other indicating that a triggering event has occurred.
  • a triggering event may be indicated, for example, by the manual or automatic tripping of an alarm at the site being monitored, the alarm being configured to change the value of the trigger flag when tripped.
  • the processor ill may use an appropriate computer program to evaluate the incoming data to determine if a triggering event has occurred.
  • the particular manner in which a triggering event is detected will vary depending upon the type of data being obtained.
  • the data may be evaluated for the presence of anomalous patterns.
  • the method 200 will perform one of two series of steps. While a triggering event is not detected, the method 200 continually updates the data stored in the memory. Data is stored in successive blocks of memory. Once data storage in a memory block begins, that block is filled with data before data storage in a new block begins. Thus, in step 205, before storing data, a check is made to determine whether the memory block into which data is currently being stored is full.
  • step 207 the data is stored in the next available memory location of that memory block.
  • the invention causes data to be progressively stored in a memory block such that all of the stored data in the memory block is contiguous. However, this need not necessarily be the case and, generally, data can be stored at any available location in the memory block. If the memory block is full, then, in step 206, the next sequential block of memory is determined.
  • an order of memory blocks is established at the beginning of the method 200.
  • the next sequential memory block is just the next memory block in the order.
  • the next sequential memory block is the first memory block in which data was stored.
  • it is important that data be stored in memory blocks in that order in order to ensure that the maximum amount of event data is obtained and in order to facilitate the establishment of the chronological order of the event data for use in display or analysis of the event data.
  • the data is stored in that block, as shown by step 207. '
  • the memory 300 is partitioned into two blocks 301 and 302. (Note that the blocks 301 and 302 could store different types of data, e.g., video data in block 301 and audio data in block 302.)
  • the memory 300 also includes a header 303, apart from the blocks 301 and 302, that includes information describing the arrangement of the memory 300.
  • the header 303 can include, among other information, the beginning memory address of each block 301 and 302. Together with the size of the memory and the number of blocks (here, two) , these beginning memory addresses define the location of the blocks 301 and 302 in the memory 300.
  • Each block 301 and 302 includes a block header 304 and 305, respectively, and data 306 and 307, respectively.
  • the block headers 304 and 305 each include a specification of the frame size, frame rate and time at which data began to be saved for the data stored in the corresponding blocks 301 and 302. Storing of data as shown by steps 205 through 207 can continue indefinitely. Storing of data in this manner will continue until either the method is terminated or a triggering event is detected.
  • the duration of the time (“post-trigger time”) after the triggering event for which data (“post-trigger data”) is to be obtained is determined, as shown by step 208.
  • the duration of the post-trigger time can be determined in a variety of ways, some of which are described and illustrated below with respect to FIGS. 4A through 8F.
  • the post-trigger time can be defined so that all of the event data occurs after the triggering event (and none before the triggering event) , none of the event data occurs after the triggering event (and all before the triggering event) , or any intermediate amount of event data occurs after the triggering event (and the remainder before the triggering event) .
  • the post-trigger time can either be defined directly or indirectly by defining the pre-trigger time. Once the duration of the post-trigger time is determined, then, in step 209, event data ("post-trigger data”) is obtained for the duration of the post-trigger time.
  • FIGS. 4A and 4B illustrate a combination of event data that can result from one definition of pre-trigger and post-trigger time.
  • FIGS. 4A and 4B (and FIGS. 5A through 8F below) , increasing time moves from left to right.
  • FIGS. 4A and 4B can result in data in the rightmost block having been obtained before data in the leftmost block.
  • FIG. 4A illustrates two blocks of data, blocks 401 and 402, at the time that a triggering event, designated by 403, occurs.
  • the areas in blocks 401 and 402 that are filled with upwardly slanting lines represent data ("pre- trigger data") stored before occurrence of the triggering event. (Upwardly slanting lines also represent pre- trigger data in each of FIGS. 4B through 8F below.)
  • the triggering event occurred during the time that data was being stored in block 401 (the "event block”) .
  • Block 402 is completely full of data obtained prior to the triggering event.
  • Block 401 is only partially full of data. When data began to be stored in block 401 after filling block 402 with data, the previously stored data in block 401 was eliminated. When the triggering event occurred, block 401 had not yet been completely filled with data.
  • FIG. 4B illustrates the data content of the two blocks 401 and 402 after the post-trigger data has been obtained according to this definition of pre-trigger and post-trigger time.
  • a predefined set of instructions specifies that, upon occurrence of a triggering event, post-trigger data is obtained until the event block ' lock 401) and all other blocks (here, only block 402) are completely full of data.
  • the post-trigger data is F , - , -"r. by the downwardly slanting lines in FIG. 4B. (Downwardly slanting lines also represent post-trigger data in each of FIGS. 4A through 8F below.)
  • the post- trigger data stored in block 402 replaces all of the previously stored pre-trigger data.
  • block 401 includes both pre-trigger data and post-trigger data, since, when the triggering event occurred, data storage in block 401 did not begin at the beginning of block 401, but rather continued at the location in block 401 at which data was being stored at the time the triggering event occurred.
  • FIGS. 5A and 5B illustrate a combination of event data that can result from another definition of pre- trigger and post-trigger time.
  • FIG. 5A again illustrates blocks 401 and 402 at the time that the triggering event designated by 403 occurs.
  • a predefined set of instructions specifies that no post- trigger data is to be obtained. Consequently, FIG. 5B, which illustrates the data content of the blocks 401 and 402 after the post-trigger data has been obtained, looks exactly like FIG. 5A, i.e., only pre-trigger data is obtained.
  • FIGS. 6A and 6B illustrate a combination of event data that can result from yet another definition of pre- trigger and post-trigger time.
  • FIG. 6A again illustrates blocks 401 and 402 at the time that the triggering event designated by 403 occurs.
  • FIG. 6B illustrates the data content of the two blocks 401 and 402 after the post- trigger data has been obtained according to this definition of pre-trigger and post-trigger time.
  • a predefined set of instructions specifies that the storage of post-trigger data begins at the beginning of the next sequential memory block after the event block and that post-trigger data is stored until all memory blocks including the event block (here, blocks 401 and 402) are completely filled with data. Again, as in FIG.
  • FIGS. 7A and 7B illustrate a combination of event data that can result from still another definition of pre- trigger and post-trigger time.
  • FIG. 7A again illustrates blocks 401 and 402 at the time that the triggering event designated by 403 occurs.
  • FIG. 7B illustrates the data content of the two blocks 401 and 402 after the post- trigger data has been obtained according to this definition of pre-trigger and post-trigger time.
  • a predefined set of instructions specifies that storage of post-trigger data continues in the event block (block 401) at the location at which data was being stored when the triggering event occurred and continues until the event block is filled with data.
  • the pre-trigger data in both blocks 401 and 402 is retained, while post-trigger data fills the portion of block 401 not used by pre- trigger data.
  • FIGS. 8A through 8F illustrate several combinations of event data that can result from another definition of pre-trigger and post-trigger time.
  • FIGS. 8A, 8C and 8E again illustrates blocks 401 and 402 at the time that the triggering event designated by 403 occurs.
  • a predefined set of instructions specifies that the storage of post-trigger data continues in the event block (block 401) at the location at which data was being stored when the triggering event occurred and continues until a specified time (or, equivalently, for a specified duration of time) .
  • FIGS. 8B, 8D and 8F illustrates the data content of the two blocks 401 and 402 after the post- trigger data has been obtained according to this definition of pre-trigger and post-trigger time.
  • the specified time designated by 801 occurs while data is still being stored in block 401.
  • the pre-trigger data in both blocks 401 and 402 is retained, while post-trigger data fills some, but not all, of the portion of block 401 not used by pre-trigger data.
  • the specified time designated by 802 occurs after data has begun to be stored in block 402, but before block 402 is completely filled with data.
  • the pre-trigger data in block 401 is retained, the pre-trigger data in block 402 is lost, since post-trigger data has begun to be written in block 402.
  • Post-trigger data fills the entire portion of block 401 not used by pre-trigger data, as well as the portion of block 402 up until the occurrence of the designated time 802.
  • the specified time designated by 803 occurs after post- trigger data has completely filled block 402 and data has begun to be stored in block 401.
  • the post-trigger data in block 402 completely replaces the pre-trigger data previously stored in block 402.
  • Post-trigger data also partially fills block 401, causing the pre-trigger data in block 401 to be lost.
  • FIGS. 4A through 8F above illustrate combinations of event data that result from various definitions of pre- trigger and post-trigger time, when the memory in which the event data is stored is divided into two blocks. Each of the above-described definitions could also be applied when the memory has been divided into more than two blocks.
  • the post-trigger data is stored in the memory.
  • the data that is stored in the memory represents the event data.
  • this data is then permanently stored in a non ⁇ volatile memory.
  • the event data is transferred from the first memory device 113 (e.g., RAM) to the second memory device 114 (e.g., hard disk) .
  • the event data is made available for use.
  • the event data is evaluated to ascertain information of interest regarding the state of the environment at times proximate to the time of occurrence of the triggering event.
  • the event data is evaluated at a location that is remote from the environment being monitored, necessitating that the event data be communicated to the remote location.
  • the event data is communicated from the on-site data management system 103 to the remote data evaluation system 104.
  • An indication that a triggering event has occurred (“alarm") must also be communicated to the location where the evaluation will be performed.
  • Either or both of the alarm and the event data can be communicated automatically, or manually at the request of a user.
  • the monitoring system can be configured so that the user may or may not receive a conspicuous notification of the alarm.
  • a monitoring system according to the invention that sends the event data to be evaluated only when so instructed by a user might be used in monitoring a cash register at a store for possible stealing by employees.
  • a monitoring system according to the invention that sends the event data automatically (and immediately upon acquisition) might be used in monitoring the security of a location such as a store or prison.
  • a monitoring system can proceed to obtain additional information regarding the environment being monitored. Continuing to obtain additional information in this manner can occur either automatically, or manually at the instruction of a user. Further, it is possible for the invention to cause additional event data regarding a subsequent triggering event to be obtained and stored.
  • a monitoring system according to the invention can be constructed so that each of the sets of event data are presented separately for evaluation by the user. The system can further be constructed to appropriately identify each set of event data (e.g., with icons or as choices in a list) and enable the user to select which set of event data is to be evaluated.
  • the event data can be displayed for evaluation by a human. This may be done for video data using, for example, a video display such as the video display device 123 of the system 100 (FIG. 1) . If the data is audio data, the data may be displayed, for example, with an appropriate sound system.
  • the event data can be evaluated automatically, without human intervention.
  • This can be done for example, for example, using a digital computer such as can be used in the system 100 to implement the processor 121 and memory 122.
  • the automatic evaluation can be done using predetermined evaluation criteria that may be implemented in, for example, an appropriate computer program that runs on the digital computer.

