Field
[0001] The present invention relates generally to security monitoring systems for premises,
and in particular to such installations including radio-based location sensing arrangement
to detect human presence and location based on detecting perturbations of radio signals.
Background
[0002] Security monitoring systems for monitoring premises, often referred to as alarm systems,
typically provide a means for detecting the presence and/or actions of people at the
premises and reacting to detected events. Commonly such systems include sensors to
detect the opening and closing of doors and windows, movement detectors to monitor
spaces (both within and outside buildings) for signs of movement, microphones to detect
sounds such as breaking glass, and image sensors to capture still or moving images
of monitored zones. Such systems may be self-contained, with alarm indicators such
as sirens and flashing lights that may be activated in the event of an alarm condition
being detected. Such installations typically include a control unit (which may also
be termed a central unit or local management device), generally mains powered, that
is coupled to the sensors, detectors, cameras, etc. ("nodes"), and which processes
received notifications and determines a response. The local management device or central
unit may be linked to the various nodes by wires, but increasingly is instead linked
wirelessly, rather than by wires, since this facilitates installation and may also
provide some safeguards against sensors/detectors effectively being disabled by disconnecting
them from the central unit. Similarly, for ease of installation and to improve security,
the nodes of such systems typically include an autonomous power source, such as a
battery power supply, rather than being mains powered.
[0003] As an alternative to self-contained systems, a security monitoring system may include
an installation at a premises, domestic or commercial, that is linked to a remotely
located monitoring station where, typically, human operators manage the responses
required by different alarm and notification types. These monitoring stations are
often referred to as Central Monitoring Station (CMS) because they may be used to
monitor a large number of security monitoring systems distributed around the monitoring
station, the CMS located rather like a spider in a web. In such centrally monitored
systems, the local management device or central unit at the premises installation
typically processes notifications received from the nodes in the installation, and
notifies the Central Monitoring Station of only some of these, depending upon the
settings of the system - in particular whether it is fully or only partially armed,
and the nature of the detected events. In such a configuration, the central unit at
the installation is effectively acting as a gateway between the nodes and the Central
Monitoring Station. Again, in such installations the central unit may be linked by
wires, or wirelessly, to the various nodes of the installation, and these nodes will
typically be battery rather than mains powered.
[0004] An issue that arises particularly with monitored alarms, whether remotely monitored
at a monitoring station or linked to a local police department, is false alarms -
the triggering of alarm events that are reported to the remote monitoring station
or the police but which are not the result of an intrusion or burglary. False alarms,
needlessly occupy the human operators in the monitoring station so that extra staff
need to be provided to compensate for this, in order to maintain possibly contractually
specified response times. False alarms that lead to the call out of security staff
ad extra expense, and if false alarms are reported to the police there may be penalties
of various kinds.
[0005] False alarms sometimes arise when an occupant of premises protected by a security
monitoring system forgets that the system is an "armed at home" or "secure perimeter"
mode, and opens a monitored door or window. But many false alarms occur during the
arming of a system - for example, by systems being put inadvertently into "armed away"
mode (in which motion sensors within the premises are armed), when the intention was
to put the system into an "armed at home" mode (in which only sensors that protect
the perimeter of the premises), or entering the "armed away" mode from an "armed at
home" mode when the intention was to disarm the system. But when these false alarms
arise the occupier can be expected to be present, and in possession of the necessary
PIN or security token or dongle to disarm the system quite quickly - since in general
either a PIN or security token/dongle is needed in order to arm or disarm the system.
[0006] Much more problematic is another very common source of false alarms which arises
when an occupant arms the system on leaving the premises, when the system is put into
"armed away" mode in the belief that the premises are empty but unbeknownst to the
person arming the system someone else is still in the house. Often the unknown occupant
will be sleeping - and hence not trigger any motion sensors until they get up, possibly
long after the arming of the system. Many security monitoring system installations
do not include motion sensing in at least upstairs bedrooms or bathrooms, and often
not on upstairs landings, so the system may not be triggered until the unknown person
has got up, washed and dressed, and gone downstairs. And at that stage, there is a
good chance that they may have neither the PIN nor a dongle necessary to disarm the
system - at least not on their person, and possibly not at all if they are a guest.
Consequently, under these circumstances a false alarm may be triggered and the occupant(s)
of the premises unable to disarm the system - perhaps until the arrival of the police
or security personnel summoned by the remote monitoring station.
[0007] Consequently, there exists a need to provide a solution to the problem of false alarms
caused by the arming of a premises security monitoring system when the arming is based
on a flawed assumption that the premises are unoccupied.
Summary
[0008] According to a first aspect, there is provided a premises security monitoring system
having a local management device, and operatively coupled to the local management
device a plurality of alarm event sensors, a radio-based location sensing arrangement
to detect human presence and location based on detecting perturbations of radio signals,
the system providing an interface at which a user can arm and disarm the system; the
local management device being configured, on a user entering an instruction at the
interface to arm the system for the premises, to: determine, based on information
from the radio-based location sensing arrangement, whether the premises contain any
occupants at locations remote from the interface (and so remote from the user), and
if it is determined that the premises are occupied (i.e. there are occupants remote
from the user)to inform the user that the premises are occupied.
[0009] In this way the security monitoring system enables users to avoid a common source
of false alarms, reducing the risk that the user will cease to use the security monitoring
system due to an excessive number of false alarms. This functionality is particularly
useful when a user is arming to an armed away state, but may also help reduce incidence
of false alarms when systems are put into an armed at home mode.
[0010] According to a second aspect there is provided a local management device for a premises
security monitoring system, the management device configured to be coupled to a plurality
of alarm event sensors and a control interface at which the system can be armed and
disarmed, and to perform location sensing to detect human presence and location within
the premises based on detecting perturbations of radio signals; and further configured
on a user entering an instruction at the control interface to arm the system for the
premises, to:
perform a determination whether the premises contain any occupants at locations remote
from the interface, and if it is determined that the premises are occupied to inform
the user that the premises are occupied.
[0011] According to a third aspect there is provided a method performed by a local management
device of a premises security monitoring system, the system comprising a plurality
of alarm event sensors, a control interface at which the system can be armed and disarmed,
and a location sensing arrangement to detect human presence and location within the
premises and comprising a radio-based system that is configured to sense presence
and location based on detecting perturbations of radio signals, the method comprising:
receiving notification of a user entering an instruction at the control interface
to arm the system for the premises; performing a determination whether the premises
contain any occupants at locations remote from the interface; and, if it is determined
that the premises are occupied, informing the user that the premises are occupied.
[0012] According to a fourth aspect, there is provided a premises security monitoring system
having a local management device, and operatively coupled to the local management
device a plurality of alarm event sensors, and a radio-based location sensing arrangement
to detect human presence and location within the premises that is configured to sense
presence and location based on detecting perturbations of radio signals, the security
monitoring system providing an interface at which a user can arm and disarm the security
monitoring system;
the local management device being configured, on a user entering an instruction at
the interface to arm the system for the premises, to perform a determination, based
on information from the radio-based location sensing arrangement, of the number and
location of people present within the premises, and to inform the user of the number
and location(s) of people determined to be present.
[0013] Preferably premises security monitoring systems according to embodiments of the invention
are configured to store information on the number and location(s) of people determined
to be present in the premises and to update the information based on determined changes
in number and location.
[0014] According to a fifth aspect, there is provided a local management device for a premises
security monitoring system, the management device configured to be coupled to a plurality
of alarm event sensors and a control interface at which the system can be armed and
disarmed, and to perform location sensing to detect human presence and location within
the premises based on detecting perturbations of radio signals; and further configured
on a user entering an instruction at the control interface to arm the system for the
premises, to perform a determination, based on information from the radio-based location
sensing arrangement, of the number and location of people present within the premises,
and to inform the user of the number and location(s) of people determined to be present.
Optionally the local management device is configured to store information on the number
and location(s) of people determined to be present in the premises and to update the
information based on determined changes in number and location.
[0015] According to a sixth aspect, there is provided a method performed by a local management
device of a premises security monitoring system, the system comprising a plurality
of alarm event sensors, a control interface at which the system can be armed and disarmed,
and a location sensing arrangement to detect human presence and location within the
premises and comprising a radio-based system that is configured to sense presence
and location based on detecting perturbations of radio signals, the method comprising:
receiving notification of a user entering an instruction at the control interface
to arm the system for the premises; performing a determination, based on information
from the radio-based location sensing arrangement, of the number and location of people
present within the premises, and informing the user of the number and location(s)
of people determined to be present.
[0016] Preferably the method of the sixth aspect further comprises storing information on
the number and location(s) of people determined to be present in the premises, and
updating the information based on determined changes in number and location.
Brief description of the drawings
[0017] Embodiments of the invention will now be described, by way of example only, with
reference to the accompanying drawings, in which:
Figure 1 is a schematic plan of a single floor of premises in which a first security
monitoring system has been installed, the system including ;
Figure 2 illustrates schematically the principles of radio-based presence and location
sensing;
Figure 3 corresponding generally to Figure 1 but additionally shows the presence of
multiple sources of radio signals for use in a radio-based presence and location sensing
system; and
Figure 4 illustrates schematically features of a local management device of the system
of Figure 3.
