Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SECURITY MONITORING SYSTEM AND METHOD
Document Type and Number:
WIPO Patent Application WO/2022/243449
Kind Code:
A1
Abstract:
Provided is a method, performed by a controller of a security monitoring system, of managing a tamper event detected by a tamper-detection function of a lock of an exterior door that gives access to an interior space protected by the security monitoring system, the method comprising: receiving notice of a tamper event detected by the tamper-detection function of the lock; responsive to receiving notice of the tamper event, transmitting a signal to cause a video camera that is arranged to observe a space in front of the exterior of the door to capture images and to transmit the captured images to the controller; and forwarding the captured images for checking remotely. Also provided is a security monitoring system to provide a secure perimeter to a protected interior space of premises (100), the premises (100) including an exterior door (102) giving access to the protected interior space (200), a lock (104) on the exterior door (102), the lock (104) having a tamper-detection function which is configured to report any detected tamper events wirelessly to a controller (208) of the security monitoring system, the system comprising a first video camera (106) arranged to observe a space (108) in front of the exterior of the door (102); and the controller (208) being configured, on receipt of a detected tamper event, to:(transmit a signal to) cause the first video camera (106) to capture images and to transmit captured images to the controller (208); and to forward the captured images for checking remotely (210, 220).

Inventors:
TORRES MONTERO PABLO (ES)
CARRASCOSA PULIDO JUAN JOSE (ES)
AGUINAGA ACHUCARRO MAIDER PATRICIA (ES)
SERRANO CASTILLO ENCARNACION (ES)
URIEN AYALA ALVARO (ES)
SCHWARTZ SOLÉ RAFAEL JOSÉ (ES)
MORGAN RUSSELL GWYNFRYN (SE)
ZANDER JOHAN (SE)
LARSSON CHRISTOFFER (SE)
Application Number:
PCT/EP2022/063607
Publication Date:
November 24, 2022
Filing Date:
May 19, 2022
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
VERISURE SARL (CH)
International Classes:
G08B13/19; E05B39/00; G08B13/196
Foreign References:
US10810813B12020-10-20
US20160171808A12016-06-16
CN204347945U2015-05-20
CN210721597U2020-06-09
Attorney, Agent or Firm:
PRINZ & PARTNER MBB PATENT- UND RECHTSANWÄLTE (DE)
Download PDF:
Claims:
Claims

1. A security monitoring system to secure at least part of a perimeter of premises (100), the premises (100) including an exterior door (102) giving access to a protected interior space (200), a lock (104) on the exterior door (102), the lock (104) having a tamper-detection function which is configured to report any detected tamper events wirelessly to a controller (208) of the security monitoring system, the system comprising a first video camera (106) arranged to observe a space (108) in front of the exterior of the door (102); and the controller (208) being configured, on receipt of a detected tamper event, to: to cause the first video camera (106) to capture images and to transmit captured images to the controller (208); and to forward the captured images for checking remotely (210, 220).

2. The security monitoring system of claim 1, wherein the first video camera (106) is a doorbell camera.

3. The security monitoring system of claim 1 or claim 2, further comprising a second video camera (112) arranged to observe a zone that includes the space (108) in front of the exterior of the door (102).

4. The security monitoring system of claim 3, wherein the controller (208) is further configured to, on receipt of a detected tamper event, to: cause the second video camera (112) to capture second images and to transmit captured second images to the controller (208); and to forward the captured second images for checking remotely (210, 220).

5. The security monitoring system of any one of the preceding claims, wherein the controller (208) is configured, when forwarding the captured images for checking remotely, to forward the captured images to a central monitoring station (210).

6. The security monitoring system of claim 5, wherein the controller (208) is further configured to activate a local alarm notification device (224) in respect of the detected tamper event only upon receiving instruction to do so from the central monitoring station (210).

7. The security monitoring system of claim 5 or claim 6, as dependent on claim 2, wherein the controller is further configured to couple the central monitoring station to an audio interface of the video doorbell so that an operative in the central monitoring station can speak to a person at the door.

8. The security monitoring system of any one of claims 1 to 4, wherein the controller is configured, when forwarding the captured images for checking remotely, to forward the captured images to a user’s wireless transmission and reception device.