Abstract

The invention monitors an environment and records, for later evaluation, data representing the state of the environment at times proximate to the occurrence of an event. Any kind of data, such as video or audio data, can be used to monitor the environment. The invention enables a high degree of flexibility in defining the particular data to be obtained: variable amounts of data can be obtained before the event, after the event, or both before and after the event. The invention can be embodied in a variety of systems such as, for example, remote surveillance and identification systems. Preferably, the data is stored in a rapidly accessible memory such as a random access memory, so that the data can be obtained at a rate that is sufficiently fast to ensure an acceptable display and the data can be retrieved from the memory easily and quickly. The data is stored in a way that reduces the required memory storage capacity and that enables the data of interest to be easily and quickly accessed.

Description

EVENT MONITORING
BACKGROUND OF THE INVENTION
This invention is related to monitoring an environment and, in particular, to recording, for later evaluation, the state of the environment at times proximate to the occurrence of an event. The invention can be used to record, for example, digital video or audio data representing the state of an environment immediately before, during and/or immediately after a triggering event.
There are a variety of situations in which it is desirable to monitor an environment. An "environment" to be monitored can include, for example, an activity or a location (either physical or virtual) . Frequently when monitoring an environment, activity of particular interest occurs just before, during, or just after (i.e., "proximate to") the occurrence of a particular event or type of event. Some monitoring systems have obtained and recorded analog data, such as an analog videotape recording, so that the state of the environment during the period of monitoring can be subsequently evaluated. However, such monitoring systems are inadequate in enabling quick review of a particular period of time proximate to a particular event of interest, since it may be necessary to search through the entire set of data (e.g., videotape) to locate the time period of interest and, even if the location of the time period of interest is known, it is often necessary to progress through a relatively large portion of the data before accessing that time period.
Other monitoring systems have obtained and recorded digital data, such as digital video data, to enable later evaluation of the state of the environment. The digital data has been recorded directly on a persistent storage medium, such as a hard disk. However, because accessing such storage media is relatively time consuming, the rate at which data can be obtained and recorded by such monitoring systems is limited. For example, when digital video data is recorded on a hard disk, the data for a typical video monitoring system can only be obtained at a rate of approximately one frame per second. This rate is far too slow to enable an acceptable moving picture display to be generated (for comparison, television pictures are updated at a rate of 30 frames per second) , and may be slow enough to cause critical data to be missed (e.g., a moving object may only appear during a time between frames) or misinterpreted (e.g., the direction of movement of a moving object that is seen in one of the frames may not be susceptible of determination) . Hard disks having somewhat greater speed are technologically possible; however, their cost is prohibitive. Additionally, hard disks operating at high speeds have decreased reliability. Further, the large amount of storage capacity available on typical persistent storage media is often not necessary for recording activity that is proximate in time to the occurrence of a particular event. In such situations, if the persistent storage media is used to record all of the digital video data, a large amount of data that is not of interest is recorded. This may make it difficult or time consuming to find the data of interest.
Consequently, it is desirable to be able to obtain and record data representing the state of an environment in a manner that enables data of interest, e.g., data proximate to a particular event, to be retrieved easily and quickly. If the obtained data is digital, it is desirable to be able to obtain the data at a fast rate that enables generation of an acceptable moving picture and that ensures, with a high degree of certainty, that all important information is captured and capable of accurate evaluation. It is also desirable to store the obtained data in a way that minimizes the storage capacity (and, thus, the expense) required. Finally, it is desirable to be able to obtain and store data of more than one type, e.g., audio, video.
SUMMARY OF THE INVENTION
The invention monitors an environment and records, for later evaluation, data representing the state of the environment at times proximate to the occurrence of an event. Any type of data or combination of types of data, such as video and/or audio data, can be used to monitor the environment. The invention enables a high degree of flexibility in defining the particular data to be obtained: variable amounts of data can be obtained before the event, after the event, or both before and after the event. The invention is implemented so that data can be obtained quickly, reducing the possibility that important data will be missed and enhancing the quality of the display of the data. Only the data of interest, i.e., the data proximate to the event, is stored, thereby minimizing the required storage capacity and enabling the data to be accessed quickly and easily.
In one embodiment, the invention remotely monitors the environment by: 1) recording data representing the state of one or more characteristics of the environment; 2) detecting the occurrence of a triggering event in the environment; 3) transferring, to a remote location, event data that is proximate in time to the triggering event; and 4) presenting the event data for evaluation at the remote location. The data is recorded in a memory that is partitioned into a multiplicity of blocks. The data is successively stored in the memory blocks. Once data storage in a memory block is begun, data is stored in that memory block until the memory block is filled with data. Once data has been stored in each of the memory blocks, data storage begins again in the first memory block in which data was stored. The data is once again successively stored in the memory blocks. Each time data storage in a memory block begins, any existing data in that block is eliminated. Data is iteratively stored in the memory blocks as described above, until the predefined event occurs. This manner of storing the obtained data greatly reduces the required memory storage capacity (and associated expense) . Further, only event data is permanently stored, enabling the event data to be retrieved easily and quickly.
Once a triggering event occurs, data storage can occur in any one of a number of ways in accordance with a pre-specified instruction or instructions. In a first approach, data (post-trigger data) obtained after occurrence of the triggering event is first stored in the memory block (event block) into which data is being stored at the time the triggering event occurs until the memory block is filled with data, then subsequently stored in each of the remaining memory blocks until the remaining memory blocks are filled with data. In a second approach, no post-trigger data is stored. In a third approach, upon occurrence of the triggering event, data storage in the event block is stopped and post-trigger data is stored then stored in each of the memory blocks until each of the memory blocks is filled with data. In a fourth approach, post-trigger data is stored in the event block, and only the event block, until the event block is filed with data. In a fifth approach, post-trigger data is stored for a predefined duration of time after occurrence of the triggering event.
According to the invention, the data is stored in a rapidly accessible memory such as a random access memory. Thus, the data can be obtained at a rate that is sufficiently fast to ensure that, for example, a moving picture display of the data is refreshed at a rate adequate to produce an acceptable display. Further, the data can be obtained at a rate that is sufficiently fast to greatly increase the likelihood that no important information regarding the state of the environment during any given period of time is missed.
The event data can be presented for evaluation by a human by, for example, generating a video display of the event data. Alternatively, the event data can be evaluated automatically, by, for example, a computer, without intervention by a human.
The invention can be used with a variety of monitoring systems. For example, the invention can be used to monitor physical locations, such as stores, banks, prisons, restricted access areas, hazardous areas, and locations of suspected criminal activity. The invention is useful to monitor activity at those locations during times that are proximate to an event of interest, such as a commission of a crime at the store or bank, an escape from the prison, an unauthorized intrusion into the restricted area, an accident in the hazardous area, or arrival or departure of persons from the suspected criminal location. The invention can also be used to monitor a virtual "location," such as may exist on a computer network, to observe access to the location and, in particular, activity at the location during times proximate to the time of any suspicious or unauthorized access. Additionally, the invention can be used to monitor an activity (independent of the association of the activity with a physical location) , such as use of an automated bank teller machine or the performance of an automated manufacturing process, to observe the activity during time proximate to, for example, a malfunction in the automated manufacturing process or a theft from the automated bank teller machine. BRIEF DESCRIPTION OF THE DRAWINGS
FIG. IA is a block diagram of a system for remotely monitoring an environment.
FIG. IB is a block diagram of one implementation of the on-site data management system of the system of FIG. IA.
FIG. IC is a block diagram of one implementation of the remote data evaluation system of the system of FIG. IA. FIG. 2 is a flow chart of a method according to the invention for obtaining data describing the state of an environment at times proximate to the occurrence of a triggering event.
FIG. 3 is a simplified representation of a memory partitioned into two blocks.
FIGS. 4A and 4B illustrate a combination of event data that can result from one definition of pre-trigger and post-trigger time according to the invention.
