[0001] This invention relates to the monitoring of personal safety. More particularly, this
invention relates to the monitoring of personal safety in situations where the persons
concerned are widely dispersed.
[0002] There is a need to monitor the safety of persons, particularly those working alone,
because of increasing threats from hazardous working environments and possibly other
people. There are two important requirements in a system that is to provide such protection:
(i) a worker must be able to indicate that they are in need of attention or help;
(ii) those needs and the location of the worker must swiftly and efficiently be communicated
to the helpers.
[0003] There are several existing systems that address these problems. One straightforward
technique is for a supervisor to periodically contact each of the persons concerned
to verify their safety. However, commercial pressures for efficiency increasingly
preclude the use of personnel in such non-productive roles.
[0004] Short range infra-red or radio detection and location beacons may be provided within
a working site with associated transceivers carried by each person. This can provide
an alarm signal from individuals and accurate and quick location of the personnel
within the working site. However, the installation of such infra-red or radio detection
and location beacons requires many such beacons to be provided, particularly on large
sites, and this can be prohibitively expensive.
[0005] Further techniques may be based upon radio triangulation of the GPS, Decca, Loran
etc. types that provide position location over large and very large areas. However,
these radio triangulation techniques tend to be expensive per individual due to the
cost and complexity of the receivers involved and the commercially achievable positional
accuracy of the location is often insufficient for the needs concerned. Radio triangulation
using direction finding techniques and multiple base stations (e.g. multistation VDF)
tends to be expensive, requires significant installation effort and frequently needs
"tuning" to the individual installation.
[0006] A personal safety monitoring system based upon radio pager technology is described
in European Published Patent Application EP-A-0 372 640 (Ericsson Paging Systems B.V.).
In this system, each person being protected carries a portable paging receiver. A
central base station periodically transmits to the paging receivers prompting the
user to transmit a report signal indicative of the well being of the user. If no proper
report signal is received, then the system generates an alarm signal. Whilst this
system has the advantage of the use of relatively low cost radio paging receivers
for each person, it does not provide positional information as to where the person
whose safety is being monitored is located. This is a significant disadvantage. Consider
the situation of a night watchman of a large commercial site. As part of their patrol
duties, such a night watchman will move over the entire site. Should a threat to the
night watchman's safety occur, an alarm signal may be raised with the radio pager,
but the person receiving the alarm signal will not be able to determine to which part
of the large site they should go to render assistance.
[0007] The present invention addresses the problem of providing a personal safety monitoring
system of relatively low cost that is able to provide both alarm signals and an indication
of the location of the person to whom the alarm relates.
[0008] Viewed from one aspect, this invention provides apparatus for monitoring personal
safety comprising:
a polling call generator for generating polling calls;
a polling call transmitter for transmitting said polling calls to at least one
person monitored;
a polling response receiver for receiving at least voice message responses as polling
responses from said at least one person;
a voice message store for storing said voice message responses;
an alarm call generator triggered when a polling response is not received from
a given person to generate an alarm call including at least a latest voice message
response from said given person stored within said voice message store; and
an alarm call transmitter for transmitting said alarm call to a predetermined recipient.
[0009] The provision of the voice message store and the inclusion within the alarm call
of at least a latest voice message from the person to whom the alarm relates affords
the facility of positional location by allowing the person being monitored to record
a message indicating their position.
[0010] More particularly, there is a considerable range of existing technology available
for the transmission and receipt of voice messages that can relatively inexpensively
be incorporated within the system. The system can automatically generate polling calls
and monitor for the occurrence or non-occurrence of polling call responses. Should
a polling call not be received, then an alarm message is generated that includes the
latest recorded message from the person concerned. The automatic system need not itself
have any ability to decode or understand the stored message. The requirement, in use,
is that the person being monitored should include within their polling call response
a voice message that will allow rescuers to find them should the need arise, e.g.
their current location and their proposed next location at the time the next polling
call will be due.
