Certains contenus de cette application ne sont pas disponibles pour le moment.
Si cette situation persiste, veuillez nous contacter àObservations et contact
1. (WO2019009780) PROCÉDÉ D'APPLICATION DE TECHNIQUES DE LUDIFICATION À UN SYSTÈME DE SÉCURITÉ
Note: Texte fondé sur des processus automatiques de reconnaissance optique de caractères. Seule la version PDF a une valeur juridique

METHOD FOR APPLY GAMIFICATION

TECHNIQUES TO A SECURITY SYSTEM

TECHNICAL FIELD

The present disclosure relates to a computer implemented method for apply gamification techniques to a security system, allowing scoring of users handling events generated within the security system. The present disclosure also relates to a corresponding security system and a computer program product.

BACKGROUND

In a conventional security system, a plurality of security devices, such as security cameras, are typically used for monitoring and security of different locations of interest, sometimes denoted as security sites, where the video streams generated by the plurality of cameras are summoned to a human operator for deciding if any abnormalities exist. In some instances, the security system may additionally comprise a computer system performing video processing of the video streams, such that the human operator only needs to be involved if the computer system automatically has decided that an abnormality is present, e.g. a possible alarm condition that needs interaction by the human operator. A security system may also comprise further security devices, such as motion detectors (e.g. PIR), magnetic contacts, passage control arrangements, etc.

With an increasing interest in the positive effects following the application and use of a security system, such as a reduced risk of sabotage and/or break-in, the security market is greatly expanding. However, with an increasing number security sites follows the need to engage a large staff, including e.g. installation technicians, operators, security guards, etc. With this in mind, it would be desirable to adapt the security system to promote a proactive behavior of the security staff with the purpose of increasing staff efficiency.

SUMMARY

According to an aspect of the present disclosure, the above is at least partly met by a computer implemented method performed by a security system, the security system adapted to apply gamification techniques to a security service provided by the security system, wherein the security system comprises a first computing device having a graphical user interface (GUI) adapted to be handled by a first user, the first user being assigned a user skill level, and a server connected to the first computing device over a network, wherein the server implements a gamification environment to process a plurality of security service events, wherein the method comprises the steps of receiving, at the server, a notification of at least one security service event, determining, from the notification, a task to be performed to handle the at least one security service event, wherein the task is associated with a task skill level, assigning, at the server, the task to the first user, presenting, using the GUI of the first computing device, the task to be performed by the first user, receiving, at the server, feedback information relating to completion of the task, and determining, at the server, a score of performance of the task for the first user based on the task, the task skill level and the user skill level.

By means of the present disclosure, there is provided an automated procedure for scoring how well a user handles a security service event that has been assigned to that user, where the security service event has been generated by the security system. The user scoring will in accordance to the present disclosure be dependent on all of an indication of the type of task, an expectation of how "complicated" the security service event is to handle (i.e. the task skill level), and an expectation of how skilled the user is (i.e. the user skill level). Advantageously, the scoring may be allowed to be dynamically implemented, meaning that in case e.g. a user with an in comparison low skill level is handling a security service event that is considered in comparison complicated, then this user will be given a higher score as compared to if the same (type of) security service event was handled by a user having an in comparison higher skill level.

Thus, in accordance to the present disclosure it is possible to determine individual scoring of different users handling tasks associated with the security system, where the users are each provided with an individual computing device having a graphical user interface (GUI). This functionality may advantageously be used by the security system for comparing different user with each other, possibly forming "score boards" for the different users.

In accordance to the present disclosure, the computing device(s) are connected to a server using a network connection, such as the Internet. The server may in turn be connected to e.g. a plurality of security devices as discussed above. The security service events as defined above may for example be generated in case one of the security devices provides an indication that a security service event is taking place, such as that a security breach is indicated. It should however be understood that other functionalities provided by the security system equally may generate a security service event, such as for example relating to a request to add a further component (such as a further security device) to the

security system. In a preferred embodiment at least one computing device (e.g. the first computing device) is mobile.