9. The security monitoring system of any one of the preceding claims, wherein the controller is configured on receipt of a detected tamper event to cause the video camera to capture images and to transmit captured images to the controller whether or not the security monitoring system is armed.

10. The security monitoring system of claim 9, wherein the controller is configured only to forward the captured images for checking remotely if the security monitoring system is in an armed state.

11. The security monitoring system of any one of the preceding claims, wherein the controller is configured to: use an automated system to compare faces found in captured images with a database of known faces, using facial recognition technology to identify a person in the vicinity of the lock; and/or perform image processing to identify and count the number of humans present in the captured images.

12. The security monitoring system of claim 11, wherein, in the event that image processing reveals that no-one is at the door, the controller is configured to reset without forwarding images for further review.

13. A method, performed by a controller of a security monitoring system, of managing a tamper event detected by a tamper-detection function of a lock of an exterior door that gives access to an interior space protected by the security monitoring system, the method comprising: receiving notice of a tamper event detected by the tamper-detection function of the lock; responsive to receiving notice of the tamper event, causing a video camera that is arranged to observe a space in front of the exterior of the door to capture images and to transmit the captured images to the controller; and forwarding the captured images for checking remotely.

14. The method of claim 13, wherein the captured images forwarded for checking remotely are forwarded to a central monitoring station.

15. The method of claim 14, further comprising activating a local alarm notification device in respect of the detected tamper event upon receiving instruction to do so from the central monitoring station.

16. The method of claim 13 or claim 14, wherein the video camera is part of a video doorbell at the door, the method further comprising coupling the central monitoring station to an audio interface of the video doorbell so that an operative in the central monitoring station can speak to a person at the door.

17. The method of any one of claims 13 to 16, wherein the step of causing a video camera that is arranged to observe a space in front of the exterior of the door to capture images on receipt of the detected tamper event occurs whether or not the security monitoring system is armed.

18. The method of any one of claims 13 to 17, further comprising the controller performing facial recognition on captured images prior to forwarding the captured images for checking remotely.

19. The method of claim 18, further comprising only forwarding the captured images for checking remotely if it is determined that at least one face in a captured image does not correspond to a known identity.

20. The method of claim 18, further comprising only forwarding the captured images for checking remotely if at least one face is determined to be present in a captured image.

21. The method of claim 18, further comprising not forwarding the captured images for checking remotely if it is determined that at least one face in a captured image corresponds to a known identity.

22. The method of any one of claims 13 to 18, further comprising the controller performing image processing to identify and count the number of humans present in the captured images.

23. The method of claim 22, wherein, in the event that image processing reveals that no- one is at the door, resetting the controller without forwarding images for further review.

Description:
Security monitoring system and method

Technical field

The present invention relates to a security monitoring system for monitoring premises, the security monitoring system including a lock on an exterior door of the premises having a tamper-detection function, and to a method performed by the system.

Background

Security monitoring systems for monitoring premises, often referred to as alarm systems, typically provide a means for detecting the presence and/or actions of people at the premises, and reacting to detected events. Commonly such systems include sensors to detect the opening and closing of doors and windows, movement detectors to monitor spaces (both within and outside buildings) for signs of movement, microphones to detect sounds such as breaking glass, and image sensors to capture still or moving images of monitored zones. Such systems may be self-contained, with alarm indicators such as sirens and flashing lights that may be activated in the event of an alarm condition being detected. Such installations typically include a control unit (which may also be termed a central unit), generally mains powered, that is coupled to the sensors, detectors, cameras, etc. (“nodes”), and which processes received notifications and determines a response. The central unit may be linked to the various nodes by wires, but increasingly is instead linked wirelessly, rather than by wires, since this facilitates installation and may also provide some safeguards against sensors/detectors effectively being disabled by disconnecting them from the central unit. Similarly, for ease of installation and to improve security, the nodes of such systems typically include an autonomous power source, such as a battery power supply, rather than being mains powered.