Specific description
[0018] Figure 1 shows schematically a security monitoring system installation 100 in a dwelling,
having a perimeter. In this example, the dwelling is a multi-storey house. A front
door 104 serves as the main entrance to the premises. The Figure shows just one floor
of the dwelling, in this instance a ground floor, which accommodates the living space,
while the sleeping space which is provided on one or more other (upper) floors accessed
via stairway 105. The living space includes an entrance hall 106, onto which the front
door 104 opens, off which are a rear living room 108, a front dining room 110, and
a rear kitchen 112.
[0019] The kitchen 112 includes the back door 114 of the premises. The front 104 and back
114 doors are each provided with a sensor arrangement 116 that is triggered by the
opening of the relevant door - for example, a sensor arrangement 116 including a magnetically
triggered sensor such as a reed relay or a magnetometer.
[0020] The living room 108 is provided with glazed doors 118, which may be in the style
of "French Windows" or the like, which permit access to a rear garden, but which are
not intended, or used, for regular access to the interior of the premises. Consequently,
these glazed doors 118 are preferably provided with bolts or similar security fasteners
on their inner side - so that they cannot readily be opened from outside when the
bolts are secured. These doors 118 may not be provided with any sensing arrangement
to detect their opening (to reduce the cost of installing the security monitoring
system). Similarly, windows 120 to the kitchen 112 and dining room 110 may also not
be provided with any sensing arrangement to detect their opening - again as a means
of reducing the cost of installing the security monitoring system.
[0021] The security monitoring system includes a controller or central unit 122 which is
operatively coupled to the door opening sensors 116 and any other sensors of the system
preferably wirelessly using radio frequency (RF) communication rather than via a wired
connection. In addition, the central unit 122 is operatively connected, for example
via a wired and/or wireless Internet connection, to a remote monitoring station 700
to which alarm events are communicated for review and for appropriate intervention
or other action to be taken - and preferably the remote monitoring station 700 (also
referred to as a central monitoring station, CMS, given that one such station typically
supports several or many security monitoring installations) is staffed by human operatives
who can for example review images, video, and/or sound files, plus other alert types
and details, in order to decide whether to deploy private security staff, law enforcement
agents, a fire brigade, or medical staff such as paramedics or an ambulance - as well
as optionally reporting events and situations to one or more individuals associated
with the security monitoring system (e.g. a householder or owner).
[0022] The security monitoring system also includes one or more motion sensors, such as
a PIR sensor. In the illustrated example, motion sensors 124 are shown as being installed
in each of the rooms (108, 110, 112), and in the hall 106, and although not shown
preferably another motion sensor would be provided to monitor the stairs 105 that
lead to the upper floor(s).
[0023] Preferably, as shown, the security monitoring system includes at least one camera,
preferably a video camera with an associated (integral or separate) motion sensor,
activation of which may cause the camera (or the motion sensor) to report an event
to the central unit. In response, the central unit 122 may or may not instruct the
camera to transmit images (still or video) to the central unit for onward reporting
to the CMS 700.
[0024] The security monitoring system also includes a user interface or control panel 128
in the hall 106 fairly close to the front door 104. This control panel 128 is provided
so that a user can arm and disarm the security monitoring system using either a code
or PIN (e.g. a 4 or 6 digit PIN) or a token (using a short-range communication technology
e.g. RFID, NFC, BTLE). The control panel may also be used to set the security monitoring
system to an armed at home state, optionally directly from an armed away state. The
control panel 128 preferably includes a visual display, such as a screen (optionally
a touch sensitive display) to provide users with system information, status updates,
event reports, and even possibly face to face communication with personnel in the
central monitoring station (for which purpose the control panel 128 may have a built-in
video camera and optionally lighting). Although the same type of user interface may
also be provided adjacent the back door (within the premises), typically a rather
simpler device - known as a disarm node 130, may be provided to enable a user to disarm
or arm the system, again optionally using a PIN, code, or dongle/device. Such a disarm
node 130 may include one or more indicator lights, featuring e.g. RGB LEDs, to provide
visual feedback on arming status (armed away, armed at home, and possibly other armed
states), alarm event status, as well as at least an audio output device to provide
warning and advisory tones or messages. Preferably the disarm node 130 includes both
an audio output device (e.g. one or more loudspeakers and optionally an alarm sounder)
and a microphone so that a user can talk with a CMS operator if necessary. Like the
sensors 116 and 124, the control panel 128 and disarm node 130 are preferably provided
with at least one radio transceiver for communication with the control unit 122, as
well as having at least built-in autonomous power supplies (e.g. each having a battery
power supply). The various nodes of the security monitoring system, other than the
central unit 122, are preferably battery powered and communicate using RF transceivers
that consume little power (hence, not relying on Wi-Fi, 802.11 protocols, as these
tend to be very power hungry) and that typically rely on radio frequencies in approved
ISM frequency bands - such as between 860 and 900 MHZ.
[0025] Conventionally, when such a security monitoring system is in the disarmed state,
opening of the front or back doors, or triggering any of the motion sensors 124 doesn't
constitute an alarm event. The relevant sensor 116, 124 will typically be configured
to report a sensed event to the central unit 122 irrespective of the arm state of
the security monitoring system (since typically the nodes of a security monitoring
system are not aware of the arming state of the system), but the central unit 122
will disregard such reported events when the system is disarmed. In the fully armed
state, which may be termed the "armed away" state, event notifications from perimeter
sensors (in the illustrated example the door opening sensors 116 on the front 104
and back 114 doors, but typically also including one or more sensors to detect the
opening of windows 120) and internal movement or presence sensors, typically result
in the central unit 122 determining an alarm event which may be reported to the central
monitoring station.
[0026] Typically, the security monitoring system also has a second armed state in which
only the security of the perimeter is monitored - so that only events reported by
one or other of the door sensors 116 (or window sensors if present) count as potential
alarm events to be reported by the central unit 122 to the central monitoring station
- and this may be termed the "armed at home" state. The armed at home state is intended
to be used when the premises are occupied. In the armed at home state the central
unit 122 will routinely be arranged not to request any internal (video) camera to
share images with the central unit 122 - so that user privacy is maintained.
[0027] There may be more than one variant of the armed at home state - so that, for example
during the daytime only the perimeter may be monitored, but at night (or upon the
occupants retiring to bed) the system may be set to an armed at home (night) state
in which movement within the living accommodation (but not the sleeping accommodation)
can also give rise to an alarm event potentially to be reported to the CMS 700 (including
images from any camera within the monitored zone)- but the triggering of any movement
sensors for the area of the sleeping accommodation, e.g. on a landing, will not give
rise to alarm events.
[0028] The upper floor(s) of the premises may or may not include one or more motion sensors,
and there may be a motion-triggered video camera, typically at the head of the stairs.
Depending upon the proximity of climbable features externally, such as rainwater downpipes,
soil stacks, trees, outbuildings, some or all of the windows on the upper floors may
also be provided with sensors to detect their whether they are opened or closed, and
sometimes also to show the degree of their opening if open (e.g. based on one or more
magnets and one or more magnetometers or other sensors responsive to a magnetic field).
But typically, the bedrooms and bathrooms, and often the landings and walkways between
them, will not be provided with motion sensors - the idea being that such sensors
will not be armed in the armed at home mode, because we don't want the alarm being
triggered at night by occupants of the bedrooms, nor by those occupants walking between
bedrooms or between bedrooms and bathrooms.
[0029] Now consider a normal morning, when the usual occupant of the house wakes, gets up,
showers, dresses and then comes down stairs. Assume that the security monitoring system
is unarmed. On leaving the house, the usual occupant uses the control panel 128 in
the hall to arm the security monitoring system, putting it into the armed away mode
in which the control unit 122 will respond to reports of alarm events from all perimeter
sensors (door and window sensors) and all internal movement sensors, including cameras
triggered by motion, by reporting an incident to the remote monitoring station 700.
Arming the system, either by entering a PIN at the control panel 128, or by presenting
a security tag or dongle, the usual occupant leaves the premises, locks the door and
goes off to work.
[0030] Unbeknownst to the usual occupant, in the night his student son came home and let
himself in to the house. Now fast asleep in his bedroom on the first floor, he is
unaware that the security monitoring system is armed. Some hours later, when he eventually
surfaces, the son wanders downstairs to fix himself some breakfast. With no motion
sensors on the upper floor, the system is only triggered when the son enters the hall,
triggering the motion sensor 124. The speaker in the control unit 128 starts shrieking,
and an alarm alert is sent to the remote monitoring centre 700, while the son stands
in the hall with his hands over his ears trying desperately to remember how to turn
off the alarm: "what's the code", "is there a spare dongle in the house", "where is
it"? The son goes off to the kitchen to look for a dongle, and the alarm keeps sounding
[0031] Meanwhile, the remote monitoring station 700 is processing the alarm event. If there
is no video camera on the upper floor, hall or kitchen (a cost-saving measure), there
are no images or video for the monitoring centre operative to look at to identify
the intruder. So, the operative calls out a security guard, or the police to go to
the premises and investigate.
[0032] The same or similar events also occur when someone who normally leaves the house
early, before everyone else is up, falls sick or has a hangover -and stays in bed
instead of leaving the house. The other occupants leave together, arming the system
as usual as they leave, unaware that the house is still occupied.
[0033] What is needed is some means to avoid security monitoring systems being armed when
the person arming the system thinks that the premises is otherwise (apart from them
and any companions with them at the arming point) unoccupied, but in fact the house
is occupied with at least one other person present elsewhere in the house.
[0034] This is the main problem addressed by the present invention.