[0011] In this way, the stored voice message may be automatically replayed to the rescuer
should an appropriate polling call response not be received and it is the task of
the rescuer to understand and interpret the message. This technique allows an automated
personal safety monitoring system to be provided using well proven, reliable and inexpensive
technology, such as two-way speech paging systems, and yet provides both alarm indication
and positional information to the rescuers.
[0012] The polling call generator may generate polling calls in a number of forms, e.g.
a characteristic sequence of tones. The base requirement for the polling call is that
it should be clearly and unambiguously recognised by the person being monitored and
cause them to initiate the polling call response. However, in preferred embodiments
the polling call generator generates voice message calls.
[0013] The use of voice message calls allows the polling call to be directly understood
by the person being monitored without them having to interpret tone signals or have
received any training. The voice message call can include instructions as to how the
person being monitored is to respond.
[0014] The manner in which the polling calls, polling responses and alarm calls are transmitted
may vary between systems or within a system. Particularly suitable methods of transmission
are via a radio paging system, a two-way radio system, an intercom and an installed
telephone network (either through a private switchboard or over the public telephone
system).
[0015] It is advantageous that the polling call generator should generate polling calls
at regular intervals. Accordingly, in preferred embodiments the polling call generator
generates the polling calls at user definable periodic intervals.
[0016] The provision of periodic polling calls that have a user definable period considerably
increases the flexibility of the system. The period may be varied by a system administrator
who can set appropriate periods depending upon the person concerned and the nature
of their duties/risks to which they are exposed. In addition, the person being monitored
may themselves define the period by using non-voice responses, e.g. a programming
set of response tones.
[0017] In order to avoid the undue occurrence of false alarms the polling call generator,
the polling call transmitter and the polling call receiver act to transmit the polling
call for a predetermined number of attempts prior to triggering the alarm call generator
if a polling response is not received.
[0018] Once an alarm call has been triggered, the alarm call generator and alarm call transmitter
need to contact a rescuer as soon as possible. There will often be a compromise to
be made between the proximity of the rescuer and the likelihood of being able to contact
them e.g. a site manager or safety officer may usually be close to hand to give assistance
to a person initiating an alarm call, but one could not guarantee their 100% availability;
in contrast an alarm call made to one of the emergency services, such as the fire
brigade, might be made over a longer distance but would have a much higher likelihood
of being answered. In order to try and seek the best possible assistance the alarm
call generator and the alarm call transmitter act to attempt to transmit the alarm
call to a predetermined hierarchy of alarm call recipients until an alarm call acknowledgement
is received.
[0019] In this way, the alarm call can first attempt to be made to a person close to hand,
with the default being that another person, such as the emergency services, are called
if no response is received from the first person.
[0020] It may be that a user of the system is aware that they will not be available to respond
to their next scheduled polling call. In order to provide flexibility to the user
and reduce false alarms, in preferred embodiments upon receipt of an unsolicited polling
response a next scheduled polling call to that person initiating the unsolicited polling
response is deferred. It will be appreciated that an unsolicited polling response
is not made in response to a polling call as such, but rather replaces a polling call
response that should have been made.
[0021] It may be the case that a person being monitored does not change position or status
between differing polling calls. In such a circumstance, the need to update the stored
message may not exist. In order to cater for this and so as to improve the ease of
use of the system, it is preferred that a polling call includes a last received voice
message response for that person, a non-voice message polling response to the polling
call indicating the voice message response is to be maintained as current.
[0022] In this way, the person being monitored can review their last stored voice message
and if they are happy that it still applies merely confirm with a non-voice message
calling response that it should be maintained as current.
[0023] In an analogous manner to that suggested above for deferring polling calls, a user
may be able to change the frequency at which they are called in preferred systems
in which the polling call generator is responsive to a predetermined non-voice message
response from a person monitored to alter polling call frequency for that person.
[0024] Viewed from another aspect this invention provides a method of monitoring personal
safety comprising the steps of:
generating polling calls;
transmitting said polling calls to at least one person monitored;
receiving at least voice message responses as polling responses from said at least
one person;
storing said voice message responses;
when a polling response is not received from a given person, generating an alarm
call including at least a latest stored voice message response from said given person;
and
transmitting said alarm call to a predetermined recipient.
[0025] Embodiments of the invention will now be described, by way of example only, with
reference to the accompanying drawings, in which:
Figure 1 is a schematic diagram illustrating the overall configuration of a personal
safety monitoring system;
Figure 2 is a flow diagram illustrating the sequence of operation of the system of
Figure 1;
Figures 3 and 4 illustrate the flow of messages between different nodes within two
possible configurations of a personal safety monitoring system.
[0026] Figure 1 shows the overall configuration of a personal safety monitoring system.
At the heart of the system is a personal computer 2 having a digital voice processing
capability using extension level access speech cards. The personal computer system
includes a voice store 4. The voice store 4 may comprise the hard disc of the personal
computer 2 or a separate device. Control software running in the personal computer
2 serves to generate polling calls and alarm calls which are then transmitted by one
of the devices attached to the personal computer.
[0027] The devices by which the polling calls may be transmitted include a two-way speech
paging system (such as a Multitone Access 1000/3000 system) comprising a base station
6 and a plurality of pagers 8. Other possibilities include the use of an intercom
system comprising an amplifier 10 and a remote speaker 12 for the polling calls with
a telephone 14 and private exchange 16 being used for the polling responses. The private
exchange 16 may also be used to make polling calls and receive polling responses from
a worker's fixed position via the worker's telephone 18 and to make alarm calls to
alert a remotely located rescue service 20. A two-way radio system may be used in
the same way as the radio paging system illustrated if this is more appropriate.
[0028] In operation, the personal computer 2 initiates a polling call when the required
point within the call period for a particular user is reached. This polling call constitutes
a voice message stored or which is able to be assembled from within the voice store
4. This polling call voice message is transmitted to the user via one of the transmission
mechanisms illustrated, e.g. the radio paging transmitter 6, the amplifier 10 and
loudspeaker 12 comprising the intercom or the private exchange 16 and telephone 18.
Having received the polling call, the person being monitored must then pass a polling
response back to the personal computer 2 via the appropriate complementary channel.
If no polling response is received after a given number of attempts, then the personal
computer 2 initiates an alarm call via the private exchange 16 to the rescue services
20, the alarm call including at least the latest voice message response from the person
concerned.
[0029] Figure 2 is a flow diagram illustrating the operation of the system of Figure 1.
At step 22 the system checks to determine whether an emergency signal has been received
from any of the persons being monitored. The emergency signal effectively forms a
panic button system for the person being monitored, whereby if they instigate an emergency
signal, then an alarm call will immediately be made. If an emergency signal has been
received, then the system moves to step 25 at which the alarm call procedure is initiated.
[0030] If an emergency signal has not been received, then the system passes to step 24 where
it is determined whether an unprompted response call has been made. If an unprompted
response call has been made, then the system resets the time for which the next response
call for that particular person being monitored is due and passes to step 26 at which
the voice message is stored within the voice store 4.
[0031] If an unprompted call has not been made, then the system passes to step 28 at which
it is determined whether a polling call is due for any of the persons being monitored.
If no polling call is due, then the system returns to step 22. If a polling call is
due, then the polling call is made at step 30. Steps 32 and 34 serve to repeat the
polling call for a predetermined maximum number of attempts. If an answer is not received,
then the system progresses to step 25 at which the alarm call is made.
[0032] The personal computer 2 stores a hierarchical list of persons to be contacted if
an alarm occurs for each particular person being monitored. The system first attempts
to contact the person highest in the list and then progresses via steps 25 and 27
down the list until contact with someone is eventually made. When contact is made,
the system replays the latest voice message stored from the person concerned within
the voice store 4 as part of a longer message including items such as an identification
of the system, the time, an indication that this is the latest stored message from
the person concerned and confirmation that they have not responded to the polling
calls that have been made to them. This all occurs at step 29.
[0033] Figure 3 illustrates the flow of calls and responses in a system such as that illustrated
in Figure 1. In Figure 3, voice messages from within the voice store 4 are routed
to individuals 30 via either the private telephone exchange 16 or paging system 6.
Alarm calls and alarm responses are also routed via these paths. Once contact has
been made with an individual 30 via one of these paths (whether they are a person
being monitored or a person to whom an alarm call is made), then a two-way dialogue
may proceed via which voice messages and non-voice messages (such as keytones for
resetting the period at which polling calls are made or instigating an emergency call)
are passed.
[0034] Figure 4 illustrates a similar system to that in Figure 3 except that in this case
all of the messages from the voice store 4 are routed through the private exchange
16 or public telephone network (not illustrated). In this case the radio paging transmitter
6 can be remote from the site being protected and may be part of the public radio
paging network.
[0035] The behaviour of the system is controlled by the software running on the personal
computer 2 and several data files containing information about both the system as
a whole and about each individual being monitored. The software program has the ability
to transmit and receive messages via a variety of different communication devices
and other ancillaries that are connected to the system.
[0036] The system control data includes:
a) data indicating where and how to report a failure to complete an alarm procedure;
b) data indicating where and how to report system problems; and
c) other system control data such as a journal of transactions.
[0037] The individual persons' control data includes:
a) the type of device to use when making contact;
b) dialling and control data for use when making contact;
c) the times or periods at which contact should be made;
d) the number of attempts and acceptable response time to polling calls;
e) the system options available to the individual;
f) the alarm call procedures to follow for that individual; and
g) other control data, such as a call and response log for the individual.
[0038] Alarm control data for the system includes:
a) the type of device to use when indicating an alarm;
b) dialling and control data for use when indicating an alarm;
c) options available to the recipient of the alarm;
d) the acknowledgement rules on delivery of the alarm;
e) the alarm procedure to follow if the initial procedure fails; and
f) other control data, such as an alarm call log.
[0039] As mentioned previously, at times or intervals defined for each person being monitored,
a polling call to the person is made via a communication path such as the telephone
or a paging system. This polling call includes a message requesting that the individual
update their recorded status or location. This message may be either spoken, displayed
on a message pager or of a predefined meaning on a non-message and non-speech paging
system.
[0040] When using an immediate two-way speech connection, the individual can hear a message
of the form "polling call, please acknowledge" and the individual should then respond.
The system may demand an update to the status or location of the individual, or a
spoken menu may offer various optional actions.
[0041] When there is no immediate two-way speech connection, the individual should call
the voice storage system via a private telephone network, the public telephone network,
a paging system or the like and should then begin a dialogue with the voice storage
system. Additionally, a connection with the system may be initiated either via a call-in
procedure, or an emergency procedure instigated by either the individual person or
using one of the established man-down sensors known in the public domain.
[0042] When the system has established a two-way speech path, it requests an acknowledgement
as mentioned above. Depending on the particular user and options defined in the control
data for that user, the system can detect an acknowledgement of a polling call by
one or more methods including:
a) detection of a transmit key-up and release on a handheld transceiver by detection
of a tone or noise squelch burst;
b) detection of voice either by noise envelope detection or by detailed analysis of
the signal content to more reliably identify voice;
c) detection of a dialled password; and
d) automatic identification of the transceiver by a data signature.
[0043] Once the dialogue has been established, the system may have various defined options
available depending upon the particular individual with whom the dialogue is taking
place. These options may be combined and offered to the individual sequentially, or
via a spoken menu and dialled select a code. The options include:
a) the individual mandatorily must speak an update to their present status or location
that is stored as a voice message response;
b) the individual may choose to update their stored message response or may allow
the current message to remain current;
c) the individual may initiate other actions, for example an alarm may be triggered;
and
d) the individual may modify the behaviour of the system, for example the user may
defer the next contact time for an extended period or alter the periodicity at which
polling calls are made.
[0044] If an individual fails to report, the system will try to contact the individual again
and this process will continue for a predetermined number of attempts defined within
the control data for that individual. The final attempt will include an imperative
statement to indicate that an alarm will be initiated on failure to acknowledge.
[0045] After this final failed attempt, the alarm procedure is initiated. External equipment,
for example an alarm bell may be activated. The system will also attempt to contact
a first response location via one of the communication channels such as a radio paging
call or telephone procedure. The alarm call will include a message such as "alarm
call, no response from user xxxx, last message reads <play-back message> dial 1 to
acknowledge, 2 to repeat or 3 to hear the previous message". Normally the system will
require an acknowledgement of this message, dialled by the recipient. Failure to get
an acknowledgement as a result of that alarm attempt will trigger a further alarm
call to be made to a second response location within a hierarchy of such response
locations. This second alarm call repeats the above message. This process continues
through a sequence of locations until an acknowledgement is finally obtained or all
options are exhausted.
[0046] The recipient of an alarm call may request a repeat of the message, may request playback
of earlier messages, or playback of other types of message, e.g. status messages where
the prime message is location or vice versa.
[0047] A similar sequence to the above can be followed for user initiated (panic button
type) alarms and "man down" (tilt switch) detectors etc..
[0048] A journal of transactions is maintained by the personal computer 2 giving the times
of start-up, polling calls, polling call responses, alarm calls and alarm call acknowledgements.
1. Apparatus for monitoring personal safety comprising:
a polling call generator (2) for generating polling calls;
a polling call transmitter (6) for transmitting said polling calls to at least
one person monitored;
a polling response receiver (6;14) for receiving at least voice message responses
as polling responses from said at least one person;
a voice message store (4) for storing said voice message responses;
an alarm call generator (2) triggered when a polling response is not received from
a given person to generate an alarm call including at least a latest voice message
response from said given person stored within said voice message store (4); and
an alarm call transmitter (16) for transmitting said alarm call to a predetermined
recipient (20).
2. Apparatus as claimed in claim 1, wherein said polling call generator (2) generates
voice message calls.
3. Apparatus as claimed in any one of claims 1 and 2, wherein said polling call transmitter
comprises one or more of:
i) a radio paging transmitter (6);
ii) a two-way radio transmitter;
iii) an intercom station (12); and
iv) means (16) for generating a telephone call.
4. Apparatus as claimed in any one of claims 1, 2 and 3, wherein said polling response
receiver comprises one or more of:
i) a radio paging receiver (8);
ii) a two-way radio receiver; and
iii) a telephone receiver (14).
5. Apparatus as claimed in any one of the preceding claims, wherein said alarm call transmitter
comprises one or more of:
i) a radio paging transmitter (6);
ii) a two-way radio transmitter;
iii) an intercom station (12); and
iv) means (16) for generating a telephone call.
6. Apparatus as claimed in any one of the preceding claims, wherein said polling call
generator (2) generates said polling calls at user determined periodic intervals.
7. Apparatus as claimed in any one of the preceding claims, wherein said polling call
generator (2), said polling call transmitter (6) and said polling call receiver (6;14)
act to transmit said polling call for a predetermined number of attempts prior to
triggering said alarm call generator (16) if a polling response is not received.
8. Apparatus as claimed in any one of the preceding claims, wherein said alarm call generator
(2) and said alarm call transmitter (16) act to attempt to transmit said alarm call
to a predetermined hierarchy of alarm call recipients (20) until an alarm call acknowledgement
is received.
9. Apparatus as claimed in any one of the preceding claims, wherein upon receipt of an
unsolicited polling response a next scheduled polling call to that person initiating
said unsolicited polling response is deferred.
10. Apparatus as claimed in any one of the preceding claims, wherein a polling call includes
a last received voice message response for that person, a non-voice message polling
response to said polling call indicating said voice message response is to be maintained
as current.
11. Apparatus as claimed in any one of the preceding claims, wherein said polling call
generator (2) is responsive to a predetermined non-voice message response from a person
monitored to alter polling call frequency for that person.
12. A method of monitoring personal safety comprising the steps of:
generating polling calls;
transmitting said polling calls to at least one person monitored;
receiving at least voice message responses as polling responses from said at least
one person;
storing said voice message responses;
when a polling response is not received from a given person, generating an alarm
call including at least a latest stored voice message response from said given person;
and
transmitting said alarm call to a predetermined recipient.