As an alternative to self-contained systems, a security monitoring system may include an installation at a premises, domestic or commercial, that is linked to a Central Monitoring Station (CMS) where, typically, human operators manage the responses required by different alarm and notification types. In such centrally monitored systems, the central unit at the premises installation typically processes notifications received from the nodes in the installation, and notifies the Central Monitoring Station of only some of these, depending upon the settings of the system and the nature of the detected events. In such a configuration, the central unit at the installation is effectively acting as a gateway between the nodes and the Central Monitoring Station. Again, in such installations the central unit may be linked by wires, or wirelessly, to the various nodes of the installation, and these nodes will typically be battery rather than mains powered. Although not primarily concerned with security monitoring, developments of so called “smart home” systems have introduced innovations such as remote control of lights, and heating, remote video surveillance which can stream captured video to a registered user’s smart phone, video doorbells that can be answered remotely and once again stream video to a user’s smart phone remotely, as well as electrically controlled (and hence remotely controllable) door locks. Video doorbells, such as those marketed by Ring (RTM), have proved to be popular first purchases by consumers wishing to dip their toes in the world of smart homes. Video doorbells are quite easy to install, apart from the need to provide a wired feed from a low voltage power supply - necessitated because video doorbells tend to capture video constantly, so that a solely battery power supply is unfeasible. Although these ever- watchful doorbells provide a form of security - providing indeed a true “neighbourhood watch” function, they are not intended to be integrated into premises security monitoring systems.

Another aspect of “smart home” technology are “smart locks” which can be controlled remotely, so that a locked door can be unlocked, and even opened, from a distance. Some of these locks also accept mechanical keys, so have some form of keyhole, while others only interact with keys electrically or magnetically, possibly with the use of a form of keyhole. Some of these smart locks have what is known as “tamper detection” which is designed to detect any attempt to tamper with the lock. On detection of tampering, the lock may sound an internal siren, and or may send an alert signal to the system that controls the lock. It is understood that some locks that use mechanical keys, and have purely mechanical (as opposed to electromechanical) locking mechanisms, are also available with tamper detection functions (akin to, for example, motorcycle brake disc security locks that include a tamper sensor and a powerful internal siren).

The present invention seeks to provide an enhanced security monitoring system that makes use of a lock having a tamper-detection function.

Summary of the invention

According to a first aspect, there is provided a security monitoring system to secure at least part of a perimeter of premises, the premises including an exterior door giving access to a protected interior space, a lock on the exterior door having a tamper-detection function which is configured to report any detected tamper events wirelessly to a controller of the security monitoring system, the system comprising a first video camera arranged to observe a space in front of the exterior of the door; and the controller being configured, on receipt of a detected tamper event, to: transmit a signal to cause the video camera to capture images and to transmit captured images to the controller; and to forward the captured images for checking remotely.

Preferably, the first video camera is a doorbell camera. Doorbell cameras are typically installed so that the camera looks out onto the approach to the door, and generally the camera is arranged to have a good view of anyone present at the door. As such, a doorbell video camera is likely to be very well placed to observe anyone who is tampering with the lock of the door.

Optionally, the security monitoring system comprises a second video camera arranged to observe a zone that includes the space in front of the exterior of the door. Conventionally, doorbell video cameras are not integrated into fully fledged security monitoring systems, so it is not unusual for such systems to include a video camera to observe the front door of the protected premises or to observe the approach to the front of the premises. The location of such cameras means that they may be able to observe things and locations that may not be so clearly seen by a doorbell camera, and in any event are likely to provide a complementary view. Video cameras located to observe the front aspect or the approach to the front aspect of premises may be provided for surveillance - in effect as CCTV, constantly capturing images, or they may be associated with, or include, a motion sensor, such as a PIR detector, and only capture images in the event that the motion sensor is triggered. In either case, a system according to the first aspect may instruct such a camera, as the second video camera, to capture images - even if a motion sensor associated with the camera has not been triggered. Thus, preferably the controller is further configured to, on receipt of a detected tamper event, to: (transmit a signal to) cause the second video camera to capture second images and to transmit captured second images to the controller; and to forward the captured second images for checking remotely.

Preferably, the controller is configured, when forwarding the captured images for checking remotely, to forward the captured images to a central monitoring station (CMS). In this way, a human operator at the CMS is able to review the captured video images, and decide whether intervention of some kind is required.