The GUI provided at the computing device may in accordance to the present disclosure be adapted to present the task assigned to the user, possibly being an indication of the security service event to be handled by the user. The GUI may also be configured to allow the user to indicate when and how the task has been completed, whereby information relating to the completion of the task is further provided to the server. Alternatively or also, the security system (e.g. the server or one of the security devices comprised with the security system, or the computing device) may automatically determine information relating to the completion of the task having been assigned to the user.

Once the scoring for the task has been determined (in a manner as discussed above), the GUI may further present the server determined scoring to the user. Accordingly, the users may fairly quickly get individual "feedback" relating to how well the task was completed. The GUI may additionally present an accumulated scoring for the user, possibly also allowing for presentation of a comparison between the user and other users (e.g. in the form of the above mentioned score board).

The scoring determined for the completed task may in one embodiment of the present disclosure be used for allowing the user to be assigned to a different skill level.

Accordingly, the scoring determined for the completion of the task may possibly be compared to a predetermined threshold, where the user skill level for the user may be based on a result of the comparison. Thus, in case the scoring indicates that the user performed well (above expectation), then the user skill level may be increased. Correspondingly, in case the scoring indicates that the user performed somewhat badly (below expectation), then the user skill level may be decreased. The possibly updated user skill level may be presented to the user using the GUI.

In a possible embodiment of the present disclosure, the step of assigning the task to the first user is dependent on the user skill level. Accordingly, some tasks may only be assigned to a user having a certain skill level. As such, there may in accordance to the present disclosure be possible to "form" a user drive to perform well for increasing the user skill level, whereby possibly further tasks may be assigned to the user. Correspondingly, some tasks may only be assigned to users having a low user skill level (e.g. a novice user), where such tasks may be considered to be well suited for novice users, e.g. during training of such a novice user.

The determination of the score of performance/scoring may at least partly be dependent on an amount of time elapsed between presenting the task at the GUI of the first computing device and receiving the feedback information at the server. Accordingly, in case the user is "quick" in responding and handling the task it may be possible to achieve a higher scoring as compared to the case where the user is "slow" in responding and handling the task. Again, this will proactively direct the user to quickly handle the assigned task.

At the same time, a quality measure may in accordance to the present disclosure be implemented and used in the determination of the scoring. Such a quality measure may for example be formed in a peer review manner, e.g. by allowing the determination of the score of performance to be at least partly dependent on a user rating received at the server, where the user rating is provided by another user, such as by at least one of an end user and an expert operator of the security system.

The determination of the scoring may also be dependent on what type of information the (first) user is collecting when handling the task. As an example, the GUI of the first computing device may in one embodiment be configured to allow the user to input different type of information when handling the task. Such information may for example comprise geographical information (e.g. map data) relating to the user when handling the task. That is, the handling of the task may possibly be geographically related, such as for example when a security operator is handling an incident formed by e.g. one of the above mentioned security devices. In such a case the security operator may be assigned to visit a geographical location of the security device. The GUI may thus on one embodiment comprise a geolocation arrangement, such as a GPS receiver. Information from the GPS received may be provided as the above mentioned feedback information provided to the server.

The GUI may further be adapted to allow for the collection of e.g. an image or a video sequence relating to the handling of the task, where the image/video is provided as part of the feedback information. An in comparison large amount of collected information may have a positive effect when determining the scoring for the task. Such an image/video sequence should be selected to improve the subsequent handling of e.g. an incident and may comprise information useful in later filing of an insurance claim relating to the incident.

In accordance to the present disclosure, the method further comprises receiving, through the GUI, consent from the first user to participate in gamification.

Accordingly, only users that have provided their consent to participation will proceed through the scoring process as defined above. It should however be understood that user not providing their consent may have limited possibility in increasing their user skill level, whereby possibly only a limited amount of tasks may be assigned to such users.