FIGS. 5A and 5B illustrate a combination of event data that can result from another definition of pre- trigger and post-trigger time according to the invention.
FIGS. 6A and 6B illustrate a combination of event data that can result from yet another definition of pre- trigger and post-trigger time according to the invention. FIGS. 7A and 7B illustrate a combination of event data that can result from still another definition of pre- trigger and post-trigger time according to the invention.
FIGS. 8A through 8F illustrate several combinations of event data that can result from another definition of pre-trigger and post-trigger time according to the invention.
DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION
The invention monitors an environment for the occurrence of a predefined type of event ("triggering event") and records the state of the environment at times proximate to the occurrence of the triggering event, so that the state of the environment at those times can be evaluated at a later time. Herein, "environment" is used broadly and can be used generally to refer to anything that can be monitored, such as an activity or location. Illustratively, environments that can be monitored by the invention include stores, banks, prisons, restricted access areas, hazardous areas, areas of suspected criminal activity, locations on a computer network, automated bank teller machines and automated manufacturing processes.
The state of the environment is recorded by storing any appropriate data, such as, for example, video data, audio data or transaction data (e.g., equipment status) . The type of data stored depends on the environment and the aspects of the environment that are of interest. For example, in monitoring a store, video data and, perhaps, audio data can be stored. For an environment such as an automated bank teller machine, data regarding activations of the machine can be stored. The invention stores data ("event data") that is proximate in time to the triggering event. The invention enables a high degree of flexibility in defining the particular time period (or set of transactions) during which event data is obtained. The invention can be used to store event data that occurs before the triggering event, after the triggering event, or both before and after the triggering event. Further, the invention allows variation of the amount of data obtained before and/or after the triggering event. The invention can be embodied in a variety of systems including remote surveillance systems such as can be used for security monitoring (e.g., monitoring of stores or restricted areas) , monitoring of areas dangerous to humans (e.g., radioactive areas in nuclear power plants, hazardous waste areas, underwater locations) or monitoring of suspected criminal activities by law enforcement agencies. The invention can also be embodied in, for example, teleconferencing systems that are increasingly used by geographically dispersed businesses.
FIG. IA is a block diagram of a system 100 for remotely monitoring an environment. The system 100 includes a microphone 101, a video camera 102, an on-site data management system 103 and a remote data evaluation system 104. The microphone 101 acquires audio data and transmits it to the on-site data management system 103. Likewise, the video camera 102 acquires video data and transmits it to the on-site data management system 103. Generally, any appropriate data acquisition apparatus can be used to acquire data regarding the system being monitored; the microphone 101 and video camera 102 are shown for purposes of illustration and do not represent a limitation upon the invention. The on-site data management system 103 accepts the data from the microphone 101 and video camera 102. As the data is received, the on-site data management system 103 stores a continually updated set of current data in a first memory device. Upon the occurrence of a triggering event, a set of current data (event data) obtained proximate in time to the triggering event is selected according to a set of pre-determined specifications and stored permanently in a second memory device. Either automatically or upon request from the remote data evaluation system 104, the on-site data management system 103 sends the event data to the remote data evaluation system 104 via a communication line 105. Any appropriate communication line can be used. The remote data evaluation system 104 can then be used to evaluate the event data.
FIG. IB is a block diagram of one implementation of the on-site data management system 103 of the system 100 of FIG. IA. The on-site data management system 104 includes a processor 111, a data capture device 112, a first memory device 113, a second memory device 114 and a communications device 115. The processor 111, data capture device 112, and communications device 115 are interconnected by a communications bus (not shown) , which can be, for example, a conventional ISA bus. Acquired data is input to the on-site data management system 104 through the data capture device 112. The data capture device 112 can be implemented, for example, by a multiplicity of discrete interconnected electronic components or a single integrated circuit chip. The data capture device 112 is configured to accept data, in a manner known to those skilled in the art, from whatever data acquisition apparatus is being used with the system 100. In addition to accepting data from the data acquisition apparatus, the data capture device 112 can perform other functions. For example, the data capture device 112 can be configured to perform data compression, condition the data in a desired manner (e.g., for video data, the data capture device 112 may be configured to perform line averaging and/or frame averaging) , or zoom into a portion of the data. Again, each of these functions can be implemented on the data capture device 112 in a manner known to those skilled in the art. Illustratively, the data capture device 112 can be one of the capture cards made by Prism Video, Inc. located in Irvine, California.
The obtained data is transmitted from the' data capture device 112 along the communications bus to the processor 111. The processor 111 can be any appropriate commercially available computer processor. The processor 111 mediates the operation of the on-site data management device 104. For example, as data is obtained by the data capture device 112, the processor 111 transmits the data to a first memory device 113 that is used to store a set of the most current obtained data. Additionally, when updates to the data in the first memory device 113 necessitate that older data be eliminated from the first memory device 113, the processor 111 causes the older data to be removed from the first memory device 113 and replaced with the updated data. (The manner in which the data stored in the first memory device 113 is updated is explained in more detail below with respect to FIG. 2.) Further, when a triggering event occurs and event data is obtained, the processor 111 causes the event data to be transferred from the first memory device 113 to the second memory device 114 after the event data has been completely obtained. The processor 111 also causes data to be transferred from the second memory device 114 to the communications device 115 for transmission to the remote data evaluation system 104.
The first memory device 113 can be embodied by any appropriate conventional commercially available memory that can be accessed easily and rapidly. In one embodiment (illustrated in FIG. IB) , the first memory device is a random access memory (RAM) . In a particular embodiment, the RAM is implemented as a RAM disk, so that moving data out of the RAM is easier than would be the case in a standard RAM. The storage capacity of the first memory device 113 determines the amount of current data that can be stored at any one time and, therefore, affects the amount of event data used to represent the state of the environment at times proximate to the triggering event. For a typical television picture, use of an 8 MB RAM enables approximately 1 minute of event data to be obtained at a frame rate of 7.5 frames per second.
Use of a RAM rather than, for instance, a hard disk to store the current data is advantageous for several reasons. First, since many applications in which the invention can be used involve continual and rapid acquisition and storage of data, frequent and rapid access must be made to the first memory. Such frequent access takes a greater toll on the operation of a hard disk than on a RAM. Further, access to a RAM can be made more rapidly than access to a hard drive, making the RAM preferable for these applications which require rapid access.
The second memory device 114 is used to permanently store the event data. The second memory device 114 can be embodied by any persistent memory device such as, for example, a conventional hard disk (illustrated in FIG. IB) ; any appropriate commercially available such device having adequate storage capacity can be used. Since, according to the invention, only the event data is permanently stored, the second memory device 114 can have much less storage capacity than has been the case with memories of other, similar monitoring systems. Further, permanently storing only the event data enables the event data to be located quickly and easily when it is desired to evaluate the event data.
The communications device 115 enables transmission of data from the on-site data management system 104 through a communications line to the remote data evaluation system 104. Any appropriate type of communications line can be used. For example, the communications line can be a conventional telephone line and the communications device 115 can be any conventional commercially available modem. Preferably, the modem has as fast a baud rate as practical or economically feasible. Other possible communications alternatives include a high-speed phone line such as ISDN, a very high-speed phone line such as Tl, satellite systems, connection over the Internet, or communication over a serial cable. FIG. IC is a block diagram of one implementation of the remote data evaluation system 104 of the system 100. The remote data evaluation system 104 includes a digital computer 121, a user input device 122, a display device 123 and a communications device 124. The digital computer 121, user input device 122, display device 123 and communications device 124 are interconnected by a communications bus (not shown) , which can be, for example, a conventional ISA bus.