Optionally, the controller is further configured to activate a local alarm notification device, such as a noise source, such as a siren, klaxon, or loudspeaker, or flashing lights, in respect of the detected tamper event only upon receiving instruction to do so from the central monitoring station. Alternatively, the controller may be configured to activate a local alarm notification device, such as a siren and/or flashing lights, etc., may be activated upon initial detection of a tamper event. In this way, a bad actor may be scared away and/or passers-by’ attention be attracted before the bad actor can gain access to the premises.

The controller may be configured to couple the central monitoring station to an audio interface of the video doorbell so that an operative in the central monitoring station can speak to a person at the door. This may enable the situation to be dealt with, by scaring away bad actors, or informing an actor that they are trying to gain access to the wrong premises (for example, an AirBnB guest may be trying to gain access to what she believes to be the rented property, but actually it’s a different property, so the guest may be redirected to the correct property/entrance).

Optionally, the controller is configured, when forwarding the captured images for checking remotely, to forward the captured images to a user’s wireless transmitting and receiving unit (WTRU), such as a smartphone. In this way the user, who may be an owner or resident of the protected premises is alerted to the existence of a tampering event.

If, upon seeing the video, the recipient realises that there is no cause for alarm - for example the tamper notification seems to have been triggered by the actions of a child or a pet animal of the premises, the recipient may be able to use an app for the system, installed on the WTRU, to inform the controller of the security monitoring system that the event is benign, so that the controller doesn’t need to inform the central monitoring station (CMS). Alternatively, the recipient of the message may contact the central monitoring station, using the app or by voice or video call, to inform an operator in the CMS that the event is benign, perhaps also giving some password or passcode, to ensure security of the system.

Alternatively, if the recipient realises that the tamper event is a cause for concern, because for example it is clear from the forwarded video that a bad actor is attempting to gain entry, the user can signal an SOS condition, for example using a specific button or other interface on the app on the user’s device, so that the CMS will take charge - and indicating at the same time to operatives in the CMS that the event is to be treated as a threat: so that, for example the CMS involves the police, or other security personnel who may attend the premises immediately - or such other security intervention as seems appropriate to the personnel in the CMS. Meanwhile, of course, the video images have been captured and stored remote from the premises - for example in the cloud, and preferably also at the CMS or in servers of the CMS, so that they can be shared with the relevant security personnel, and later used in legal proceedings and/or insurance claims, for example.

Optionally, the controller may be configured on receipt of a detected tamper event, to transmit a signal to cause the video camera to capture images and to transmit captured images to the controller whether or not the security monitoring system is armed. Conventionally, a video camera of a security monitoring system will only transmit video to the controller of the system on the condition that the system is armed, and of course conventionally a doorbell video camera is not integrated into a security monitoring system, so that although the doorbell camera may capture images irrespective of the state of a security monitoring system of the premises, the doorbell video camera never sends its captured images to the controller of a security monitoring system. But, if the premises are occupied, for example with the family at home, but the security monitoring system is not armed (not even “armed at home” where the permitter is secured but internal events are not monitored), it may still be very beneficial for the family (or the CMS) to be informed that a lock tamper event is taking place. Because although it may be possible to configure a doorbell video camera to flag every movement event seen by the camera, most users do not want to be bothered so often, and hence they typically only receive notifications from the doorbell camera when someone actually presses the doorbell: and under these circumstances the doorbell camera would just ignore the presence of someone at the door - even though the lock was being tampered with.