The underlying idea is to introduce to the premises a radio-based location sensing
arrangement to detect human presence throughout the premises, that is configured to
sense presence and location based on detecting perturbations of radio signals, so
that a local management device of a security monitoring system of the premises can,
on a user entering an instruction to arm the system for the premises, perform a determination,
based on information from the radio-based location sensing arrangement, whether the
premises contain any occupants at locations remote from the user, and if it is determined
that the premises are occupied to inform the user that the premises are occupied.
It will be appreciated is that we want to warn users of any other (i.e. other than
the user themselves) occupants, but we don't want to provide a warning in respect
of other occupants who are standing or sitting with the user while the user is trying
to arm the system. So, in effect we want to warn the user of any occupants who are
remote from the user interface via which the user is attempting to arm the system.
And so in this sense locations remote from the user or remote from the interface includes
locations on other floors, but also in other rooms on the same floor.
[0035] In this way, a user attempting to arm the system is warned, preferably at least audibly
by the system (for example via an audio output device in the control unit) of the
(invisible) presence of at least one other occupant, and preferably of their location(s),
so that the user can decide whether it is really appropriate to arm the system, or
to use a particular arming mode. For example, the user may know that someone is in
bed upstairs, but may know that that person will not leave the bed and come downstairs
- as they may be bedridden or too infirm to leave their bed. In this case they may
fully arm the system by arming to the "armed away" mode, but if the other occupant
is a surprise they may choose to arm to "arm at home" and leave a note on the inside
of the front door or somewhere else so that the other occupant is warned of the need
to disarm the system before opening an external door. Of course, the person attempting
to arm the system may be prompted to go and investigate - and perhaps discover the
return of their student son, and change their plans for the day. In any event, it
can be seen that the invention provides an effective and convenient way to avoid a
troublesome type of false alarm, thereby helping to reduce operator cost, increasing
customer satisfaction, and helping to improve security by reducing the risk that an
occupier will be dissuaded from using the system by the incidence of false alarms
- the latter being a very significant concern.
[0036] In an embodiment there is provided a premises security monitoring system having a
local management device, and operatively coupled to the local management device a
plurality of alarm event sensors, and a radio-based location sensing arrangement to
detect human presence and location within the premises that is configured to sense
presence and location based on detecting perturbations of radio signals, the security
monitoring system providing an interface at which a user can arm and disarm the security
monitoring system;
the local management device being configured, on a user entering an instruction at
the interface to arm the system for the premises, to perform a determination, based
on information from the radio-based location sensing arrangement, of the number and
location of people present within the premises, and to inform the user of the number
and location(s) of people determined to be present. In this way, a user entering an
instruction to arm the system is made aware if anyone else has been detected as present,
and their location(s), thereby enabling the user to avoid arming the system in ignorance
of someone else's presence.
[0037] Preferably premises security monitoring systems according to embodiments of the invention
are configured to store information on the number and location(s) of people determined
to be present in the premises and to update the information based on determined changes
in number and location. This enables the local management unit, or some other entity
of the system, to react immediately to a user attempting to arm the system without
needing to wait to perform a WFS sweep to acquire the necessary information about
presence and location.
[0038] We will now provide a brief introduction to radio-based presence detection, which
may for example be based on analysing the signal dynamics and signal statistics of
radio signals and/or detecting changes in channel state information (CSI). A radio
(or wireless) signal as used herein refers to a signal transmitted from a radio transmitter
and received by a radio receiver, wherein the radio transmitter and radio receiver
operate according to a standard or protocol. Such standards include, but are not limited
to, IEEE 802.11. (which includes the Wi-Fi standards), IEEE 802.15 (which includes
Zigbee), Bluetooth SIG, IEEE 802.16, IEEE 802.20, UMTS, GSM 850, GSM 900, GSM 180,
GSM 19011, GPM ITU-R 5.13, GPM ITU-R 5.150, ITU-R 5.280, 3GPP 4G (including LTE),
3GPP 5G, 3GPP NR, AND IMT-2000. However, the radio transmitters and receivers may
operate in non-telecommunications or Industrial, Scientific and Medical (ISM) spectral
regions without departing from the scope of the invention.
[0039] Essentially the idea is to use radio signals to probe a zone or zones of interest,
and to analyse and extract statistics from these signals, in particular looking at
the physical layer and/or data link layer such as MAC address measurements that expose
the frequency response of a radio channel (e.g., CSI or RSSI measurements). These
measurements are processed to detect anomalies and variations over time, and in particular
to detect changes signifying the entrance of a person and/or movement of a person
within a monitored zone. The zone(s) to be monitored need to be covered sufficiently
by radio signals, but the sources of the radio signals may either already be present
before a monitoring system is established - for example from the plurality of Wi-Fi
or Bluetooth capable devices that are now dotted around the typical home or office,
or the sources may be added specifically to establish a monitoring system. Often some
established (i.e., already located or installed) radio devices are supplemented by
some extra devices added as part of establishing a radio-based presence detection
system. Among the types of devices (preinstalled or specifically added) that may be
used as part of such a detection system are Wi-Fi access points, Wi-Fi routers, smart
speakers, Wi-Fi repeaters, as well as video cameras and video doorbells, smart bulbs,
etc. Because presence (or intrusion) is detected by detecting a change in the properties
or character of radio signals compared to some previous reference signal(s), it is
preferred to establish what might be termed the monitoring network between radio devices
that are essentially static (i.e., that remain in the same position for extended periods)
rather than relying on devices that are repeatedly moved - such as smart phones, headphones,
laptops, and tablet devices. It is not strictly speaking essential for all the devices
whose signals are used by the monitoring system to be part of the same network - for
example, signals from Wi-Fi access points of neighbouring premises could be used as
part of a monitoring system in different premises. Again, a primary consideration
is the stability of the signals from the signal sources that are used. Wi-Fi access
points provided by broadband routers are seldom moved and rarely turned off, consequently
they can generally be relied upon as a stable signal source - even if they are in
properties neighbouring the property containing the zone or zones to be monitored.
[0040] The idea is illustrated very schematically in Figure 2, here with an installation
200 including just a single source (or illuminator) 202 and just a single receiver
204, for simplicity, although in practice there will typically be multiple sources
(illuminators) and sometimes plural receivers. The installation 200 has been established
to monitor a monitored zone 206. In Figure 2A we see that in steady state, and in
the absence of a person, radio signals are transmitted from the source 202, spread
through the monitored zone 206, and are received by the receiver 204. Of course, in
most installations there will be walls, ceilings, floors, and other structures that
will tend to reflect, at least in part, signals from the source. Furniture and other
objects may block and attenuate the signals, the reflected signals will give rise
to multiple paths, and the signals may interfere with each other, and there may be
scattering and other behaviours, such as phase shifts, frequency shifts, all leading
to complexity in the channels experienced by the radio signals that arrive at the
receiver 204. But while the environment is static and unchanging, the receiver will
tend to see a consistent pattern of radio signals. And this is true whether or not
the source transmits continuously or transmits periodically. But this consistent pattern
of received signals is changed by the arrival of an intruder 208, as shown in Figure
2B. From Figure 2B we see that, at the very least, the presence of a person in the
monitored zone blocks at least some of the signals from the source, and that affects
the pattern of radio signals received by the receiver 204. The changed pattern of
signals received by the receiver enables the presence of the intruder to be detected
by a presence monitoring algorithm that is supplied with information derived from
the received signals. It will be appreciated that the nature and extent of the perturbation
of the signals passing from the source 202 to the receiver 204 is likely to change
as the intruder 208 enters, passes through, and leaves the monitored area 206, and
that this applies also to reflected, refracted, and attenuated signals. These changes
may enable the location of a person within the zone, and their speed of movement,
to be determined.
[0041] It will be realised that signals that are received from an illuminator device (or
from more than one illuminator device) after having passed through a monitored space
(or volume) have in effect been filtered by the environment to which they have been
exposed. We can therefore imagine the monitored volume as a filter having a transfer
coefficient, and we can see that a received signal is at least in part defined by
the properties, or channel response, of the wireless channel through which it is propagated.
If the environment provided by the monitored volume changes, for example by the addition
of a person, then the transfer coefficient of the filter, and the channel response
or properties, will also change. The changes in the transfer coefficient, and that
in the channel response, consequent on the change in the environment of the monitored
space, can be detected and quantified by analysing radio signals received by the wireless
sensing receiver(s). Both the introduction of an object, e.g. a person, into the monitored
space and movement of that object within the monitored space will change the environment
and hence change the effective transfer coefficient and the channel response.
[0042] The radio-based sensing system can be trained by establishing a base setting in which
the monitored zone is unoccupied, which is then labelled as unoccupied for example
using a smartphone app or the like, and then training occupied states by a person
entering, standing, and then walking through each of the zones one by one. Presence
at different locations in each of the zones may be captured and labelled in the system
in the same way. This process may be repeated with two people, and then optionally
with more people. In essence this is a supervised machine learning approach, but other
approaches to training may be used.
[0043] The system may need to be retrained for the base setting if bulky furniture (or if
a large metal object) is added to or moved within the monitored space, because these
can be expected to change the propagation properties of the relevant zone/space. The
data for unoccupied states is preferably retained within a database of "unoccupied"
states, even when there are changes to the arrangement of furniture etc. It may not
be necessary to retrain for the occupied states, if the system can determine a delta
function between the previous base state and the new one, because the delta function
may also be applicable in occupied states. But if not, it may be sufficient to retrain
only a subset of the occupied states previously learnt. The system may also be configured
to self-learn to accommodate changes in the characteristics of the zones when unoccupied,
and to add newly determined unoccupied state data to the database.