The communications device 124 enables communication to and from the remote data evaluation system 104. The communications device 124 can be any conventional commercially available modem. Preferably, the modem has as fast a baud rate as practical or economically feasible. The digital computer 121 is used to control operation of the remote data evaluation system 104 and includes a processor and memory. Any appropriate commercially available digital computer can be used. The digital computer 121 includes a conventional processor, non- persistent memory device, and persistent memory device. The digital computer also includes a data display device that is similar to the data capture device 112 (FIG. IB) and performs similar functions, such as decompression of compressed data.
The user input device 122 is used by a user to control operation of the remote data evaluation system 104. The user input device 122 can be, for example, a keyboard or a mouse.
The display device 123 can be used to display the obtained data. The display device 123 can be any conventional display device that is appropriate for the type of data that is obtained. For example, a television might be used to display video data and an audio speaker might be used to display audio data. The display device 123 can used for continuous real-time display of the data as it is obtained. Importantly, the display device 123 can also be used to display the event data. The display device 123 might also be used to communicate to the user when a triggering event has occurred.
According to the invention, an appropriate computer program can be implemented on the digital computer 121 and processor 111 to give a user various options regarding how to display the event data. One option allows the user to implement the data compression technique implemented on the data capture device 112; another option allows the user to bypass compression of the event data. Compression of the event data enables the event data to be sent to the remote data evaluation system 104 more quickly, so that the user can evaluate the event data as soon as possible; however, the display of the event data by the display device 123 will lose some resolution. Conversely, if the event data is not compressed, the event data is sent to the remote data evaluation system 104 more slowly; however, the display of the event data by the display device 123 will have the best possible resolution.
The user can also choose to use the zoom feature implemented on the data capture device 112 to cause a desired portion of the data to be displayed in greater detail. Without zoom, the entire set of event data is displayed.
FIG. 2 is a flow chart of a method 200 according to the invention for obtaining event data describing the state of an environment at times proximate to the occurrence of a triggering event. The method 200 can be implemented, for example, in the system 100 of FIG. 1.
As will be apparent from the description below, for many applications, the method 200 causes event data to be obtained for a period of time that is defined by one or more pre-specified instructions. The event data can be obtained before the triggering event, after the triggering event, or both before and after the triggering event. Further, the periods of time before and/or after the triggering event for which data is obtained can be varied according to the pre-specified instructions. The invention enables a high degree of flexibility in defining the particular time period during which event data is obtained. First, in step 201, the size of the memory in which the data to be obtained will be stored is determined. This size is determined as whatever portion of the memory is not being used by other applications. This size of the memory is used, together with the number of blocks into which the memory is partitioned (see step 202) , to determine the amount of data that can be stored in each of those blocks.
In step 202, the memory is partitioned into blocks. Generally, the memory can be partitioned into any number of blocks. As will be apparent from the description below, the number of blocks into which the memory is partitioned can affect the amount of event data that the method 200 stores for each triggering event. Generally, as the number of blocks increases, a larger amount of event data will tend to be stored, since the increased granularity of the memory partitioning decreases the likelihood that the obtaining of post-trigger data will leave large portions of one or more blocks vacant (see, e.g., some of FIGS. 4A through 8F below) . However, since, as the number of blocks increases, the size of each block decreases, the possibility that relatively large portions of memory blocks will be left vacant increases. Additionally, partitioning the memory into more blocks enables increasingly specific portions of the event data to be evaluated more quickly, a desirable characteristic. The choice of the number of blocks into which to partition the memory involves a trade-off among these considerations. In one embodiment of the invention, shown in FIG. 3, a memory 300 is partitioned into two blocks 301 and 302. In step 203, a block of memory is determined into which data will first be stored. As will be more readily apparent from the description below, the method 200 stores the obtained data in successive memory blocks, filling each memory block before beginning to store data in another memory block. Thus, as part of the partitioning of the memory into blocks, the blocks of memory are assigned a particular order. When the method 200 first begins, the current block of memory, as determined by step 203, is an arbitrarily designated first block of memory. In step 204, a check is made as to whether a triggering event has occurred. In the system 100
(FIG. IA) , for example, the processor 111 can check the value of a trigger flag (e.g., a bit of a register in the RAM in which the data is stored) , which can take on one of two values, one value indicating that no triggering event has occurred and the other indicating that a triggering event has occurred. A triggering event may be indicated, for example, by the manual or automatic tripping of an alarm at the site being monitored, the alarm being configured to change the value of the trigger flag when tripped. Or, in the system 100, the processor ill may use an appropriate computer program to evaluate the incoming data to determine if a triggering event has occurred. Generally, the particular manner in which a triggering event is detected will vary depending upon the type of data being obtained. For example, in monitoring an automated bank teller machine, the data may be evaluated for the presence of anomalous patterns. Depending upon whether a triggering event has been detected or not, the method 200 will perform one of two series of steps. While a triggering event is not detected, the method 200 continually updates the data stored in the memory. Data is stored in successive blocks of memory. Once data storage in a memory block begins, that block is filled with data before data storage in a new block begins. Thus, in step 205, before storing data, a check is made to determine whether the memory block into which data is currently being stored is full. This can be done by determining whether the amount of data to be stored (e.g., for video data stored frame by frame, approximately 64 kilobytes of data) is greater than the size of the memory block minus the amount of data already stored. If the memory block is not full, then, in step 207, the data is stored in the next available memory location of that memory block. Preferably, for simplicity of implementation, the invention causes data to be progressively stored in a memory block such that all of the stored data in the memory block is contiguous. However, this need not necessarily be the case and, generally, data can be stored at any available location in the memory block. If the memory block is full, then, in step 206, the next sequential block of memory is determined. As described above with respect to step 203, an order of memory blocks is established at the beginning of the method 200. The next sequential memory block is just the next memory block in the order. After data has been stored in the last memory block, the next sequential memory block is the first memory block in which data was stored. As will be apparent from the description below, once the order of memory blocks is established, it is important that data be stored in memory blocks in that order, in order to ensure that the maximum amount of event data is obtained and in order to facilitate the establishment of the chronological order of the event data for use in display or analysis of the event data. After the next sequential memory block is determined, the data is stored in that block, as shown by step 207.'
According to one embodiment of the invention, once storage of data in a block begins, all previous data stored in that block becomes inaccessible. This occurs because the header information in that block is overwritten, thereby precluding data within the block from being located. This is illustrated by FIG. 3.
In FIG. 3, as mentioned above, the memory 300 is partitioned into two blocks 301 and 302. (Note that the blocks 301 and 302 could store different types of data, e.g., video data in block 301 and audio data in block 302.) The memory 300 also includes a header 303, apart from the blocks 301 and 302, that includes information describing the arrangement of the memory 300. For example, the header 303 can include, among other information, the beginning memory address of each block 301 and 302. Together with the size of the memory and the number of blocks (here, two) , these beginning memory addresses define the location of the blocks 301 and 302 in the memory 300. Each block 301 and 302 includes a block header 304 and 305, respectively, and data 306 and 307, respectively. For video data, the block headers 304 and 305 each include a specification of the frame size, frame rate and time at which data began to be saved for the data stored in the corresponding blocks 301 and 302. Storing of data as shown by steps 205 through 207 can continue indefinitely. Storing of data in this manner will continue until either the method is terminated or a triggering event is detected.
After a triggering event is detected, first, the duration of the time ("post-trigger time") after the triggering event for which data ("post-trigger data") is to be obtained is determined, as shown by step 208. The duration of the post-trigger time can be determined in a variety of ways, some of which are described and illustrated below with respect to FIGS. 4A through 8F. In general, the post-trigger time can be defined so that all of the event data occurs after the triggering event (and none before the triggering event) , none of the event data occurs after the triggering event (and all before the triggering event) , or any intermediate amount of event data occurs after the triggering event (and the remainder before the triggering event) . The post-trigger time can either be defined directly or indirectly by defining the pre-trigger time. Once the duration of the post-trigger time is determined, then, in step 209, event data ("post-trigger data") is obtained for the duration of the post-trigger time.