Optionally, the controller is configured only to forward the captured images for checking remotely if the security monitoring system is in an armed state. In this way, the involvement of the CMS may be minimised, or at least restricted to those times that the security monitoring system is armed: the users can decide whether or not to use an “armed at home” setting while they are in the house, in which case the CMS will be directly involved if there is a tampering incident. Otherwise, the users may prefer first to receive notifications of potential tampering events on their phones, or other devices: if a potential tampering event does turn out to be alarming, the user can use an SOS button on an app on their device to inform the CMS immediately of the existence of a significant threat. This reporting may be done by a user, whether or not the user is at the premises, the user’s phone connecting to the CMS through the mobile network, or Wi-Fi, plus the internet as necessary. The app is preferably also aware when the user’s device is on the premises - for example based on the SSID of the premises Wi-Fi network, which is also used by the controller of the SMS, and/or by means of a Bluetooth of Wi-Fi connection with the controller. In this way, if a user activates an SOS icon on the app, the app causes an SOS message also to be signalled directly to the SMS controller, and the SMS controller can then immediately inform the CMS of the SMS event - just in case the message from the user’s device has not yet been received by the CMS. Optionally, the controller is configured to: use an automated system to compare faces present in captured images with a database of known faces, using facial recognition technology to identify a person in the vicinity of the lock; and/or perform image processing to identify and count the number of humans present in the captured images.

Optionally, in the event that image processing reveals that no-one is at the door, the controller is configured to reset without forwarding images for further review.

According to a second aspect, there is provided a method, performed by a controller of a security monitoring system, of managing a tamper event detected by a tamper-detection function of a lock of an exterior door that gives access to an interior space protected by the security monitoring system, the method comprising: receiving notice of a tamper event detected by the tamper-detection function of the lock; responsive to receiving notice of the tamper event, transmitting a signal to cause a video camera that is arranged to observe a space in front of the exterior of the door to capture images and to transmit the captured images to the controller; and forwarding the captured images for checking remotely.

Optionally, the captured images forwarded for checking remotely are forwarded to a central monitoring station.

Optionally, the method further comprises activating a local alarm notification device, such as a siren and/or flashing lights, etc., in respect of the detected tamper event upon receiving instruction to do so from the central monitoring station. Alternatively, a local alarm notification device, such as a siren and/or flashing lights, etc., may be activated upon initial detection of a tamper event, for example under the control of the central unit. In this way, a bad actor may be scared away from the door before managing to gain access or cause further damage.

Optionally, the method further comprises the controller performing facial recognition on captured images prior to forwarding the captured images for checking remotely. Optionally, the method further comprises only forwarding the captured images for checking remotely if it is determined that at least one face in a captured image does not correspond to a known identity (for which facial parameter data are stored).

Optionally, the method further comprises only forwarding the captured images for checking remotely if at least one face is determined to be present in a captured image. Optionally, the method further comprises not forwarding the captured images for checking remotely if it is determined that at least one face in a captured image corresponds to a known identity (for which facial parameter data are stored).

Optionally, the method further comprises the controller performing image processing to identify and count the number of humans present in the captured images. Optionally, the method further comprises, in the event that image processing reveals that no-one is at the door, resetting the controller without forwarding images for further review.

Preferably, the video camera is part of a video doorbell at the door, the method further comprising coupling the central monitoring station to an audio interface of the video doorbell so that an operative in the central monitoring station can speak to a person at the door.

Preferably, the transmitting of a signal to cause a video camera that is arranged to observe a space in front of the exterior of the door to capture images on receipt of the detected tamper event, occurs whether or not the security monitoring system is armed.

According to a third aspect, there is provided a method of operating a security monitoring system which provides a secure perimeter, the perimeter including a door fitted with a lock, the method comprising detecting tampering with the lock and using a video camera outside the perimeter to check on the lock whose tampering has been detected. Preferably the lock is a smart lock configured to detect tampering. The video camera may be video detector (a video camera with an integral or associated motion sensor, such as a PIR), a video doorbell or other video camera - e.g. a surveillance camera.

According to a fourth aspect, there is provided a security monitoring system configured to use an external camera to check an external view of a lock that secures an opening in a perimeter secured by the security monitoring system following a tamper signal. The system is preferably configured to push video from the external camera to a user’s device.

Description of Figures

Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings, in which:

Figure 1 is a schematic drawing showing a front elevation of stylised building with an external space which is monitored by a security monitoring system according to an embodiment of the invention;

Figure 2 is a schematic part plan view of premises protected by a security monitoring system, together with other elements of the system;

Figure 3 shows a timing diagram of a method according to an aspect of the invention; and Figure 4 shows a timing diagram of a method according to an aspect of the invention.