[0044] Although the Figure 2 example uses just a single source (illuminator) and a single
receiver, as already mentioned often multiple sources (illuminators) will be used
in order to achieve satisfactory coverage of the zone or zones to be monitored. Multiple
zones may be monitored by a single receiver through the use of multiple strategically
placed sources, but each zone, or some zones of multiples zones may have a dedicate
receiver that does not serve other zones. Likewise, a radio signal source (illuminator)
may provide illuminating signals for a single monitored zone or for multiple monitored
zones. Also, a presence monitoring system (and a security monitoring system including
such a presence monitoring system) may use mesh network arrangement, for example a
Wi-Fi mesh network, in which multiple devices act as receivers for illuminating signals
- either for a single monitored zone or for multiple monitored zones."
[0045] Figure 3 is based on Figure 1, and the features and their properties and behaviours
described with reference to Figure 1 apply equally to the corresponding features of
Figure 3. Figure 3 shows the presence of multiple sources of radio signals that may
be used in a radio-based system that senses presence and location based on detecting
perturbations of radio signals. As explained with reference to Figure 2, ideally we
want to ensure that the whole area of interest is adequately covered by radio signals
(from relevant sources, of course) so that there are no blind spots.
[0046] The radio-based presence sensing, which may conveniently be based on the monitoring
of Wi-Fi signals, and which for convenience we will refer to as WFS, is here performed
by the central unit 122 which operates as a Wi-Fi Access Point (AP) and which serves
as a Wi-Fi sensing receiver. The Figure shows the presence of various radio transceivers
that are used to provide radio-based presence detection in each of the interior spaces
of the premises. The WFS system is preferably configured to recognise location "zones"
which may map to rooms, but may also map to regions within rooms, and exterior zones
may be identified corresponding to particular sections of the grounds or surroundings
of a dwelling or other structure - e.g. terrace, front garden, parking area, etc.
Each of these distinct areas may be identified as zones, but preferably the system
is configured to label the different zones by names which users are likely to find
readily meaningful - such as the room names used in Figures 1 and 3, and for bedrooms
either locations (front bedroom, back bedroom) or descriptive terms such as guest
bedroom, master bedroom, or even occupant names Juliet's bedroom, Romeo's bedroom,
Vale's bedroom, etc. (all the labelling being applied during system set up or subsequently).
In this way, when the system issues a warning of unexpected presence, for example
via a speaker in the control unit 628, it can announce "There's someone in Juliet's
room, do you still want to arm the system" - rather than merely saying "There's someone
upstairs do you still want to arm the system".
[0047] To ensure that the WFS effectively covers the whole area of interest (for example,
the ground of the premises) we need to provide a sufficient number of suitable located
Wi-Fi stations (STAs) as WFS illuminators so that Wi-Fi signals received at the central
unit AP 122 traverse the whole area of interest. If we want to provide WFS cover to
multiple floors we may need to provide a WFS receiver on each floor, together an appropriate
number of suitably positioned illuminator devices, although depending on the building's
construction signals from illuminators on one floor may be used by WFS receivers on
other floors.
[0048] Because Wi-Fi transceivers are quite power hungry, we will generally want the STAs
used as WFS illuminators to be mains powered (but preferably also with some back-up
power supply such as an internal battery power source) rather than solely battery
powered. That may lead us to replace some battery powered but Wi-Fi capable devices
with mains powered equivalents - so, for example, a battery powered video camera might
be replaced by a mains powered equivalent 626, and battery powered control unit 128
may be replaced by a mains powered equivalent 628 that is Wi-Fi capable (although
the control unit 628 may still use something other than Wi-Fi to communicate with
the central unit 122).
[0049] Alternatively (or additionally) we may simply add new mains powered Wi-Fi capable
devices such as smart plugs, smart bulbs, Wi-Fi range extenders (for example of the
type that simply plug in to a socket of the mains electricity supply), to provide
a Wi-Fi network that covers the whole of the area of interest.
[0050] The central unit AP 122 preferably works in infrastructure mode in conjunction with
the various other Wi-Fi stations (STAs) to form either an infrastructure Basic Service
Set (BSS) or, in conjunction with another AP connected to the same Local Area Network
as the central unit 122 - such as broadband router 600, to provide an Extended Service
Set (ESS).
[0051] For ease of explanation, we will assume initially that the central unit AP 122 provides
just a BSS and not an ESS, and that only the central unit AP 122 serves as a Wi-Fi
sensing receiver. Some or all of the STAs in the BSS act as illuminators to provide
signals which the CU 122 analyses in order to perform WFS. As shown, these other STAs
include the broadband router 600 in the dining room, the control unit 628 and a Wi-Fi-enabled
camera 626 in the hall, and optionally the disarm node 130 in the kitchen. Preferably,
because of the power consumption concerns, both the Wi-Fi enabled camera and the disarm
node 130 are fed with power from a mains electricity supply as well as having an autonomous
internal power supply. In addition, both the kitchen is provided with an STA in the
form of for example a "smart speaker" 610, and the living room with a "smart plug"
612. If the disarm node 130 only has an internal power supply, and is not mains fed,
it may not be configured as a Wi-Fi STA but instead some other Wi-Fi STA device may
be installed to suitably extend WFS coverage within the kitchen and the living room
- for example, a Wi-Fi range extender or smart plug or the like which is plugged into
a conveniently located power socket.
[0052] With the arrangement shown in Figure 3 the control unit 122 (or more generally the
security monitoring system, given that some entity other than the central unit may
be responsible for determining presence and location of presence) may be configured,
whatever the arming state of the system, to use the radio-based presence sensing to
detect and locate presence within the monitored area(s). The system (typically the
central unit) may for example records, e.g. in a database, the location (e.g. the
relevant zone identifier) and time of the inferred presence. The system (e.g. central
unit) receives information data from the radio-based presence sensing arrangement
relating to detected presence and these data will be processed to determine the location(s)
(e.g. zone identifier(s)) of any human presence and also preferably information data
relating to the person count in each zone determined to be occupied. These data, and
their timings, are recorded in the database. The system (e.g., the central unit) is
therefore continuously aware when and where is presence in the monitored areas.
[0053] Although Figure 3 only illustrates a single floor of premises, it will be appreciated
that if it is desired to provide a WFS capability for other floors of the premises
it will be necessary to ensure suitable Wi-Fi network coverage those floors, typically
by providing a corresponding access point and a plurality of Wi-Fi STAs as illuminators
for each floor - although sometimes useful WFS capability can be achieved between
floors. Understandably, attenuation of signals within a building is critically dependent
upon the type of construction and the materials used, and these factors need to be
considered when designing and installing a WFS system.
[0054] It will be appreciated that by combing a radio-based location sensing arrangement
with a premises security monitoring system it is possible to provide users with information
on the occupied state of the premises, thereby helping to eliminate the class of false
alarms which arise when a user arms a security monitoring system not knowing that
the premises are otherwise occupied.
[0055] Thus, the problem is solved by providing a premises security monitoring system having
a local management device, and operatively coupled to the local management device
a plurality of alarm event sensors, a radio-based location sensing arrangement to
detect human presence and location based on detecting perturbations of radio signals,
the system providing an interface at which a user can arm and disarm the system; the
local management device being configured, on a user entering an instruction at the
interface to arm the system for the premises, to: determine, based on information
from the radio-based location sensing arrangement, whether the premises contain any
occupants at locations remote from the interface, and if it is determined that the
premises are occupied to inform the user that the premises are occupied.
[0056] When configuring a system according to embodiments of the invention it is useful
to think about what "remote" means with the particular installation. It may not always
be based on distance: for example if the interface node (e.g. control unit 128 or
628) is in a large open plan space, such as in a loft-type development, it may be
that a user standing at the control unit can see the whole of the open plan space
that is 10 or more metres long and the same wide, so that it is extremely unlikely
that they can be any "hidden" occupants in that space, but if there is an upper floor
- say 3 metres above the open plan space, a user standing at the interface node will
not be able to see anyone on the upper floor. So, we need to think about zones which
need to be considered for potentially "hidden" occupants and we may do this by defining
a "local" one around the control unit - which in the illustrated example would preferably
just be zone 2, the hall, for the control unit 628 (and just the kitchen, zone 3,
for the disarm node 130). Then potentially every monitored zone other than the "local"
zone can be considered as a remote zone, and any presence in a remote zone known to
the central unit 122 (or more generally known to the WFS system) is treated as a "hidden"
presence which results in the local management device 122 informing the user that
the premises are occupied.
[0057] Hence when configuring security monitoring systems according to embodiments of the
invention we may wish to define a zone around each interface unit (e.g. control unit
628, and disarm node 130) which constitutes the area which is "near" the interface
- and which a user can clearly see when located next to the interface, and then potentially
classify all other zones (or rooms) as remote - on the basis that a user at the relevant
interface cannot be sure to see any occupants of such zones.
[0058] Alternatively, instead of working on the basis of near and remote zones, systems
according to embodiments of the invention may be configured to consider all detected
presence, people count, and then provide the user with information (e.g. a voiced
announcement) about the people count, such as the number of people detected and their
locations. For example, "There is one person in the house, in the hall, it is safe
to arm the system" or "The people count is one, it is safe to arm the system", or
"There are three people in the hall, otherwise the house is unoccupied". Or the announcement
might only be provided if the people count is greater than one. Or announcements might
only be provided in respect of presence(s) detected in rooms other than the one in
which the interface node is located - so only in respect of presence(s) detected outside
the hall of Figure 3 where the control unit 628 is located.