FIGS. 4A and 4B illustrate a combination of event data that can result from one definition of pre-trigger and post-trigger time. In FIGS. 4A and 4B (and FIGS. 5A through 8F below) , increasing time moves from left to right. However, since data storage occurs by ping-ponging back and forth between blocks of data, the manner of representation in FIGS. 4A and 4B can result in data in the rightmost block having been obtained before data in the leftmost block.
FIG. 4A illustrates two blocks of data, blocks 401 and 402, at the time that a triggering event, designated by 403, occurs. The areas in blocks 401 and 402 that are filled with upwardly slanting lines represent data ("pre- trigger data") stored before occurrence of the triggering event. (Upwardly slanting lines also represent pre- trigger data in each of FIGS. 4B through 8F below.) As can be seen, the triggering event occurred during the time that data was being stored in block 401 (the "event block") . Block 402 is completely full of data obtained prior to the triggering event. Block 401 is only partially full of data. When data began to be stored in block 401 after filling block 402 with data, the previously stored data in block 401 was eliminated. When the triggering event occurred, block 401 had not yet been completely filled with data.
FIG. 4B illustrates the data content of the two blocks 401 and 402 after the post-trigger data has been obtained according to this definition of pre-trigger and post-trigger time. A predefined set of instructions specifies that, upon occurrence of a triggering event, post-trigger data is obtained until the event block ' lock 401) and all other blocks (here, only block 402) are completely full of data. The post-trigger data is F,- ,-"r. by the downwardly slanting lines in FIG. 4B. (Downwardly slanting lines also represent post-trigger data in each of FIGS. 4A through 8F below.) The post- trigger data stored in block 402 replaces all of the previously stored pre-trigger data. However, block 401 includes both pre-trigger data and post-trigger data, since, when the triggering event occurred, data storage in block 401 did not begin at the beginning of block 401, but rather continued at the location in block 401 at which data was being stored at the time the triggering event occurred.
FIGS. 5A and 5B illustrate a combination of event data that can result from another definition of pre- trigger and post-trigger time. FIG. 5A again illustrates blocks 401 and 402 at the time that the triggering event designated by 403 occurs. In this definition, a predefined set of instructions specifies that no post- trigger data is to be obtained. Consequently, FIG. 5B, which illustrates the data content of the blocks 401 and 402 after the post-trigger data has been obtained, looks exactly like FIG. 5A, i.e., only pre-trigger data is obtained.
FIGS. 6A and 6B illustrate a combination of event data that can result from yet another definition of pre- trigger and post-trigger time. FIG. 6A again illustrates blocks 401 and 402 at the time that the triggering event designated by 403 occurs. FIG. 6B illustrates the data content of the two blocks 401 and 402 after the post- trigger data has been obtained according to this definition of pre-trigger and post-trigger time. A predefined set of instructions specifies that the storage of post-trigger data begins at the beginning of the next sequential memory block after the event block and that post-trigger data is stored until all memory blocks including the event block (here, blocks 401 and 402) are completely filled with data. Again, as in FIG. 4B, the post-trigger data stored in block 402 replaces all of the previously stored pre-trigger data. However, in FIG. 6B, post-trigger data obtained subsequent to that stored in block 402 replaces all of the pre-trigger data previously stored in block 401. FIGS. 7A and 7B illustrate a combination of event data that can result from still another definition of pre- trigger and post-trigger time. FIG. 7A again illustrates blocks 401 and 402 at the time that the triggering event designated by 403 occurs. FIG. 7B illustrates the data content of the two blocks 401 and 402 after the post- trigger data has been obtained according to this definition of pre-trigger and post-trigger time. A predefined set of instructions specifies that storage of post-trigger data continues in the event block (block 401) at the location at which data was being stored when the triggering event occurred and continues until the event block is filled with data. Thus, the pre-trigger data in both blocks 401 and 402 is retained, while post-trigger data fills the portion of block 401 not used by pre- trigger data.
FIGS. 8A through 8F illustrate several combinations of event data that can result from another definition of pre-trigger and post-trigger time. Each of FIGS. 8A, 8C and 8E again illustrates blocks 401 and 402 at the time that the triggering event designated by 403 occurs. A predefined set of instructions specifies that the storage of post-trigger data continues in the event block (block 401) at the location at which data was being stored when the triggering event occurred and continues until a specified time (or, equivalently, for a specified duration of time) . Each of FIGS. 8B, 8D and 8F illustrates the data content of the two blocks 401 and 402 after the post- trigger data has been obtained according to this definition of pre-trigger and post-trigger time. In FIG. 8B, the specified time, designated by 801, occurs while data is still being stored in block 401. Thus, the pre-trigger data in both blocks 401 and 402 is retained, while post-trigger data fills some, but not all, of the portion of block 401 not used by pre-trigger data. In FIG. 8D, the specified time, designated by 802, occurs after data has begun to be stored in block 402, but before block 402 is completely filled with data. Thus, while the pre-trigger data in block 401 is retained, the pre-trigger data in block 402 is lost, since post-trigger data has begun to be written in block 402. Post-trigger data fills the entire portion of block 401 not used by pre-trigger data, as well as the portion of block 402 up until the occurrence of the designated time 802. In FIG. 8F, the specified time, designated by 803, occurs after post- trigger data has completely filled block 402 and data has begun to be stored in block 401. The post-trigger data in block 402 completely replaces the pre-trigger data previously stored in block 402. Post-trigger data also partially fills block 401, causing the pre-trigger data in block 401 to be lost. FIGS. 4A through 8F above illustrate combinations of event data that result from various definitions of pre- trigger and post-trigger time, when the memory in which the event data is stored is divided into two blocks. Each of the above-described definitions could also be applied when the memory has been divided into more than two blocks.
Once all of the post-trigger data has been obtained, no further data is stored in the memory. The data that is stored in the memory represents the event data. Typically, this data is then permanently stored in a non¬ volatile memory. For example, in the on-site data management system 103 described above with respect to FIG. IB, the event data is transferred from the first memory device 113 (e.g., RAM) to the second memory device 114 (e.g., hard disk) .
In step 210 (FIG. 2) , the event data is made available for use. Typically, the event data is evaluated to ascertain information of interest regarding the state of the environment at times proximate to the time of occurrence of the triggering event. Usually (though not necessarily) , the event data is evaluated at a location that is remote from the environment being monitored, necessitating that the event data be communicated to the remote location. For example, in the system 100 of FIG. IA, the event data is communicated from the on-site data management system 103 to the remote data evaluation system 104. An indication that a triggering event has occurred ("alarm") must also be communicated to the location where the evaluation will be performed. Either or both of the alarm and the event data can be communicated automatically, or manually at the request of a user. Further, where the alarm is communicated automatically, the monitoring system can be configured so that the user may or may not receive a conspicuous notification of the alarm. For example, a monitoring system according to the invention that sends the event data to be evaluated only when so instructed by a user might be used in monitoring a cash register at a store for possible stealing by employees. A monitoring system according to the invention that sends the event data automatically (and immediately upon acquisition) might be used in monitoring the security of a location such as a store or prison.
Once event data is obtained for a triggering event, a monitoring system according to the invention can proceed to obtain additional information regarding the environment being monitored. Continuing to obtain additional information in this manner can occur either automatically, or manually at the instruction of a user. Further, it is possible for the invention to cause additional event data regarding a subsequent triggering event to be obtained and stored. A monitoring system according to the invention can be constructed so that each of the sets of event data are presented separately for evaluation by the user. The system can further be constructed to appropriately identify each set of event data (e.g., with icons or as choices in a list) and enable the user to select which set of event data is to be evaluated.
The event data can be displayed for evaluation by a human. This may be done for video data using, for example, a video display such as the video display device 123 of the system 100 (FIG. 1) . If the data is audio data, the data may be displayed, for example, with an appropriate sound system.
Alternatively, the event data can be evaluated automatically, without human intervention. This can be done for example, for example, using a digital computer such as can be used in the system 100 to implement the processor 121 and memory 122. The automatic evaluation can be done using predetermined evaluation criteria that may be implemented in, for example, an appropriate computer program that runs on the digital computer. Various embodiments of the invention have been described. The descriptions are intended to be illustrative, not limitative. Thus, it will be apparent to one skilled in the art that certain modifications may be made to the invention as described without departing from the scope of the claims set out below.