Specific description

Figure 1 shows a view of the front of a premises 100 protected by a security monitoring system according to an aspect of the present invention. The premises, here in the form of a house, have an exterior door, here front door, 102. The door gives access to a protected interior space, and lock 104 on the exterior door has a tamper detection function.

To the side of the door, on the fa9ade of the house, is a first video camera in the form of a video doorbell 106 which looks out from the fa9ade of the premises so that anyone approaching the door along the path 108 can be seen, and in particular when they stand at the door their face should clearly be visible. As is conventional, the video doorbell includes an infrared light source to illuminate whatever is in front of the video doorbell. Optionally, as shown, the fa9ade of the house also carries an external keypad 110 with which a user can disarm the security monitoring system, and if the lock is controlled by the security monitoring system, unlock the lock 104. Also shown is an optional second video camera 112 which is coupled to a movement detector, such as a PIR sensor, which, when the security monitoring system is armed, may be arranged to capture video of the front of the house and the private area, e.g. the garden, in front of the house. The optional second video camera 112 also has an associated (or integral) audio interface 113, including a microphone and speaker.

Figure 2 is a schematic part plan view of a premises 100 protected by security monitoring system according to an aspect of the invention, together with other elements of the system, corresponding generally to the premises of figure 1. The front door 102, with anti -tamper lock 104, leads into the protected interior space 200 of the premises. Each of the windows 202, and the rear door 204 are fitted with sensors 206 to detect when they are opened. Each of the sensors 206 includes a radio transceiver to report events to a controller , or central unit, 208 of the security monitoring system. If one of the sensors 206 is triggered when the system is armed, a signal is sent to the central unit 208 which in turn may signal an alarm event to a central monitoring station 210. The central unit 208 is connected to the central monitoring station 210 via the Internet 212, either via a wired or a wireless connection. Also wirelessly coupled to the central unit 208 are the video doorbell 106, the anti -tamper lock 104, and if present the second video camera 112 and its associated movement sensor 114 (although the latter may be integral with the second video camera 112). These items, and the sensors 206, are preferably coupled to the central unit 208 using transceivers operating in the industrial scientific and medical (ISM) bandwidths, for example a sub- gigahertz bandwidth such as 868 MHz. The security monitoring system may also include other sensors within the protected interior space, such as an interior video camera 214 and associated movement detector 216 (which may again be integral with the camera 214), and the interior doors 218 may also be provided with sensors 206. The communications between the sensors and the central unit, and between the central unit and the central monitoring station are encrypted, using for example shared security keys. Also shown in Figure 2 are a user device 220, preferably loaded with an appropriate app - as will be described later, and a public land mobile network (PLMN) by means of which the central monitoring station 210, and the central unit 208, may communicate with the user device 220.

The controller 208 is configured, on receipt of a detected tamper event, to transmit a signal to cause the first video camera, 106, to capture images and to transmit captured images to the controller 208. The controller 208 then forwards the captured images for checking remotely at either or both of the central monitoring station 210 and the user’s mobile device 220. In this way, images captured by the optimally located doorbell camera 106, which should show what is happening outside the front door, are immediately made available to a human operator at the central monitoring station 210, and/or to the user via a user device 220, so that a human can decide whether or not activity detected by the anti-tamper function of the door lock 104 constitutes a threat or not. If it is determined that a threat exists, an alarm can be raised via the local alarm notification device 224, and/or an operator in the central monitoring station can communicate with local law enforcement, or other security personnel to intervene at the premises 100.

Although it is preferred for the first video camera to be the video camera of a video doorbell, because of the generally ideal location of such a camera in terms of surveying the space in front of the front door 102, it is also possible to use a different video camera installation, such as that shown as 112, which also observes the space in front of the front door. Unlike most video doorbells, which typically do not show a view of the exterior face of the front door itself, a video camera installation such as that shown schematically in figures 1 and 2 as 112 may provide a view not only of the space in front of the front door, but also of the door, and possibly of the lock 104 as well. As previously described, the video camera installation 112 includes, or has an associated, motion detector, such as a PIR sensor, with the camera 112 typically only being turned on when the movement sensor detects movement. It is also possible to make use of a different form of video camera installation, such as a surveillance camera installation. Typically, a surveillance camera installation does not require a movement sensor, rather when the surveillance cameras activated it may continuously monitor a surveilled area, typically streaming images continuously or every few seconds to a monitoring location. Such a surveillance camera may also operate under the control of a security monitoring system according to an aspect of the invention, the controller 208 of the security monitoring system transmitting a signal to cause the surveillance camera to capture images at transmit the captured images to the controller 208, and to forward the captured images for checking remotely, e.g. at the central monitoring station 210 or at a user device 220.

A security monitoring system according to aspect the invention may make use of more than one video camera, for example a first video camera and a second video camera.

The controller of the security monitoring system transmitting a signal to cause the first video camera to capture images and transmit captured images to the controller, and transmitting a signal to cause the second video camera to capture second images and to transmit captured second images to the controller, and to forward the captured second images for checking remotely. Preferably in such a multi-video camera system, at least one of the video cameras is a doorbell video camera.

Because tamper detection may arise even when no one is at the door - e.g. a heavy truck has just rumbled down the street, earthquake, sonic boom, there may in fact be no-one at the door even though tampering has been detected.

It is also contemplated that the controller 208 may initially use an automated system to compare faces caught in captured images with a database of known faces, using facial recognition technology to identify a person in the vicinity of the lock. Thus, the central unit may use such an automated system (e.g. AI) to pre-screen an alert before involving the central monitoring station 210. Typically, the database of known faces will just be of “friendly” faces. Additional image processing may also (or alternatively) be performed to identify and count the number of humans present in the captured images. For example, if the image processing reveals that in fact no-one is at the door, the controller may be reset without forwarding images for further review. If only a single human being is detected, and if the facial recognition technology identifies the face of the single human being as “friendly” the controller 208 may be configured not to forward the captured video to either the central monitoring station or a user device 220 for checking. But if more than one person or more than one face is deemed to be present, but only one of the faces is recognised as “friendly”, the controller 208 may be configured to forward the captured video to the central monitoring station 210 for checking, just in case a resident of the premises is under duress or otherwise being threatened: an operative other central monitoring station being able to raise an alarm or summon police or other security personnel to intervene. The facial recognition technology, and the additional image processing, if used, may be provided in one or more modules within the controller 208, although optionally but less preferably they may be provided remotely over the network 212.

The controller 208 is also preferably configured, following the forwarding of captured images, to enable the recipient of the forwarded images - i.e. the central monitoring station central monitoring station 210 and/or the user device 220, to connect to an audio interface of the video doorbell (or an audio interface provided in association with any other first video camera, e.g. a microphone/speaker unit provided in association with a video camera installation, or a video surveillance installation), so that an operator in the central monitoring station, or the user of the device 220, can speak to, and hear from, anyone at the front door. Although it is known for a freestanding video doorbell to connect someone who has operated the doorbell to, say the owner of the premises, so that they may speak together, such video doorbells are not integrated into security monitoring systems, and hence the controller of a security monitoring system is not ordinarily able to connect to the audio interface of the video doorbell.

The controller 208 of a security monitoring system according to an embodiment of the invention may be configured on receipt of a detected tamper event to transmit a signal to cause a video camera to capture images and to transmit captured images to the controller whether or not the security monitoring system is armed. Security monitoring systems may offer two armed states, as well as a disarmed state. In one armed state, sometimes called “armed away”, which is used when the premises are left unoccupied, the security monitoring system monitors not only the periphery of the premises, using sensors at each of the doors and windows of the premises, but also monitors within the premises, using for example motion sensors, microphones and sensors on internal doors. In another armed state, sometimes called “armed at home”, which is used when an authorised person is within the premises, only the periphery of the premises is monitored, but internally there is no monitoring or only certain areas or zones of the premises are monitored -, for example, upon retiring to bed, and owner may use and armed at home setting in which the ground floor is monitored by the security monitoring system, as well as the periphery, but the upper floor(s) where the owner will sleep and possibly move around, is not monitored. In the unarmed state, the security monitoring system, monitors neither the periphery, nor the interior of the premises. Because tampering with the lock 104 of the door 102 may signify an unwanted intrusion, which may happen at any time, whether or not one or more authorised persons are in residence, the controller of the security monitoring system is preferably configured always to act on receipt of a tamper signal from the lock 104. Conversely, the controller 208 may provide the option for a user to set the controller only to forward the captured images for checking remotely when the security monitoring system is in an armed state.