[0059] Optionally, the local management device is further configured to inform the user
of the location(s) of any detected occupant(s).
[0060] Preferably the local management device is configured to perform the determination
upon the user entering an instruction to arm the system to an armed away state but
not upon the user entering an instruction to arm the system to an armed at home state.
[0061] Preferably the premises security monitoring system includes an audio interface and
is configured to use the audio interface in informing the user that the premises are
occupied.
[0062] Preferably the premises security monitoring system further comprises a control device
separate from the local management device, the control device providing the interface
at which a user can arm and disarm the security monitoring system.
[0063] Preferably the local management device is operatively connected to a remote monitoring
station, and further configured also to notify the remote monitoring station in the
event that the user is informed that the premises are occupied.
[0064] Preferably the local management device is further configured to couple the remote
monitoring station to a two-way video interface of the system to enable a dialogue
between the user and the remote monitoring station.
[0065] In security monitoring installation according to embodiments of the invention the
radio-based system is preferably configured to process communication signals received
from one or more radio transmitters operating according to one or more communication
standards or protocols, as distinct for example from merely processing RF carrier
waves or other unmodulated signals. It will be appreciated that the ubiquity of sources
of communication signals in the domestic (and commercial) environment mean that by
using such sources the cost of deployment, and the time involved in deploying, a radio-based
presence and location system are much reduced. Moreover, communication signals according
to communication standards or protocols typically have structures and features that
can readily be exploited in the provision of radio-based presence and location systems.
The one or more radio transmitters may be in a common wireless network with the local
management device, as this facilitates integration of the radio-based presence and
location system into the security monitoring system - which is likely to reduce both
the cost and the installation time required to deploy such a security monitoring system.
[0066] The local management device of security monitoring installations according to embodiments
of the invention preferably includes a radio receiver of the radio-based presence
and location sensing system, rather than for example receiving presence and location
data or signals from another device which is part of the radio-based presence and
location sensing system. This helps to reduce complexity and hence also reduce both
cost and speed of deployment. Importantly, in the cases that the radio-based system
is configured to process communication signals according to one or more communication
standards or protocols,
it also enables the local management device to benefit directly from recovery protocols
and mechanisms integrated into the relevant communication standards or protocols.
[0067] Preferably, the local management device includes a processor and a memory holding
software instructions that when run on the processor cause the local management device
to process radio signals to derive location and presence data. This helps to reduce
complexity and hence also reduce both cost and speed of deployment.
[0068] Optionally, in security monitoring installations according to embodiments of the
invention the sensing arrangement to detect human presence uses changes in channel
state information or received signal strength in determining presence.
[0069] Optionally, in security monitoring installations according to embodiments of the
invention the local management device functions as an access point of a radio network,
such as a Wi-Fi network, whose signals are used by the radio-based presence and location
sensing system. This may have the benefits of reducing installation complexity and
enabling quicker setup. In such security monitoring installations, the radio network
for which the local management device functions as an access point may include at
least one further access point. For example, in a Wi-Fi deployment the Wi-Fi network
may be based on an Extended Service Set model, with two or more interconnected APs.
[0070] Optionally, in security monitoring installations according to embodiments of the
invention the one or more radio transmitters may include one or more of the following:
a Wi-Fi access point, a Wi-Fi extender, a smart plug or smart socket, a smart speaker,
a smart bulb, a control panel of the security monitoring system, a Wi-Fi-enabled video
camera.
[0071] In an embodiment there is provided a local management device for a premises security
monitoring installation, the management device configured to be coupled to a plurality
of alarm event sensors and a control interface at which the system can be armed and
disarmed, and to perform location sensing to detect human presence and location within
the premises based on detecting perturbations of radio signals; and further configured
on a user entering an instruction at the control interface to arm the system for the
premises, to:
perform a determination whether the premises contain any occupants at locations remote
from the interface, and if it is determined that the premises are occupied to inform
the user that the premises are occupied.
[0072] Preferably the local management device is configured to perform location sensing
by processing communication signals received from one or more radio transmitters operating
according to one or more communication standards or protocols. In an alternative,
something else such as Wi-Fi extender, or another AP, may perform the location and
presence sensing and provide the results to a local management device or central unit.
[0073] Preferably the local management device further comprises a radio transceiver that
the local management device uses as a radio receiver of a radio-based presence and
location sensing system. The local management device may be a controller of a security
monitoring system in which the intervention device(s), video cameras and other sensors
are coupled to the local management device using wires rather than wirelessly. But,
in general, the local management device will include one or more transceivers for
wireless exchange of control and housekeeping signals with video cameras and other
nodes and sensors of the system, but these will typically support the use of low bandwidth
transmissions that can be supported by low power, low bandwidth transceivers in the
nodes and sensors of the system - permitting the use of internal battery power supplies
in the nodes and sensors, while still achieving reasonable battery life. The local
management device may include a further transceiver, such as a Wi-Fi transceiver,
that is used as a radio receiver of the radio-based presence and location sensing
system - and optionally also for the transfer of video data from video cameras of
the security monitoring system.
[0074] Preferably, the local management device further comprises a processor and a memory
holding software instructions, the software instructions when run on the processor
causing the local management device to process radio signals to derive location and
presence data.
[0075] Preferably, the local management device is configured to detect human presence and
location using changes in channel state information or received signal strength.
[0076] In an embodiment there is provided a method performed by a local management device
of a premises security monitoring system, the system comprising a plurality of alarm
event sensors, a control interface at which the system can be armed and disarmed,
and a location sensing arrangement to detect human presence and location within the
premises and comprising a radio-based system that is configured to sense presence
and location based on detecting perturbations of radio signals, the method comprising:
receiving notification of a user entering an instruction at the control interface
to arm the system for the premises; performing a determination whether the premises
contain any occupants at locations remote from the interface; and, if it is determined
that the premises are occupied, informing the user that the premises are occupied.
[0077] Figure 4 is a schematic drawing showing in more detail features of the gateway or
central unit 122 of Figures 1. The gateway 122 includes a first transceiver 430 coupled
to the first antenna 480, and optionally a second transceiver 432 coupled to a second
antenna 482. The transceivers 430 and 432 can each both transmit and receive, but
a transceiver cannot both transmit and receive at the same time. Thus, the transceivers
430, 432 each operate in half duplex. Preferably a transceiver will use the same frequency
to transmit and receive (although of course if the two transceivers are to operate
simultaneously but in opposite modes, they will operate on different frequencies).
The transceivers 430, 432 may be arranged such that one transceiver 430 uses a first
frequency for transmit and receive and the second transceiver 432 uses the same first
frequency for transmit and receive, i.e. the transceivers are arranged to operate
in a diversity-like arrangement. Alternative, the second transceiver may, depending
on configuration, be arranged to use a second frequency for transmit and/or receive.
The transceivers 430 and 432 are coupled to a controller 450 by a bus. The controller
450 is also connected to a network interface 460 by means of which the controller
450 may be provided with a wired connection to the Internet and hence to the monitoring
centre 700. The controller 450 is also coupled to a memory 470 which may store data
received from the various nodes of the installation for example event data, sounds,
images and video data. The central unit 122 also includes a crystal oscillator 451,
which is preferably a temperature controlled or oven-controlled crystal oscillator.
This is used for system clocking and also frequency control of the transceivers. The
gateway 122includes a power supply 362 which is coupled to a domestic mains supply,
from which the gateway 122 generally derives power, and a backup battery pack 464
which provides power to the gateway in the event of failure of the mains power supply.
Preferably, as shown, the central unit 122 also includes a Wi-Fi transceiver 440,
and associated antenna arrangement 442, which may be used for communication with any
of the nodes that is Wi-Fi enabled. The Wi-Fi enabled node may be a remote control
or control panel that may for example be located close to the main entrance to the
building (e.g., control panel 128 or disarm node 130) to enable the occupier to arm
or disarm the system from near the main entrance, or it may for example be an image-capture
device such as a video camera (e.g. camera 126). Similarly, an interface enabling
bidirectional communication over a Public Land Mobile Network (PLMN), such as GSM
or L TE, may optionally be provided. Optionally, a third antenna 484 and associated
ISM transceiver 434 may be provided, for example for communication with the monitoring
centre 700 over, for example, the European 863MHz to 870MHz frequency band. Optionally,
the third transceiver 434 may be a Sigfox transceiver configured to use the Sigfox
network to contact the central monitoring station especially in the event that jamming
of other radio channels is detected.
[0078] The first 430 and second 432 transceivers may both be tuneable ISM devices, operating
for example in the European 863MHz to 870MHz frequency band or in the 915MHz band
(which may span 902-928MHz or 915-928MHZ depending upon the country). In particular,
both of these devices may be tuned, i.e. may be tuneable, to the frequencies within
the regulatorily agreed sub-bands within this defined frequency band. Alternatively,
the first transceiver and the second transceiver, if present, may have different tuning
ranges and optionally there is some overlap between these ranges.