In a possible embodiment of the present disclosure the security service event is an at least partly fabricated security service event. That is, the methodology as presented in line with the present disclosure may possibly be used for "training" of a user of the security system. Specifically, the server may for example generate tasks/security service event that will spark an action by the user. However, the security service event may not necessarily be related to e.g. a break-in or similar. Rather, the user may be "tested" for determining how well the user is equipped for handling a specific task.

Possibly, the at least partly fabricated security service event is based on a previously recorded security service event. Accordingly, rather than "creating" a fabricated security service event from "scratch" (to be used as training material), the fabricated security service event to be presented to the user may be based on previous information collected when another user was handling such a task. The training may in accordance to the present disclosure take place for training novice users. However, also more skilled or expert users may be trained or tested using this embodiment.

According to another aspect of the present disclosure there is provided a security system adapted to apply gamification techniques to a security service provided by the security system, wherein the security system comprises a first computing device having a graphical user interface (GUI) adapted to be handled by a first user, the first user being assigned a user skill level, and a server connected to the first computing device over a network, wherein the server implements a gamification environment to process a plurality of security service events, wherein security system is configured to receive, at the server, a notification of at least one security service event, determine, from the notification, a task to be performed to handle the at least one security service event, wherein the task is associated with a task skill level, assign, at the server, the task to the first user, present, using the GUI of the first computing device, the task to be performed by the first user, receive, at the server, feedback information relating to completion of the task, and determine, at the server, a score of performance of the task for the first user based on the task, the task skill level and the user skill level. This aspect of the present disclosure provides similar advantages as discussed above in relation to the previous aspect of the present disclosure.

According to a still further aspect of the present disclosure there is provided a computer program product comprising a non-transitory computer readable medium having stored thereon computer program means for operating a security system adapted to apply

gamification techniques to a security service provided by the security system, wherein the security system comprises a first computing device having a graphical user interface (GUI) adapted to be handled by a first user, the first user being assigned a user skill level, and a server connected to the first computing device over a network, wherein the server implements a gamification, wherein the computer program product comprises code for receiving, at the server, a notification of at least one security service event, code for determining, from the notification, a task to be performed to handle the at least one security service event, wherein the task is associated with a task skill level, code for assigning, at the server, the task to the first user, code for presenting, using the GUI of the first computing device, the task to be performed by the first user, code for receiving, at the server, feedback information relating to completion of the task, and code for determining, at the server, a score of performance of the task for the first user based on the task, the task skill level and the user skill level. Also this aspect of the present disclosure provides similar advantages as discussed above in relation to the previous aspects of the present disclosure.

A software executed by the server for operation in accordance to the present disclosure may be stored on a computer readable medium, being any type of memory device, including one of a removable nonvolatile random access memory, a hard disk drive, a floppy disk, a CD-ROM, a DVD-ROM, a USB memory, an SD memory card, or a similar computer readable medium known in the art.

Further features of, and advantages with, the present disclosure will become apparent when studying the appended claims and the following description. The skilled addressee realize that different features of the present disclosure may be combined to create embodiments other than those described in the following, without departing from the scope of the present disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The various aspects of the present disclosure, including its particular features and advantages, will be readily understood from the following detailed description and the accompanying drawings, in which:

Fig. 1 illustrates a security system according to a currently preferred embodiment of the present disclosure, and

Fig. 2 shows a flow chart of a method according to an embodiment of the present disclosure.

DETAILED DESCRIPTION

The present disclosure will now be described more fully hereinafter with reference to the accompanying drawings, in which currently preferred embodiments of the present disclosure are shown. This present disclosure may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided for thoroughness and completeness, and fully convey the scope of the present disclosure to the skilled addressee. Like reference characters refer to like elements throughout.

Referring now to the drawings and to Fig. 1 in particular, there is depicted a security system 100 according to a possible embodiment of the present disclosure. The security system 100 comprises a first mobile computing device 102 having a graphical user interface (GUI) 104 adapted to be handled by a first user 106, a second mobile computing device 108 having a GUI 110 adapted to be handled by a second user 112, and a

server/database 114 connected to the first 102 and the second 108 mobile computing device over a network 116, such as the Internet. The first 102 and the second 108 mobile computing devices may for example be a laptop computer, a mobile phone, a tablet, etc. It should however be understood that at least one of the computing devices may be stationary, e.g. provided as a desktop computer.

The network 116 may be in part be wired or wireless, including for example wired connections like a building LAN, a WAN, an Ethernet network, an IP network, etc., and wireless connections like WLAN, CDMA, GSM, GPRS, 3G mobile communications, 4G mobile communications, Bluetooth, infrared, or similar.

The server 114 may in one embodiment be a cloud-based server. Thus, the computing power provided by means of the present disclosure may be distributed between a plurality of servers, and the location of the servers must not be explicitly defined.

Advantageous following the use of a cloud-based solution is also the inherent redundancy achieved.

As illustrated in Fig. 1, the GUI 104 of the first user mobile computing device 102 is exemplified to present a video sequence that has been generated by a security camera (not shown) forming part of the security system 100 and adapted to monitor a first security site. The server 114 receives the image data from the security camera as a notification of a security service event. The server 114 in turn determines a task based on the image data (security service event), in the exemplified case that a user is needed for manual (or semi-manual) determination of if the image data shows a "true" or a "false" alarm. In Fig. 1, the task assigned to the first user 106 operating the first mobile computing device 102 is consequently to determine if there is a true or false alarm.

The GUI 104 will accordingly be adapted based on the task, for presenting the image data to the first user 106. The GUI 104 is further provided with means for allowing the user to provide feedback in relation to the manual/semi-manual analysis of the image data. In the present case, the first user 106 determines that the alarm is a false alarm and provides this as feedback to the server 114.

The server 114 receives the feedback information from the user ("false alarm") and also determined the time it took for the first user 106 to provide the feedback

information. In the exemplified embodiment the duration for reviewing and responding was determined to be 30 seconds. Based on the task (in this case reviewing image data), the task skill level (in this case reviewing image data captured during the day, considered less complicated as compared to reviewing image data captured during the evening/night) and the user skill level, it is possible for the server 114 to determine a score of performance for the task (i.e. reviewing image data) handled by the first user 106. In the illustration presented in Fig. 1, the first user is given 200 points. The GUI 104 further shows that an accumulated scoring for the first user 106 is 4230 points.

As is further presented in Fig. 1, the GUI 110 of the second mobile computing device 108 operated by the second user 112 presents in a corresponding manner a task to be handled by the second user 112. In this case a security device (not shown) arranged at a second site provides an indication of a security service event, such as a security breach. The second user 112, being a security guard, is assigned the task to visit the second site to handle the security breach. In the illustration provided in Fig. 1, the second user 112 is slower to respond and act on the assigned task than what may be expected. The time it took for the second user 112 to handle the task is exemplified as 21 minutes and 51 seconds. Based on the task, the task skill level and the user skill level the second user was only given 50 points for handling the task. The GUI 110 shows an accumulated scoring to the second user 112 as 2100 points.

Accordingly, in comparing the scores for the first 106 and the second 112 users, it may automatically be concluded that the first user 106 is performing "better" as compared to the second user 112. Thus, in moving forward the second user may need to be trained further or otherwise be given feedback to improve his performance. Conversely, the first user 106 may be given, in comparison, more complicated tasks to be handled.

The accumulated scoring to the users 106, 112 may further be used for remuneration. That is, in case a user is receiving an average scoring per e.g. day he may be given a monitory bonus. Additionally, when a user has reached an accumulated scoring (points) above a predetermined threshold, he may possibly be promoted.

As understood, in a resource demanding environment, such as in relation to staffing of an operators/user assigned to tasks of a security system, the present disclosure may allow for automatic handling of promotion and remuneration/bonuses, with the purpose of increasing staff productivity.

In summary and with further reference to Fig. 2, the present disclosure relates to a computer implemented method performed by a security system 100, the security system 100 adapted to apply gamification techniques to a security service provided by the security system 100, wherein the security system 100 comprises a first mobile computing device 102 having a graphical user interface (GUI) 104 adapted to be handled by a first user 106, the first user 106 being assigned a user skill level, and a server 114 connected to the first mobile computing device 102 over a network 116, wherein the server 114 implements a gamification environment to process a plurality of security service events, wherein the method comprises the steps of receiving, SI, at the server 114, a notification of at least one security service event, determining, S2, from the notification, a task to be performed to handle the at least one security service event, wherein the task is associated with a task skill level, assigning, S3, at the server 114, the task to the first user 106, presenting, S4, using the GUI of the first mobile computing device 102, the task to be performed by the first user 102, receiving, S5, at the server 114, feedback information relating to completion of the task, and determining, S6,at the server 114, a score of performance of the task for the first user 106 based on the task, the task skill level and the user skill level.

By means of the present disclosure, it is possible to determine individual scoring of different users handling tasks associated with the security system. This

functionality may advantageously be used by the security system for comparing different user with each other, possibly forming "score boards" for the different users.

The control functionality of the present disclosure may be implemented using existing computer processors, or by a special purpose computer processor for an appropriate system, incorporated for this or another purpose, or by a hardwire system. Embodiments within the scope of the present disclosure include program products comprising machine-readable medium for carrying or having machine-executable instructions or data structures stored thereon. Such machine-readable media can be any available media that can be

accessed by a general purpose or special purpose computer or other machine with a processor. By way of example, such machine-readable media can comprise RAM, ROM, EPROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to carry or store desired program code in the form of machine-executable instructions or data structures and which can be accessed by a general purpose or special purpose computer or other machine with a processor. When information is transferred or provided over a network or another communications connection (either hardwired, wireless, or a combination of hardwired or wireless) to a machine, the machine properly views the connection as a machine-readable medium. Thus, any such connection is properly termed a machine-readable medium.

Combinations of the above are also included within the scope of machine-readable media. Machine-executable instructions include, for example, instructions and data which cause a general purpose computer, special purpose computer, or special purpose processing machines to perform a certain function or group of functions.

The memory may be one or more devices for storing data and/or computer code for completing or facilitating the various methods described in the present description. The memory may include volatile memory or non-volatile memory. The memory may include database components, object code components, script components, or any other type of information structure for supporting the various activities of the present description.

According to an exemplary embodiment, any distributed or local memory device may be utilized with the systems and methods of this description. According to an exemplary embodiment the memory is communicably connected to the processor (e.g., via a circuit or any other wired, wireless, or network connection) and includes computer code for executing one or more processes described herein.

Although the figures may show a sequence the order of the steps may differ from what is depicted. Also two or more steps may be performed concurrently or with partial concurrence. Such variation will depend on the software and hardware systems chosen and on designer choice. All such variations are within the scope of the disclosure. Likewise, software implementations could be accomplished with standard programming techniques with rule based logic and other logic to accomplish the various connection steps, processing steps, comparison steps and decision steps. Additionally, even though the present disclosure has been described with reference to specific exemplifying embodiments thereof, many different alterations, modifications and the like will become apparent for those skilled in the art.

In addition, variations to the disclosed embodiments can be understood and effected by the skilled addressee in practicing the claimed present disclosure, from a study of the drawings, the disclosure, and the appended claims. Furthermore, in the claims, the word "comprising" does not exclude other elements or steps, and the indefinite article "a" or "an" does not exclude a plurality.