Claims

I claim :
1. A method for remotely monitoring an environment, comprising the steps of: recording data in a rapidly accessible memory, the data representing the state of one or more characteristics of the environment, recorded data being periodically replaced by subsequently recorded data; detecting the occurrence of a triggering event in the environment; transferring, to a location remote from the environment, event data obtained during a predefined interval of time proximate to the time of occurrence of the triggering event; and presenting the event data for evaluation at the remote location.
2. A method as in Claim 1, wherein the step of recording further comprises the steps of : partitioning a memory into a plurality of blocks; successively storing data in one of the plurality of memory blocks until the memory block is filled with data; successively storing data in each of the plurality of memory blocks until data has been stored in all of the memory blocks; repeating the steps of successively storing data until the occurrence of the triggering event, the beginning of storage of data in a memory block in which data has previously been stored causing elimination of the data previously stored in that memory block; and upon the occurrence of the triggering event, storing post-trigger data according to one or more predetermined instructions.
3. A method as in Claim 2, wherein the step of storing post-trigger data further comprises the steps of: storing data in the memory block into which data is being stored at the time the triggering event occurs until the memory block is filled with data; and subsequently storing data in each of the remaining memory blocks until the remaining memory blocks are filled with data.
4. A method as in Claim 2, wherein the step of storing post-trigger data further comprises storing no post-trigger data.
5. A method as in Claim 2, wherein the step of storing post-trigger data further comprises the steps of: upon occurrence of the triggering event, immediately ending storage of data in the memory block into which data is being stored at the time the triggering event occurs; after occurrence of the triggering event, storing data in each of the memory blocks until each of the memory blocks is filled with data.
6. A method as in Claim 2, wherein the step of storing post-trigger data further comprises the step of storing data in the memory block into which data is being stored at the time the triggering event occurs until the memory block is filled with data.
7. A method as in Claim 2, wherein the step of storing post-trigger data further comprises the step of storing data for a predefined duration of time after occurrence of the triggering event.
8. A method as in Claim 1, wherein the step of presenting further comprises presenting the event data for evaluation by a human.
9. A method as in Claim 1, wherein the step of presenting further comprises presenting the event data for automatic evaluation by an evaluation means.
10. A system for remotely monitoring an environment, comprising: a rapidly accessible memory for recording data, the data representing the state of one or more characteristics of the environment, recorded data being periodically replaced by subsequently recorded data; means for detecting the occurrence of a triggering event in the environment; means for transferring, to a location remote from the environment, event data obtained during a predefined interval of time proximate to the time of occurrence of the triggering event; and means for presenting the event data for evaluation at the remote location.
11. A system as in Claim 10, wherein the memory is a random access memory.
12. A system as in Claim 11, wherein the means for recording further comprises: means for partitioning a memory into a plurality of blocks; means for successively storing data in one of the plurality of memory blocks until the capacity of the memory block is depleted; means for successively storing data in each of the plurality of memory blocks until data has been stored in all of the memory blocks; means for repeating the steps of successively storing data until the occurrence of the triggering event, the beginning of storage of data in a memory block in which data has previously been stored causing elimination of the data previously stored in that memory block; and means for storing post-trigger data according to one or more predetermined instructions.
13. A system as in Claim 10, wherein the means for presenting further comprises a display device that can be perceived by a human so that the event data can be directly evaluated by the human.
14. A system as in Claim 10, further comprising means for evaluation that automatically evaluates the event data without human intervention.
15. A system as in Claim 14, wherein the evaluation means is a digital computer.
16. A system as in Claim 10, wherein the data is video data.
17. A system as in Claim 10, wherein the data is audio data.
18. A method for monitoring an environment, comprising the steps of: recording data representing substantially continuously the state of one or more characteristics of the environment over a period of time, recorded data being replaced occasionally in a predetermined manner by subsequently recorded data, such that the recorded data existing at any time comprises the most recently occurred data; detecting the occurrence of a triggering event in the environment; and storing, as event data, the recorded data that exists at the time the triggering event is detected, so that the event data can later be presented for evaluation.
19. A method as in Claim 18, wherein the step of recording further comprises the steps of: partitioning a memory into a plurality of blocks; successively storing data in one of the plurality of memory blocks until the memory block is filled with data; successively storing data in each of the plurality of memory blocks until data has been stored in all of the memory blocks; and repeating the steps of successively storing data until the occurrence of the triggering event, the beginning of storage of data in a memory block in which data has previously been stored causing elimination of the data previously stored in that memory block.
20. A method as in Claim 18, further comprising the step of storing, as event data, post-trigger' data recorded according to one or more predetermined instructions.
21. A method as in Claim 18, wherein the data is video data, such that the event data includes a moving picture video record of the characteristic of the environment over a period of time immediately prior to the triggering event.
22. A system for monitoring an environment, comprising: means for recording data representing substantially continuously the state of one or more characteristics of the environment over a period of time; means for occasionally replacing recorded data, in a predetermined manner, with subsequently recorded data, such that the recorded data existing at any time comprises the most recently occurred data; means for detecting the occurrence of a triggering event in the environment; and means for storing, as event data, the recorded data that exists at the time the triggering event is detected, so that the event data can later be presented for evaluation.
23. A system as in Claim 22, wherein the means for recording is a random access memory.
24. A system as in Claim 22, wherein the means for recording further comprises: means for partitioning a memory into a plurality of blocks; means for successively storing data in one of the plurality of memory blocks until the capacity of the memory block is depleted; means for successively storing data in each of the plurality of memory blocks until data has been stored in all of the memory blocks; and means for repeating the steps of successively storing data until the occurrence of the triggering event, the beginning of storage of data in a memory block in which data has previously been stored causing elimination of the data previously stored in that memory block.
25. A method as in Claim 22, further comprising means for storing, as event data, post-trigger data recorded according to one or more predetermined instructions.
26. A method as in Claim 22, wherein the data is video data, such that the event data includes a moving picture video record of the characteristic of the environment over a period of time immediately prior to the triggering event .
PCT/US1996/013436 1995-08-21 1996-08-20 Event monitoring WO1997007486A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU68515/96A AU6851596A (en) 1995-08-21 1996-08-20 Event monitoring