[0079] The controller 450 is configured to run a sensing application using a WFS software
agent 800, which may be stored in memory 470. The WFS software agent 400 uses WFS
radio APIs in the Wi-Fi transceiver 440 to interact with the Wi-Fi radio, the APIs
enabling extraction of desired channel environment measurement information and provides
the ability to assert any related controls to configure WFS features. This behaviour
will be described in more detail shortly. The sensing application on the CU will report
a presence state change when the appropriate thresholds are triggered, along with
the address of the device whose received data triggered the algorithm. The WFS agent
provides a monitoring system which enables the security monitoring system to detect
presence and movement in a monitored space, without the necessity to use line of sight
motion detectors.
[0080] As an alternative to incorporating the radio sensing application into the central
unit, this functionality can be provided on an access point, e.g. a Wi-Fi access point,
AP such as router 300, of the premises, with the AP configured to report the result
of presence detection to the central unit 122. In another example, a Wi-Fi range extender
could instead be used as sensing master for its connected nodes, but would be configured
to report to the central unit 122 which would be the overall master in terms of reporting
the "alarm".
[0081] A brief explanation will now be given of how WFS works, and how WFS can be integrated
into a security monitoring system, and in particular how WFS can be integrated into
a central unit of a security monitoring system.
[0082] Wi-Fi Sensing can be performed with any Wi-Fi device and can be used on any available
communication path. Each communication path between two devices gives the chance to
extract information about the surrounding environment. Wi-Fi sensing is based on an
ability to estimate the wireless channel and hence the surrounding environment. Because
Wi-Fi networks comprise many devices spread throughout a geographical area, they are
well suited to exploiting these devices' transmissions in effect to provide a radar
system. Depending on the number of devices, the radar system may be monostatic, bistatic,
or multistatic. In monostatic WFS, a single device measures its own transmitted Wi-Fi
signals. In bistatic WFS, the receiver and transmitter are two different devices (for
instance, an AP and a STA in infrastructure mode). In multistatic WFS, the received
signals from multiple Wi-Fi transmitters are used to learn about a shared environment.
[0083] At least one Wi-Fi transmitter and one Wi-Fi receiver are required to perform WFS
measurements, and these can be located in the same device (to create a kind of monostatic
radar) or in different devices. The measurement is always performed by a Wi-Fi Sensing-enabled
receiver on the Wi-Fi signal transmitted by a transmitter, and which may or may not
originate from a Wi-Fi sensing-capable device. The device that transmits the signal
that is used for measurements is called the "illuminator," as its transmissions enable
collection of information about the channel - that is, it illuminates the channel.
[0084] Different modes of Wi-Fi Sensing measurements are recognised - Passive, Triggered,
Invoked, and Pushed, and these depend upon what triggers the illuminator device to
transmit a Wi-Fi signal. Preferably the agent improves the usefulness of the standard
beacon interval by using optimised timings.
[0085] In passive mode, WFS relies on transmissions that are part of regular Wi-Fi communication.
The Wi-Fi Sensing receiver(s) rely only on transmissions between itself and the illuminator
device(s). Passive transmissions do not introduce overhead, but the Wi-Fi sensing
device lacks control over the rate of transmissions, transmission characteristics
(bandwidth, number of antennas, use of beamforming), or environmental measurements.
[0086] Triggered measurement happen when a Wi-Fi Sensing device is triggered to transmit
a Wi-Fi packet for the purpose of WFS measurements, either in response to a received
Wi-Fi packet or by the higher layers (for instance, in WFS software).
[0087] Invoked measurement involves utilizing a packet transmission that is in response
to a packet received from the Wi-Fi Sensing receiver device.
[0088] In pushed mode, a transmission is initiated by the illuminator device for measurement.
A pushed transmission can be either a unicast or a multicast/broadcast message. Multicast/broadcast
messages can be used for measurements by multiple WFS receivers simultaneously if
the devices are not in power-save mode.
[0089] Triggered transmissions introduce overhead because additional over-the-air transmissions
are required. Pushed transmissions introduce less overhead compared to invoked transmissions,
because the exchange is unidirectional rather than bidirectional. Triggered transmissions
allow for a system to control both the rate and occurrence of measurements.
[0090] A WFS network is made up of one or more WFS illuminators and one or more WFS receivers.
A WFS system is made up of three main components and that are present in Wi-Fi Sensing
illuminators and receivers:
first is the Wi-Fi radio, which encompasses the radio technology specified in IEEE
802.11 standards, the interfaces and the APIs connecting the radio to the higher layers;
second is the Wi-Fi Sensing software agent, consisting of a signal processing algorithm
and interfaces, the agent interacting with the Wi-Fi environment, and turning radio
measurement data into motion or context-aware information; and
thirdly, an application layer operates on the Wi-Fi sensing output and forms the services
or features which are ultimately presented to an end user - such as a security monitoring
service provided by a security monitoring system that detects presence using WFS.
[0091] A WFS system can be built based on existing Wi-Fi standards, hardware, software and
infrastructure.
[0092] The fundamental component required to enable Wi-Fi sensing on the radio is the interface
to enable control and extraction of periodic channel or environmental measurement
data. Regardless of device type, operating band or Wi-Fi generation, the core APIs
to enable Wi-Fi sensing are similar, as the required data and control are common.
[0093] The WFS software Agent can reside on any Wi-Fi device; for example, in the infrastructure
mode, the agent may reside on the AP, in which case channel measurements from all
the STAs associated with the AP can be collected. The software agent may also be located
on a STA. But in the security management system applications this would mean that
the STA would either need to be the controller of the security management system (e.g.
the CU), or would have to be reporting to the controller of the security management
system (e.g. the CU). Generally, we therefore prefer to run the software agent on
the CU, and given that the CU is conveniently also an access point, it makes sense
for us to run the software agent on the CU acting as AP rather than merely as an STA.
[0094] The WFS software Agent uses the WFS radio APIs to interact with the Wi-Fi radio,
the APIs enabling extraction of desired channel environment measurement information,
and providing the ability to assert any related controls to configure WFS features.
[0095] The WFS Agent has two main subsystems: Configuration and Control; and a Sensing Algorithm.
The Configuration and Control subsystem interact with the radio, using a standard
set of APIs. The Configuration and Control subsystem performs tasks including sensing
capability identification, pushed illumination coordination, and radio measurement
configuration. The sensing algorithm subsystem includes intelligence needed to extract
the desired features from the radio measurement data and may differ according to the
desired sensing application.
[0096] The WFS software Agent is needed on any sensing receiver, but is merely optional
on an illuminator - only being required if the illuminator also acts as a receiver.
If included on an illuminator, only the configuration and control subsystem is needed.
By having the agent on the illuminator, additional enhancements are enabled, including
sensing capability identification and co-ordinated pushed illumination. If the illuminator
is not running an agent, it is still technically able to participate in the sensing
network, but only the most basic features that currently exist in Wi-Fi standards
will be supported.
[0097] The WFS software Agent processes and analyses the channel measurement information
and makes sensing decisions, such as detecting motion. This information is then shared
with the application layer via the Wi-Fi Sensing agent I/O interface. As well as interfacing
with the radio and the application layer, the Wi-Fi Sensing agent also interfaces
with the existing Wi-Fi services on the system. This interface is necessary for the
agent to provide feedback for sensing optimizations that can be used in radio resource
management decisions, such as band steering or AP selection requests.
[0098] The application layer of a WFS system creates the sensing service and in effect presents
the information to the end user (in our case to the security management system).
The application layer can potentially reside on any networked device: in some embodiments
of the present invention it will reside in the central unit 122 along with the WFS
agent, but in other embodiments the application layer may exist in an external server
or even in the central monitoring station. We prefer, however, to provide the application
layer on the central unit to avoid potential problems with signalling delays (for
example due to accidental or deliberate network interruption) between the central
unit (or other WFS receiver) and a remotely located entity. The application layer
receives input from one or multiple Wi-Fi sensing software agents. It combines the
information and delivers it to the security management system which may then in turn
provide it to the CMS and/or to a cloud service by means of which push notifications
may be sent to a registered user device such as a smartphone - allowing users to receive
real-time notifications and the ability to view historic data.
[0099] A typical Wi-Fi home network follows one of two common deployment scenarios. The
first consists of a single AP that serves as the internet gateway for all the devices
in the house. The second consists of multiple APs forming an ESS and extending coverage
throughout the home. Depending on the use case, the Wi-Fi Sensing receiver may be
the AP and/or other devices in the network. Not all the devices in a home deployment
need to be Wi-Fi Sensing capable.
[0100] Wi-Fi Sensing can be deployed in all types of Wi-Fi networks and topologies, operating
in different frequency bands (2.4, 5, 6, and 60 GHz) and different bandwidths. The
sensing resolution and performance depends on the use case requirements. In general,
it is enhanced with the increase in the number of participating devices and higher
bandwidths. Applications that require lower resolutions and longer range, such as
home monitoring, can be deployed using Wi-Fi networks operating in 2.4GHz and 5GHz.
Applications that require higher resolutions and lower range, such as gesture recognition,
require 60GHz Wi-Fi networks.
[0101] In multi-AP and/or multi-band deployments, there may be an advantage to having a
Wi-Fi sensing device connected to a specific AP or operating in a specific frequency
band. Radio resource management (RRM) events, such as AP and/or band steering, should
be conducted in coordination with the Wi-Fi Sensing agent/operation.
[0102] The devices involved with Wi-Fi Sensing will depend upon the deployment environment
and the specific use case. The sensing measurements also need to be processed by the
device with enough computation power. The coordination of sensing, including participating
devices, is a role particularly suited to an AP. Typically the central unit of a security
monitoring system will have ample processing power, as well as being able to function
as an AP, to handle this task efficiently and speedily.