A method according to an aspect of the present invention will now be described with reference to figure 3. At step 300, the anti -tamper lock 104 detects tampering and transmits a tamper notification to the central unit 208. At step 302, the central unit 208 transmits a capture video command to the first video camera 106. If the system includes a suitable second video camera, such as video camera installation 112 shown in figures 1 and 2, the central unit 208 at step 304 transmits a capture video command to the second video camera. At step 306, the first video camera 106 transmits captured images to the controller 208. Likewise, if present, the second video camera transmits second captured images to the controller 208 at step 308. At step 310, the central unit 208 forwards the captured images from the first video camera for checking remotely at, for example, the central monitoring station 210. An operator in the central monitoring station reviews the captured images, and if appropriate involves security personnel, by contacting police in the vicinity of the premises, or by contacting security personnel contracted to the company managing the security monitoring system. First, however the operator in the central monitoring station may transmit a response to the central unit 208 at step 312. The response may be a “not a threat” message, which may have the effect of causing the central unit to reset, or to ignore further anti-tamper signals from the lock for a predetermined period counted in seconds, e.g. 60 seconds or less. Alternatively the response may be to command the central unit 208 to connect the central monitoring station to the audio interface of the first video camera (e.g. the video doorbell), so that the operator in the central monitoring station can talk to, interrogate, explain to, or warn off the person or persons at the door. In consequence, the central unit 28 may at step 314 connect the central monitoring station to the audio interface. Alternatively the response 312 from the central monitoring station may be an instruction to the central unit 208 to activate the local alarm notification device 224, resulting in the sounding of a local alarm and or the activation of some visible alarm notification, such as a flashing light.

Figure 4 corresponds to figure 3 but additionally shows the optional involvement of remote review by a user using, for example, a wireless transmission and reception unit (WTRU) 220 such as a smart phone. At step 400 an event report and captured images are transmitted to the device 220 using for example the public land mobile network 222 which the central unit 208 may connect directly using an appropriate internal transceiver, or via the Internet 212. The user may receive a notification on the device 220 immediately, and opening the notification may cause an app on the device to open, thereby giving the user sight of the captured image/video footage. The app preferably gives the user the opportunity immediately to raise an alarm for example by including an alarm/SOS button, activating which connects the user directly to the central monitoring station, or alternatively simply sends an alarm or SOS message to the central monitoring station. At the central monitoring station, this setup is such that alarm or SOS messages received in this way are immediately displayed on an operator’s interface, so that the event can be treated with the highest priority. The app also preferably gives the user the opportunity to request connection to the audio interface of the first video camera, preferably along with live stream video, so that the user can see and speak to whoever is at the door. The app may also give the user the opportunity to trigger the local alarm device 224. The app on the device 220 also gives the user the opportunity to send an “all clear” message to the central unit 208, which causes the central unit 208 to ignore anti tamper signals for a predetermined period. The user may also have the opportunity to send the all clear to the central monitoring station 210 if appropriate.

The lock 104 may be what is known as a “smart lock” which can be locked and unlocked remotely, and the security monitoring system may include an external keypad 110 to enable a user to disarm the security monitoring system (if it is armed) and unlock the door using a passcode entered via the keypad or using a secure RF token or keyfob. The lock 104 may include a keyhole to accept a mechanically-coded or magnetically/electronically coded key. If the lock 104 includes a keyhole, the anti -tamper function may involve detecting the insertion of an object or objects that have a characteristic not found in the correct key, or which lack one or more characteristic found in the correct key, and may use for example optical and or magnetic sensing. The anti-tamper function may use a trained machine learning algorithm, optionally run by the controller 208 of the security monitoring system and/or by a processor or microcontroller of the lock, to discriminate between genuine (allowable) unlocking attempts and bogus attempts (from a bad actor). Using machine learning to identify tampering can help to improve discrimination between “good” and “bad” unlocking attempts.