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US59638695A 1995-08-21 1995-08-21
US08/596,386 1995-08-21

Publications (1)

Publication Number Publication Date
WO1997007486A1 true WO1997007486A1 (en) 1997-02-27

Family

ID=24387099

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US1996/013436 WO1997007486A1 (en) 1995-08-21 1996-08-20 Event monitoring

Country Status (2)

Country Link
AU (1) AU6851596A (en)
WO (1) WO1997007486A1 (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998050834A1 (en) * 1997-05-06 1998-11-12 Control Technology Corporation Distributed interface architecture for programmable industrial control systems
EP0913800A1 (en) * 1997-10-29 1999-05-06 Endusis Limited Monitoring system
EP1024666A2 (en) * 1999-01-29 2000-08-02 Hitachi, Ltd. Image recording/reproducing apparatus in monitor system
EP1081952A2 (en) * 1999-08-30 2001-03-07 Matsushita Electric Industrial Co., Ltd. Video monitoring equipment
WO2001028251A1 (en) * 1999-10-12 2001-04-19 Vigilos, Inc. System and method for controlling the storage and remote retrieval of surveillance video images
US6542075B2 (en) 2000-09-28 2003-04-01 Vigilos, Inc. System and method for providing configurable security monitoring utilizing an integrated information portal
WO2003027852A2 (en) * 2001-09-24 2003-04-03 Intel Corporation Extended content storage method and apparatus
WO2003092292A1 (en) * 2002-04-24 2003-11-06 Alogics Co., Ltd. Image storaging apparatus and method of thereof
US6698021B1 (en) 1999-10-12 2004-02-24 Vigilos, Inc. System and method for remote control of surveillance devices
WO2004019616A1 (en) * 2002-08-20 2004-03-04 Scyron Limited Safety method and apparatus
US6748343B2 (en) 2000-09-28 2004-06-08 Vigilos, Inc. Method and process for configuring a premises for monitoring
US6839731B2 (en) 2002-05-20 2005-01-04 Vigilos, Inc. System and method for providing data communication in a device network
US6853867B1 (en) 1998-12-30 2005-02-08 Schneider Automation Inc. Interface to a programmable logic controller
US6917902B2 (en) 2002-03-01 2005-07-12 Vigilos, Inc. System and method for processing monitoring data using data profiles
WO2005116947A1 (en) * 2004-05-24 2005-12-08 Eaton Corporation Home system and method for sending and displaying digital images
US7146408B1 (en) 1996-05-30 2006-12-05 Schneider Automation Inc. Method and system for monitoring a controller and displaying data from the controller in a format provided by the controller
US7254640B2 (en) 2002-04-09 2007-08-07 Vigilos, Inc. System for providing fault tolerant data warehousing environment by temporary transmitting data to alternate data warehouse during an interval of primary data warehouse failure
US7370074B2 (en) 2000-12-06 2008-05-06 Vigilos, Inc. System and method for implementing open-protocol remote device control
US7606843B2 (en) 2002-03-04 2009-10-20 Vigilos, Inc. System and method for customizing the storage and management of device data in a networked environment
US7614083B2 (en) 2004-03-01 2009-11-03 Invensys Systems, Inc. Process control methods and apparatus for intrusion detection, protection and network hardening
US7933989B1 (en) 2002-01-25 2011-04-26 Barker Geoffrey T Predictive threat assessment
US7944469B2 (en) 2005-02-14 2011-05-17 Vigilos, Llc System and method for using self-learning rules to enable adaptive security monitoring
US7984420B2 (en) * 1999-05-17 2011-07-19 Invensys Systems, Inc. Control systems and methods with composite blocks
EP2387010A1 (en) * 2010-05-12 2011-11-16 ASSA ABLOY Sicherheitstechnik GmbH Evacuation door securing device
US8392552B2 (en) * 2000-09-28 2013-03-05 Vig Acquisitions Ltd., L.L.C. System and method for providing configurable security monitoring utilizing an integrated information system
EP2580421A1 (en) * 2010-11-29 2013-04-17 Vetco Gray Controls Limited Monitoring a subsea installation
US9030563B2 (en) 2007-02-07 2015-05-12 Hamish Chalmers Video archival system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0221631A2 (en) * 1985-10-24 1987-05-13 Videoscan Limited Methods and apparatus for monitoring events
WO1988004082A1 (en) * 1986-11-25 1988-06-02 Zone Technology Pty. Limited Digital image acquisition system
WO1990001838A1 (en) * 1988-08-12 1990-02-22 Gordon Moe Recovery recorder system, particularly commercial radio/tv broadcast recovery recorder system
GB2250156A (en) * 1990-10-06 1992-05-27 Chubb Electronics Ltd Video surveillance system
US5229850A (en) * 1990-07-30 1993-07-20 Kabushiki Kaisha Toshiba Video monitoring system including a memory for storing and transmitting a video signal immediately following the occurrence of an event
GB2295065A (en) * 1994-11-10 1996-05-15 Mitsubishi Electric Corp Magnetic recording and playback apparatus
US5526133A (en) * 1994-06-28 1996-06-11 Sensormatic Electronics Corporation System and method for logging and retrieving information on video cassettes in a computer controlled surveillance system
WO1996027864A1 (en) * 1995-03-06 1996-09-12 Bell, Addison Computer based event capturing system and method having flexible storage

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0221631A2 (en) * 1985-10-24 1987-05-13 Videoscan Limited Methods and apparatus for monitoring events
WO1988004082A1 (en) * 1986-11-25 1988-06-02 Zone Technology Pty. Limited Digital image acquisition system
WO1990001838A1 (en) * 1988-08-12 1990-02-22 Gordon Moe Recovery recorder system, particularly commercial radio/tv broadcast recovery recorder system
US5229850A (en) * 1990-07-30 1993-07-20 Kabushiki Kaisha Toshiba Video monitoring system including a memory for storing and transmitting a video signal immediately following the occurrence of an event
GB2250156A (en) * 1990-10-06 1992-05-27 Chubb Electronics Ltd Video surveillance system
US5526133A (en) * 1994-06-28 1996-06-11 Sensormatic Electronics Corporation System and method for logging and retrieving information on video cassettes in a computer controlled surveillance system
GB2295065A (en) * 1994-11-10 1996-05-15 Mitsubishi Electric Corp Magnetic recording and playback apparatus
WO1996027864A1 (en) * 1995-03-06 1996-09-12 Bell, Addison Computer based event capturing system and method having flexible storage