[0103] The nature of Wi-Fi networks is such that it should be possible able to add additional
Wi-Fi sensing capable devices to the network to enhance accuracy, coverage and/or
localization. These additional devices do not necessarily need to be Wi-Fi Sensing
capable or dedicated Wi-Fi sensing devices to participate; however, optionally they
may also identify their Wi-Fi sensing capabilities and supported features to the AP.
Internet of Things (IoT) devices for home deployment can typically also be used as
part of a WFS installation supporting a WFS-enabled security monitoring system: example
include Wi-Fi controllable plugs and sockets, light bulbs, thermostats, smart speakers,
and video door bells. However, even when a device connects to the AP and reports that
it is Wi-Fi sensing capable, the Wi-Fi Sensing agent may elect not to make use of
that device.
[0104] WFS for a security monitoring system may be run over a dedicated Wi-Fi network, the
premises having at least one other Wi-Fi network for other purposes. But for reasons
of simplicity and economy it may often be preferred to operate a single Wi-Fi network
to serve all a household's (or small business's) needs including WFS for a security
monitoring service. If a single-network solution is adopted, performance degradation
due to airtime usage and sensing overhead must be minimized and hence Wi-Fi transactions
required for conducting sensing measurements and sensing management and processing
must be optimized for efficiency.
[0105] For each Wi-Fi Sensing application, at least one network device executes the sensing
software, or Wi-Fi Sensing Agent. The Wi-Fi Sensing agent is typically placed on the
AP, but it can be placed on any STA (although, as previously mentioned, we prefer
to run the Wi-Fi Sensing agent on the AP). Following authentication and association
of a device with the Wi-Fi network, the Wi-Fi Sensing agent should discover the device
and its sensing capabilities. Depending on the capabilities of the device, its role
in the Wi-Fi sensing network would be determined. If the new device is another Wi-Fi
Sensing-capable AP, then coordination among the agents is required.
[0106] The WFS agent needs to have a mechanism to determine which devices are capable and
needs to participate in the sensing for each application on a device-specific basis.
A WFS agent also needs to be capable of configuring the radio for measurements and
triggering transmissions on a periodic basis for sensing measurements, and to enable/disable
measurements or adjust configuration parameters for Wi-Fi sensing-capable devices.
Optionally, the Wi-Fi Sensing agent is also able to request specific radio resource
management operations, such as AP or band steering. The WFS agent is also preferably
able to detect and process specific sensing events and communicate the relevant information
to the application layer (e.g., the security monitoring system) for specific handling
and user presentation.
[0107] One of the parameters that impacts the quality of the received signal in a wireless
network is the amount of interference present. Interference can be caused by other
Wi-Fi devices operating in the same band, which causes cochannel interference, or
in an adjacent channel, which causes adjacent channel interference. It can also be
caused by non-W-Fi devices, which can be other communication systems or unintentional
transmissions that create electromagnetic noise in the band. Interference can impact
Wi-Fi Sensing performance in two ways. Firstly, it may interfere with the sensing
transmissions and thereby reduce the number of measurements made in a given time interval.
As such, it introduces jitter in time instants during which the measurements are made.
Secondly channel-state measurements may capture the impact of transient interference,
such as for a non-Wi-Fi device, as opposed to motion in the environment.
[0108] Wireless systems deploy various techniques to avoid or reduce the impact of interference,
and these techniques also help to improve WFS performance. These techniques aim at
maximizing the reuse of spectrum, while minimizing the overlap of spectrum used by
nearby networks: for example, Dynamic Channel Allocation (DCA); Auto Channel Selection
(ACS); optimized RF planning; (e.g., non-overlapping channels and use of reduced channel
width when applicable), and power control.
[0109] As already mentioned, increasing the number of illuminators may result in a higher
sensing performance: with more transmitters that are located sufficiently apart from
one another, motion in a larger area can be detected; when motion is detected using
transmissions on one or more transmitters, information is provided that can be used
to determine localization of the motion; and sensing accuracy is improved with a higher
number of measurements taken across a larger number of transmitters in most scenarios.
[0110] The IEEE 802.11a preamble is useful for Wi-Fi Sensing. The preamble contains a short
training field (STF), a guard interval and a long training field (LTF). The STF is
used for signal detection, automatic gain control (AGC), coarse frequency adjustment
and timing synchronization. The LTF is used for fine frequency adjustment and channel
estimation. Since only 52 subcarriers are present, the channel estimation will consist
of 52 frequency points. Newer OFDM PHY versions (HT/VHT/HE) maintain the IEEE 802.11a
preamble for backward compatibility and refer to it as the legacy preamble. The legacy
preamble spans a 20MHz bandwidth and consists of a legacy STF (L-STF) and legacy LTF
(L-LTF). As more recently defined OFDM PHY versions (HT/VHT/HE) introduce wider channel
bandwidths (up to 160MHz) for backward compatibility, the legacy preamble is duplicated
on each 20MHz channel. This allows the receiver to compute 52, 104, 208 or 416 valid
L-LTF frequency points, which represent the channel estimation between the two devices.
Also potentially useful for Wi-Fi Sensing are the MIMO training fields present in
HT, VHT and HE LTFs. The MIMO fields are modulated using the full bandwidth (20MHz
to 160MHz) and are traditionally used by the receiver to estimate the mapping between
the constellation outputs and the receive chains. Since these fields span the full
bandwidth, they provide more frequency points. For example, a 20MHz L-LTF contains
52 subcarriers, while a 20MHz HT/VHT-LTF contains 56 subcarriers. The latest introduction
of the HE PHY has the potential to enhance Wi-Fi Sensing. In addition to enabling
operation in the 6GHz spectrum, the HE PHY has increased the number of subcarriers
per 20MHz bandwidth by 4x, which effectively allows for better object resolution.
[0111] The IEEE 802.11ad amendment defines a Directional-Multi-Gigabit (DMG) PHY for operation
in the 60GHz band. While there are three different modulation schemes (Control, Single-Carrier
and OFDM) defined, Control and the Single Carrier PHY are the primary PHY used in
802.11ad (and is also part of the subsequent 802.11ay amendment). Regardless of the
modulation scheme, every packet starts with a preamble that consists of a short training
field (STF) and a channel estimation field (CEF). The STF is used for timing estimation
and AGC adjustment. CEF is used for channel estimation. Similar to the OFDM-based
PHYs, the necessary channel estimation for Wi-Fi Sensing is available following successful
reception and processing of the preamble of a packet and can be provided to the higher
layers. The wide channel bandwidth available in 802.11ad/ay can significantly improve
the performance of Wi-Fi Sensing in terms of the resolution; however, the limited
communication range in 60GHz band restricts the sensing range and coverage. As such,
in many situations the central unit of a security monitoring system may relay instead
on frequency bands with longer range, sufficient to cover the majority of households.
However, for smaller-scale installations the use of the 60GHz band may be attractive
and therefore embodiments of the invention may use this band for WFS.
[0112] When it comes to identifying peer devices in a WFS installation, the MAC layer mechanisms
may be used to obtain information about the connected devices and the roles they play
in Wi-Fi sensing. The MAC layer also initiates and drives transmissions required for
channel estimation among the devices in the Wi-Fi Sensing network.
[0113] Various aspects of peer identification arise with Wi-Fi Sensing. The first is identifying
the devices and the channel estimation mapped to the physical environment between
any two devices. Typically, an STA is identified by a 48-bit MAC address. A MAC address
is sufficient identification for STAs associated with a Wi-Fi network; however, if
the association is lost during the lifetime of the application, then randomized MAC
addresses may be used. In this case, a different or more involved mechanism would
be required to identify each STA. This identification must match the corresponding
channel estimate measurement obtained from the PHY. The second is identifying the
device network role and its connection type, such as whether it is an AP or an STA,
or whether it is part of a mesh or a P2P connection. This information is used by the
Wi-Fi Sensing agent to decide the best method for conducting measurements.
[0114] The third aspect is the identification of WFS device capabilities, such as sensing
capabilities, supported measurement rate, and the availability and willingness of
the device to participate in sensing measurements. This information is required from
all devices in the network for the Wi-Fi Sensing agent to select devices participating
in the sensing measurements.
[0115] As already noted, there are different types of transmissions that can be used for
illumination of the Wi-Fi channel and obtaining measurements between two devices.
Passive transmissions rely on existing Wi-Fi traffic and do not introduce any new
MAC layer requirements. Triggered transmissions, however, rely on additional transmissions.
Depending on whether existing packet exchange procedures are used for triggered transmissions
or new exchanges are defined, the requirements on the MAC layer will be different.
An example of one existing packet exchange that can be used for triggering invoked
transmissions is null data packet (NDP) and ACK exchange. NDP transmission by the
Wi-Fi Sensing receiver can be used to invoke a Wi-Fi Sensing transmitter to respond
with an ACK, which may then be used to compute a channel estimation. The disadvantage
of using ACK packets for channel estimation, in 2.4/5GHz bands, is that the ACKs are
only transmitted in legacy mode. Another example of how an invoked measurement can
be triggered is by use of the implicit unidirectional beamforming procedure, first
defined in the IEEE 802.1 In standard. In this procedure, an STA requests beamforming
training by sending a MAC frame with the training request (TRQ) bit set to 1. This
triggers the receiving device to send an NDP announcement, followed by an NDP to illuminate
the channel. The benefit of this invoked measurement is that it is not limited to
the legacy preamble for channel measurements and uses the MIMO training fields, as
well.
[0116] In pushed measurements, a transmission is triggered by the illuminator to be received
by one or multiple Wi-Fi Sensing receivers. Beacon frames are an example of using
existing MAC packet exchanges for pushed measurements.
[0117] Also as already noted, to support different use cases, either the AP or STA may take
the role of sensing receiver; additionally, there may be multiple sensing receivers
required to support the application. Moreover, there may be multiple illuminators
involved in the measurements. MAC layer coordination is used to coordinate the sensing
transmissions among the illuminators and the sensing receivers in an efficient way.
MAC layer scheduling may also be used to enable periodic measurements on which some
use cases rely. Coordination and scheduling at the MAC layer should enable different
options for conducting sensing measurements among multiple illuminators and sensing
receivers, with minimal added overhead, while accounting for the power save state
of the devices.
[0118] To interact with the MAC and PHY, the WFS agent has an interface to pass the WFS
control information to the radio and extract the measurement data. The interface should
be PHY agnostic and is, therefore, defined in a generic manner and extendable to cover
different radio driver implementations, including drivers from different chipset vendors.
The interface definition should allow for potential additional features or capabilities
provided by a specific PHY or a chipset, as well as a path for growing the technology.
Definition of a standard interface/API enables radio firmware and driver developers
to ensure compliance and enables reuse of components or common codes, which may be
placed into a library. Most Wi-Fi drivers are based on either the wireless-extensions
framework or the more recent and actively developed cfg80211 / nl80211 framework.
As the system integration components are largely provided, these frameworks enable
Wi-Fi driver developers to focus on the hardware aspects of the driver. These frameworks
also offer significant potential as a location for defining a WFS API. The WFS interface
should provide the WFS agent with STA identification and enable the WFS agent to track
the physical device in the network (i.e., the AP to which it is connected), as well
as the device's capability and availability to participate in the measurements.
[0119] The WFS agent requires control of the STAs that will participate in the sensing measurements,
as well as what measurement type (passive vs triggered) will be performed. The WFS
interface should provide such control, either on a global system scale or on a per
STA basis so that the WFS agent can conduct WFS measurements in the most efficient
manner.
[0120] Based on the specific WFS application or use case, different measurement rates may
be required. The measurement rate is typically decided by the WFS agent, and the interface
should support its control. However, to provide the lowest jitter and best efficiency
possible, it is best to rely on the MAC layer for scheduling. WFS applications may
have different measurement parameter requirements (bandwidth, antenna configuration,
etc.). The configuration of measurement parameters allows the application to obtain
only the data it requires to maintain efficiency. The measurement parameters should
be configurable independently for each STA.
[0121] The WFS interface should be flexible enough for the radio to specify whether the
data payload is in time-domain or frequency-domain, the numerical format, etc. By
having this knowledge, the Wi-Fi Sensing agent can correctly interpret the data.
[0122] WFS can be used not only to detect the presence and location of humans, also enabling
their counting, but it may also be used to detect respiration (which can be used in
people counting) and even orientation - e.g. whether a person is standing up or lying
down. Hence it may be possible for systems according to embodiments of the invention
not only to warn users that "there is someone upstairs" or "there is someone in the
front bedroom", but also to provide counts with locations, and also potentially (depending
upon the set up of the WFS system and in particular the location(s) of the WFS receiver(s)
and the number and location of illuminators with respect to the WFS receiver(s)) more
detailed information such as "there is someone lying in bed in Paul's room".
1. A premises security monitoring system having a local management device, and operatively
coupled to the local management device a plurality of alarm event sensors, and a radio-based
location sensing arrangement to detect human presence and location within the premises
that is configured to sense presence and location based on detecting perturbations
of radio signals, the security monitoring system providing an interface at which a
user can arm and disarm the security monitoring system;
the local management device being configured, on a user entering an instruction at
the interface to arm the system for the premises, to perform a determination, based
on information from the radio-based location sensing arrangement, of either:
(i) the number and location of people present within the premises, and to inform the
user of the number and location(s) of people determined to be present; or
(ii) whether the premises contain any occupants at locations remote from the interface,
and if it is determined that the premises are occupied to inform the user that the
premises are occupied.
2. The premises security monitoring systems as claimed in claim 1, wherein in the event
that the local management device is configured to determine the number and location
of people present within the premises the local management device is further configured
to store information on the number and location(s) of people determined to be present
in the premises and to update the information based on determined changes in number
and location.
3. The premises security monitoring system of claim 1, wherein if the local management
device is configured to determine whether the premises contain any occupants at locations
remote from the interface, the local management device is further configured to inform
the user of the location(s) of any detected occupant(s).
4. The premises security monitoring system of any one of the preceding claims, wherein
the local management device is configured to perform the determination upon the user
entering an instruction to arm the system to an armed away state but not upon the
user entering an instruction to arm the system to an armed at home state.
5. The premises security monitoring system of any one of the preceding claims, wherein
the system includes an audio interface and is configured to use the audio interface
in informing the user that the premises are occupied.
6. The premises security monitoring system of any one of the preceding claims, further
comprising a control device separate from the local management device, the control
device providing the interface at which a user can arm and disarm the security monitoring
system.
7. The premises security monitoring system of any one of the preceding claims, wherein
the local management device is operatively connected to a remote monitoring station,
and further configured also to notify the remote monitoring station in the event that
the user is informed that the premises are occupied.
8. The premises security monitoring system of claim 7, wherein the local management device
is further configured to couple the remote monitoring station to a two-way video interface
of the system to enable a dialogue between the user and the remote monitoring station.
9. The security monitoring system as claimed in any one of the preceding claims, wherein
the radio-based sensing arrangement is configured to process communication signals
received from one or more radio transmitters operating according to one or more communication
standards or protocols.
10. The security monitoring system as claimed in claim 9, wherein the one or more radio
transmitters that are in a common wireless network with the local management device.
11. The security monitoring system as claimed in any one of the preceding claims, wherein
the local management device includes a radio receiver of the radio-based presence
and location sensing system.
12. The security monitoring system as claimed in claim 11, wherein the local management
device includes a processor and a memory holding software instructions that when run
on the processor cause the local management device to process radio signals to derive
location and presence data.
13. The security monitoring system as claimed in any one of the preceding claims, wherein
the sensing arrangement to detect human presence uses changes in channel state information
or received signal strength in determining presence.
14. The security monitoring system as claimed in any one of the preceding claims, wherein
the local management device functions as an access point of a radio network whose
signals are used by the radio-based presence and location sensing system, and optionally
the radio network for which the local management device functions as an access point
includes at least one further access point.
15. The security monitoring system of claim 14 , wherein the radio network is a Wi-Fi
network.
16. The security monitoring system of claim 15 as dependent on claim 9, wherein the one
or more radio transmitters include one or more of the following: a Wi-Fi access point,
a Wi-Fi extender, a smart plug or smart socket, a smart speaker, a smart bulb, a control
panel of the security monitoring system, a Wi-Fi-enabled video camera.
17. A local management device for a premises security monitoring system, the management
device configured to be coupled to a plurality of alarm event sensors and a control
interface at which the system can be armed and disarmed, and to perform location sensing
to detect human presence and location within the premises based on detecting perturbations
of radio signals; and further configured on a user entering an instruction at the
control interface to arm the system for the premises, to perform a determination,
based on information from the radio-based location sensing arrangement, of either:
the number and location of people present within the premises, and to inform the user
of the number and location(s) of people determined to be present; or
whether the premises contain any occupants at locations remote from the interface,
and if it is determined that the premises are occupied to inform the user that the
premises are occupied.
18. The local management device as claimed in claim 17, wherein the local management device
is configured to store information on the number and location(s) of people determined
to be present in the premises and to update the information based on determined changes
in number and location.
19. The local management device of any one of claims 17 or 18, wherein the local management
device is configured to perform location sensing by processing communication signals
received from one or more radio transmitters operating according to one or more communication
standards or protocols.
20. The local management device of any one of claims 17 to 19, further comprising a radio
transceiver, the local management device being configured to use the transceiver as
a radio receiver of a radio-based presence and location sensing system.
21. The local management device as claimed in claim 20, further comprising a processor
and a memory holding software instructions, the software instructions when run on
the processor causing the local management device to process radio signals to derive
location and presence data.
22. The local management device as claimed in any one of claims 17 to 21, wherein the
local management device is configured to detect human presence and location using
changes in channel state information or received signal strength.
23. A method performed by a local management device of a premises security monitoring
system, the system comprising a plurality of alarm event sensors, a control interface
at which the system can be armed and disarmed, and a location sensing arrangement
to detect human presence and location within the premises and comprising a radio-based
system that is configured to sense presence and location based on detecting perturbations
of radio signals, the method comprising:
receiving notification of a user entering an instruction at the control interface
to arm the system for the premises;
performing a determination, based on information from the radio-based location sensing
arrangement, of either:
the number and location of people present within the premises, and
informing the user of the number and location(s) of people determined to be present;
or
whether the premises contain any occupants at locations remote from the interface;
and, if it is determined that the premises are occupied,
informing the user that the premises are occupied.
24. The method as claimed in claim 23, further comprising storing information on the number
and location(s) of people determined to be present in the premises, and updating the
information based on determined changes in number and location.