Cited By (42)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7146408B1 (en) 1996-05-30 2006-12-05 Schneider Automation Inc. Method and system for monitoring a controller and displaying data from the controller in a format provided by the controller
US5982362A (en) * 1996-05-30 1999-11-09 Control Technology Corporation Video interface architecture for programmable industrial control systems
WO1998050834A1 (en) * 1997-05-06 1998-11-12 Control Technology Corporation Distributed interface architecture for programmable industrial control systems
GB2330267B (en) * 1997-10-29 2000-04-12 West Cumbria Enterprises Limit Security system
EP0913800A1 (en) * 1997-10-29 1999-05-06 Endusis Limited Monitoring system
US6853867B1 (en) 1998-12-30 2005-02-08 Schneider Automation Inc. Interface to a programmable logic controller
EP1024666A2 (en) * 1999-01-29 2000-08-02 Hitachi, Ltd. Image recording/reproducing apparatus in monitor system
KR100774078B1 (en) * 1999-01-29 2007-11-06 가부시키가이샤 히타치세이사쿠쇼 Image recording/reproducing apparatus in monitor system
EP1024666A3 (en) * 1999-01-29 2001-07-25 Hitachi, Ltd. Image recording/reproducing apparatus in monitor system
US6741977B1 (en) 1999-01-29 2004-05-25 Hitachi, Ltd. Image recording/reproducing apparatus in monitor system
US7984420B2 (en) * 1999-05-17 2011-07-19 Invensys Systems, Inc. Control systems and methods with composite blocks
EP1081952A2 (en) * 1999-08-30 2001-03-07 Matsushita Electric Industrial Co., Ltd. Video monitoring equipment
EP1081952A3 (en) * 1999-08-30 2001-09-12 Matsushita Electric Industrial Co., Ltd. Video monitoring equipment
WO2001028251A1 (en) * 1999-10-12 2001-04-19 Vigilos, Inc. System and method for controlling the storage and remote retrieval of surveillance video images
US6698021B1 (en) 1999-10-12 2004-02-24 Vigilos, Inc. System and method for remote control of surveillance devices
US8392552B2 (en) * 2000-09-28 2013-03-05 Vig Acquisitions Ltd., L.L.C. System and method for providing configurable security monitoring utilizing an integrated information system
US6748343B2 (en) 2000-09-28 2004-06-08 Vigilos, Inc. Method and process for configuring a premises for monitoring
USRE43598E1 (en) 2000-09-28 2012-08-21 Vig Acquisitions Ltd., L.L.C. Method and process for configuring a premises for monitoring
USRE45649E1 (en) 2000-09-28 2015-08-11 Vivint, Inc. Method and process for configuring a premises for monitoring
US7016813B2 (en) 2000-09-28 2006-03-21 Vigilos, Inc. Method and process for configuring a premises for monitoring
US6542075B2 (en) 2000-09-28 2003-04-01 Vigilos, Inc. System and method for providing configurable security monitoring utilizing an integrated information portal
US8239481B2 (en) 2000-12-06 2012-08-07 Vigilos, Llc System and method for implementing open-control remote device control
US7370074B2 (en) 2000-12-06 2008-05-06 Vigilos, Inc. System and method for implementing open-protocol remote device control
WO2003027852A3 (en) * 2001-09-24 2004-02-19 Intel Corp Extended content storage method and apparatus
WO2003027852A2 (en) * 2001-09-24 2003-04-03 Intel Corporation Extended content storage method and apparatus
US7933989B1 (en) 2002-01-25 2011-04-26 Barker Geoffrey T Predictive threat assessment
US6917902B2 (en) 2002-03-01 2005-07-12 Vigilos, Inc. System and method for processing monitoring data using data profiles
US8239347B2 (en) 2002-03-04 2012-08-07 Vigilos, Llc System and method for customizing the storage and management of device data in a networked environment
US7606843B2 (en) 2002-03-04 2009-10-20 Vigilos, Inc. System and method for customizing the storage and management of device data in a networked environment
US7254640B2 (en) 2002-04-09 2007-08-07 Vigilos, Inc. System for providing fault tolerant data warehousing environment by temporary transmitting data to alternate data warehouse during an interval of primary data warehouse failure
USRE43933E1 (en) 2002-04-09 2013-01-15 Hatoshi Investments Jp, Llc System for providing fault tolerant data warehousing environment by temporary transmitting data to alternate data warehouse during an interval of primary data warehouse failure
WO2003092292A1 (en) * 2002-04-24 2003-11-06 Alogics Co., Ltd. Image storaging apparatus and method of thereof
US6839731B2 (en) 2002-05-20 2005-01-04 Vigilos, Inc. System and method for providing data communication in a device network
WO2004019616A1 (en) * 2002-08-20 2004-03-04 Scyron Limited Safety method and apparatus
US7614083B2 (en) 2004-03-01 2009-11-03 Invensys Systems, Inc. Process control methods and apparatus for intrusion detection, protection and network hardening
US7486183B2 (en) 2004-05-24 2009-02-03 Eaton Corporation Home system and method for sending and displaying digital images
WO2005116947A1 (en) * 2004-05-24 2005-12-08 Eaton Corporation Home system and method for sending and displaying digital images
AU2005248522B2 (en) * 2004-05-24 2010-04-22 Eaton Corporation Home system and method for sending and displaying digital images
US7944469B2 (en) 2005-02-14 2011-05-17 Vigilos, Llc System and method for using self-learning rules to enable adaptive security monitoring
US9030563B2 (en) 2007-02-07 2015-05-12 Hamish Chalmers Video archival system
EP2387010A1 (en) * 2010-05-12 2011-11-16 ASSA ABLOY Sicherheitstechnik GmbH Evacuation door securing device
EP2580421A1 (en) * 2010-11-29 2013-04-17 Vetco Gray Controls Limited Monitoring a subsea installation

Also Published As

Publication number Publication date
AU6851596A (en) 1997-03-12

Similar Documents

Publication Publication Date Title
WO1997007486A1 (en) Event monitoring
US6421080B1 (en) Digital surveillance system with pre-event recording
EP1292147B1 (en) Event image recording system and event image recording method
US6317152B1 (en) Digital video recording system
CN101472146B (en) System and method for monitoring video
US5689442A (en) Event surveillance system
KR100916034B1 (en) A data storage and reduction method for digital images, and a surveillance system using said method
US20050132414A1 (en) Networked video surveillance system
US20080303903A1 (en) Networked video surveillance system
CA2638621A1 (en) An alerting system for safety, security, and business productivity having alerts weighted by attribute data
CN103283246B (en) The auditing system of image information abuse
CN102244774A (en) Surveillance system with direct database server storage
CN112437264B (en) Monitoring video processing method and device
US20190174089A1 (en) Method and device for storing warning image
CN113194295B (en) Monitoring data storage system
CN101205783A (en) Mobile network monitoring safe case
CN109769103A (en) Image monitoring system and image monitoring device
JP2005215996A (en) Apparatus and method for managing monitor picture
US20030098913A1 (en) Digital swift video controller system
KR101095650B1 (en) Apparatus and method for display-control of map
CN115836516B (en) Monitoring system
KR100350219B1 (en) System for writing image and method for writing image using communication network
CN114285989A (en) Self-adaptive adjustment method and device for emergency video trigger threshold
US20040247289A1 (en) Image security system and method for protecting privacy
KR200434039Y1 (en) Centralized Surveillance System

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE HU IL IS JP KE KG KP KR KZ LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK TJ TM TR TT UA UG UZ VN AM AZ BY KG KZ MD RU TJ TM

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): KE LS MW SD SZ UG AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA