Systems and methods for managing video data

ABSTRACT

DVM system is configured to include an incident trigger, which is actuated either manually or automatically in response to an “incident”. In the case of manual actuation, the definition of an incident may be subjectively determined by an operator (for example based on training and/or protocols). In the case of automatic actuation, an incident is defined by predefined criteria (for example a signal from analytics software, and alarm, or the like). In response to the actuation of the trigger, an incident identifier is defined. During the period of actuation, a plurality of recordings is automatically made, based on an incident recording protocol. These recordings are all associated with the incident identifier. The automation allows an operator to, at the time of the incident, focus on factors other than ensuring important video evidence is being recorded (such as following a subject through a building by looking at various cameras).

This application is a National Stage of International Application No. PCT/AU2012/000914, filed Aug. 3, 2012, which claims the benefit of Australian Patent Application No. 2011903153, filed Aug. 5, 2011, both of which are incorporated herein by reference.

FIELD OF THE INVENTION

The present invention relates to systems and methods for managing video data. Embodiments of the invention have been particularly developed for providing incident-centric recording in a Digital Video Management (DVM) system. While some embodiments will be described herein with particular reference to that application, it will be appreciated that the invention is not limited to such a field of use, and is applicable in broader contexts.

BACKGROUND

Any discussion of the background art throughout the specification should in no way be considered as an admission that such art is widely known or forms part of common general knowledge in the field.

DVM systems are widely used for surveillance purposes. In such contexts, it is important to collect evidence for the purpose of incident recording. For example, collecting of evidence is an extremely important aspect of incident management due to potential police involvement, subsequent legal proceedings, and training purposes. In known surveillance systems, evidence collection is generally achieved using a number of functionalities such as:

-   -   Automatic background recording on all cameras.     -   User or event driven recording on key cameras.     -   User initiated image snapshots.

These functionalities are either pre-configured, or must be triggered manually by the operator during an incident. This can lead to costly configuration, and additional stress on operators in an already stressful situation. It can also require time consuming analysis after the event, where one or more operators must manually reconstruct the event, finding appropriate video regions, and ordering them based on time or, for example, movements of a suspect.

There is a need in the art for improved systems and methods for managing video data.

SUMMARY OF THE INVENTION

It is an object of the present invention to overcome or ameliorate at least one of the disadvantages of the prior art, or to provide a useful alternative.

One embodiment provides a method for controlling a DVM system, the method including:

providing an incident trigger;

in response to actuation of the incident trigger, defining an incident identifier;

during a period of time for which the incident trigger is actuated, applying an incident recording protocol, thereby to automatically make recordings in accordance with the incident recording protocol; and

associating each of the DVM recordings with the incident identifier.

One embodiment provides a DVM system configured to perform a method as described herein.

One embodiment provides a tangible non-transitive carrier medium carrying computer executable code that, when executed via one or more processes, allows the performance of a method as described herein.

Reference throughout this specification to “one embodiment”, “some embodiments” or “an embodiment” means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases “in one embodiment”, “in some embodiments” or “in an embodiment” in various places throughout this specification are not necessarily all referring to the same embodiment, but may. Furthermore, the particular features, structures or characteristics may be combined in any suitable manner, as would be apparent to one of ordinary skill in the art from this disclosure, in one or more embodiments.

As used herein, unless otherwise specified the use of the ordinal adjectives “first”, “second”, “third”, etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.

In the claims below and the description herein, any one of the terms comprising, comprised of or which comprises is an open term that means including at least the elements/features that follow, but not excluding others. Thus, the term comprising, when used in the claims, should not be interpreted as being limitative to the means or elements or steps listed thereafter. For example, the scope of the expression a device comprising A and B should not be limited to devices consisting only of elements A and B. Any one of the terms including or which includes or that includes as used herein is also an open term that also means including at least the elements/features that follow the term, but not excluding others. Thus, including is synonymous with and means comprising.

As used herein, the term “exemplary” is used in the sense of providing examples, as opposed to indicating quality. That is, an “exemplary embodiment” is an embodiment provided as an example, as opposed to necessarily being an embodiment of exemplary quality.

BRIEF DESCRIPTION OF THE DRAWINGS

Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings in which:

FIG. 1 schematically illustrates a DVM system according to one embodiment.

FIG. 2 schematically illustrates a DVM system according to one embodiment.

FIG. 3A illustrates a method according to one embodiment.

FIG. 3B illustrates a method according to one embodiment.

DETAILED DESCRIPTION

Described herein are systems and methods for managing video data. Embodiments are described by reference to a Digital Video Management (DVM) system, for example in terms of methods for providing incident-centric recording in a DVM system. In overview, a DVM system is configured to include an incident trigger, which is actuated either manually or automatically in response to an “incident”. In the case of manual actuation, the definition of an incident may be subjectively determined by an operator (for example based on training and/or protocols). In the case of automatic actuation, an incident is defined by predefined criteria (for example a signal from analytics software, and alarm, or the like). In response to the actuation of the trigger, an incident identifier is defined. During the period of actuation, a plurality of recordings is automatically made, based on an incident recording protocol. These recordings are all associated with the incident identifier. The automation allows an operator to, at the time of the incident, focus on factors other than ensuring important video evidence is being recorded (such as following a subject through a building by looking at various cameras). The association streamlines subsequent review of an incident, as recordings relevant to the incident are commonly identifiable based on the incident identifier.

System Level Overview

FIG. 1 illustrates a general Digital Video Management (DVM) system 101. System 101 is described to provide general context to various embodiments discussed below. Although embodiments are described by reference to DVM systems based on system 101, the present invention is not limited as such. That is, system 101 is provided as a general example to highlight various features of an exemplary DVM system. In practice, many systems omit one or more of these features, and/or include additional features.

System 101 includes a plurality of video streaming units 102. Units 102 include conventional cameras 104 (including analogue video cameras) coupled to discrete video streaming units, and IP streaming cameras 105. Video streaming units 102 stream video data, presently in the form of surveillance footage, on a TCP/IP network 106. This is readily achieved using IP streaming cameras 105, which are inherently adapted for such a task. However, in the case of other cameras 104 (such as conventional analogue cameras), a discrete video streaming unit 107 is required to convert a captured video signal into a format suitable for IP streaming.

For the purposes of the present disclosure, the term “video streaming unit” should be read to include IP streaming cameras 105 and video streaming units 107. That is, the term “video streaming unit” describes any hardware component configured to stream video data onto a network, independent of the source of the originating analogue video data.

For the present purposes, the terms “video streaming unit” and “camera” are generally used interchangeably, on the assumption that each video streaming unit corresponds to a unique set of optical components used to capture video. That is, there is a one-to-one relationship between streaming units 107 and cameras 104. However, in other embodiments there is a one-to-many relationship between streaming units 107 and cameras 104 (i.e. a streaming unit is configured for connection to multiple cameras).

One or more camera servers 109 are also connected to network 106 (these may be either physical servers or virtual servers). Each camera server is enabled to have assigned to it one or more of video streaming units 102. In some embodiments the assignment is on a stream-by-stream basis rather than a camera-by-camera basis. This assignment is carried out using a software-based configuration tool, and it follows that camera assignment is virtual rather than physical. That is, the relationships are set by software configuration rather than hardware manipulation. In practice, each camera has a unique identifier. Data indicative of this identifier is included with surveillance footage being streamed by that camera such that components on the network are able to ascertain from which camera a given stream originates.

In the present embodiment, camera servers are responsible for making available both live and stored video data. In relation to the former, each camera server provides a live stream interface, which consists of socket connections between the camera manager and clients. Clients request live video through the camera server's COM interfaces and the camera server then pipes video and audio straight from the relevant streaming unit to the client through TCP sockets. In relation to the latter, each camera server has access to a data store for recording video data. Although FIG. 1 suggests a one-to-one relationship between camera servers and data stores, this is by no means necessary. Each camera server also provides a playback stream interface, which consists of socket connections between the camera manager and clients. Clients create and control the playback of video stored that the camera server's data store through the camera manager's COM interfaces and the stream is sent to clients via TCP sockets.

Although, in the context of the present disclosure, there is discussion of one or more cameras or streaming units being assigned to a common camera server, this is a conceptual notion, and is essentially no different from a camera server being assigned to one or more cameras or streaming units.

Clients 110 execute on a plurality of client terminals, which in some embodiments include all computational platform on network 106 that are provided with appropriate permissions. Clients 110 provide a user interface (UI) that allows surveillance footage to be viewed in real time by an end-user. For example, one UI component is a render window, in which streamed video data is rendered for display to a user. In some cases this user interface is provided through an existing application (such as Microsoft Internet Explorer), whilst in other cases it is a standalone application. The user interface optionally provides the end-user with access to other system and camera functionalities, including mechanical, digital and optical camera controls, control over video storage, and other configuration and administrative functionalities (such as the assignment and reassignment of cameras to camera servers). Typically clients 110 are relatively “thin”, and commands provided via the relevant user interfaces are implemented at a remote server, typically a camera server. In some embodiments different clients have different levels of access rights. For example, in some embodiments there is a desire to limit the number of users with access to change configuration settings or mechanically control cameras.

System 101 also includes a DVM database server 115. Database server 115 is responsible for maintaining various information relating to configurations and operational characteristics of system 101, and for managing events within the system. In terms of events, the general notion is that an action in the system (such as the modification of data in the database, or the reservation of a camera, as discusses below) causes an event to be “fired” (i.e. published), this having follow-on effects depending on the nature of the event.

In the present example, the system makes use of a preferred and redundant database server (115 and 116 respectively), the redundant server essentially operating as a backup for the preferred server. The relationship between these database servers is generally beyond the concern of the present disclosure.

Some embodiments of the present invention are directed to distributed DVM systems, also referred to as “distributed system architecture” (DSA). In general terms, a distributed DVM system includes a plurality of (i.e. two or more) discrete DVM systems, such as system 101. These systems are discrete in the sense that they are in essence standalone systems, able to function autonomously without the other by way of their own DVM servers. They may be distributed geographically (for example in different buildings, cities or countries), or notionally (in a common geographic location, but split due to individual system constraints, for example camera server numbers, or simply to take advantage of benefits of a distributed architecture). In the context of FIG. 1, a remote system 150, communicates with the local system via a DSA link 151. For the present purposes, it is assumed that remote system 150 is in a general sense similar to the local system. Various components (hardware and software) are configured to allow communications between the systems, for example via a network connection (including, but not limited to, an Intranet or Internet connection), or other communications interface. For the sake of the present embodiments, it is assumed that the inter-system communications occur by way of TCP/IP connections, and in this manner any communications channel supporting TCP/IP may be used.

Incident Centric Recording

FIG. 2 illustrates components of an exemplary DVM system (such as the system of FIG. 1), but simplified to illustrate components relevant to incident-centric recording.

A camera 201 is associated with a camera server 202. Camera server 202 is configured to access video data made available by camera 201, either for live viewing or for recording to a storage device 203. Camera server 202 is configured/controlled by a DVM server 204. There are a number of further cameras and camera servers, which are not illustrated in FIG. 2 for the sake of simplicity.

DVM server 204 executes DVM administration modules 205. The functional block for modules 205 is used to simplistically represent a wide range of software components implemented within a DVM system. A small selection of these components is illustrated in FIG. 2, and these are described in more detail further below.

DVM server 204 communicates with a user interface 210 which executes on a client terminal 211. In the present embodiment, this user interface is provided via various of modules 205 (including modules that are not specifically illustrated) via a web-server type arrangement (i.e. user interface 210 is provided via a web-browser at terminal 211 which renders data transmitted by server 211).

User interface 210 is configured to display live and recorded video data to a user via video display objects. In the example of FIG. 2, a plurality of display objects are shown as being rendered on-screen simultaneously, including a major display object 212 and minor display objects 213A-E. These are configured to each display live video data from respective cameras (such as camera 201). The size, geometric layout, and number of major/minor display objects is illustrative only, and is in some cases modifiable by a user or in response to other inputs. User interface 210 additionally includes an incident trigger button 216 and other controls 217 (which simplistically represents a variety of GUI controls available to an operator of terminal 211, such as record control, camera position control, camera view selection, and so on).

Operation of the arrangement of FIG. 2 relevant to incident centric recording is now described by reference to method 300 of FIG. 3A, which is performed by DVM server 204.

Module 250 provides an incident trigger, which is able to be actuated manually by an operator of terminal 211. Specifically, the incident trigger is actuated in response to an operator clicking button 216. In practice, an operator determines that an incident is occurring (for example based on training and/or defined surveillance protocols), and clicks button 216 thereby to incident centric recording. Clicking button 216 transmits a signal to server 204, thereby to actuate incident trigger module 250. In some embodiments trigger module 250 may be actuated automatically in response to predefined criteria being met. These criteria may include the triggering of an alarm or alarm condition in eth DVM system, a signal from analytics software (for example analytics software configured to identify movement in a camera's field of view), or an assessment of activity levels at a client terminal (for example if operator activity exceeds a threshold level it may be deemed that an incident is underway). In the context of method 300, the incident trigger is actuated at 301.

Functional block 302 represents a process including, in response to actuation of the incident trigger, defining an incident identifier. In some cases this is an alphanumeric identifier which is able to be associated with files (such as video recordings and screen captures) made by the DVM system. In other cases the identifier may be defined by a file folder in which such files are stored. However, it will be appreciated that the former approach is advantageous in the sense that the files are readily identifiable in a incident centric manner (based on the identifier) and in conventional DVM system manners (based, for example, on other properties of the files, such as time, camera, camera server, and so on). In some cases defining an incident identifier includes selecting one of a plurality of pre-created identifiers to for use in the current incident.

Functional block 302 represents a process including, during a period of time for which the incident trigger is actuated, applying an incident recording protocol. Application of this incident recording protocol causes the DVM system to automatically make recordings in accordance with the incident recording protocol. This may include any of (i) making recordings that would not have been otherwise made; (ii) making recordings at a different quality compared to what would have been made by default (for example where a camera is always configured to record at a background level); or (iii) determining that a recording that would have otherwise have been made by default is to be associated with the incident identifier. That is, the concept of “automatically making recordings” should be afforded a broad interpretation.

In terms of the period of time, that is in some cases defined by an “incident end” event. For example, this in some embodiments includes the operator clicking button 216 a further time to indicate that the incident is ended. In other cases the end of an incident is determined by different factors, which may be automatically determined.

As noted, the incident recording protocol defines a set of rules for automatically making recordings. These may include recordings from one or more cameras, and/or recordings of activity at the client terminal. The recordings are, in the present embodiment, made under the control of an incident-based recording control module 251. That is, module 251 implements the rules thereby to coordinate the making of automated recordings (which may include instructing a camera server to begin recording, modify recording parameters for a given camera, and/or associate an existing recording with the incident identifier). Various exemplary rules are outlined below:

-   -   A rule to set a predefined minimum level of low-quality         background recording for all, or a selected group, of the         cameras.     -   A rule to make recordings for all cameras currently being viewed         by an operator of the terminal. For example, as shown in FIG.         3B, functional block 303 may include monitoring activity at a         DVM client (for example using a client monitor module 252),         identifying a set of one or more cameras for which live video is         being accessed by the DVM client (for example in object 212 and         objects 213A-E), and making recordings for the cameras in that         set. That is, recordings are made to correspond with what the         operator views. This allows the operator to focus on switching         between views thereby to monitor the incident, without needing         to be concerned with manually making recordings; the operator         can rest assured that recordings are being made for everything         he/she observes in the user interface.     -   A rule to make recordings of activity at a DVM client. For         example, this may include making recordings defined by         screenshots of the DVM client user interface 210. This may         include sequential screenshots that define a video of what is         presented to the user of the DVM client during the period of         time for which the incident trigger is actuated. Such a video         allows subsequent review of what the operator saw, how the         operator reacted, and so on. In some cases logic is used thereby         to recreate such a video using an approach other than screen         capture (for example based on data indicative of what video was         being displayed in each object at specific times, and use of         automated recordings from the relevant cameras).

Additional rules may also be used, including rules relating to specified important cameras, cameras in regions proximal those viewed when the incident trigger is actuated, and so on. The concept of “recordings” should be interpreted broadly enough to cover both video and image recordings, in addition to other data (such as map data, location data, access card data from an associated access control system, and so on). In some embodiments the “recordings” include an audit log of all operator activity (for example as a list of operations performed in the system), thereby to allow review of steps taken by the operator in response to an incident.

As indicated by functional block 304, recordings made in accordance with the incident recording protocol are associated with the incident identifier defined at 302. It will be appreciated that, in practice, this preferably occurs in real time as recordings are made, as opposed to as a separate and subsequent step once the incident is over.

Functional block 305 represents a process whereby recordings are made available via an incident viewer interface. For example, server 204 provides an incident viewer module 253 for providing a user of a client terminal with access to all of the recordings associated with a given incident identifier. Preferably, a user is enabled to search for or browse incidents based on incident parameters other than only incident identifier, such as based on date and/or time. In this regard, each incident is associated with a start time (based on the time of actuation of the incident trigger). Each incident may additionally be associated with an operator responsible for actuating the incident trigger, and/or other parameters.

In some embodiments functionality is provided to export an incident package including all recordings having the incident identifier. This preferably includes identifying the relevant recordings, converting them into a standard video format such as MPEG or AVI (if required), and exporting the converted recordings (for example to a portable carrier medium such as a flash drive, CD, DVD or the like). This is particularly useful if incident recordings are to be provided to a third party, such as the police.

In some embodiments the incident package is defined as a file or file set that is executable in a DVM data viewer client. The term DVM data viewer client describes a software application that provides similar control functionality to a DVM client, but which does not actually interact with a physical DVM system. Rather, the software application is configured for allowing a user to access an incident package in an offline mode, and navigate/view recordings within that package via a DVM-style interface.

CONCLUSIONS AND INTERPRETATION

It will be appreciated that the disclosure above provides various significant systems and methods for managing video data. For example, the present embodiments allows for improved control of DVM systems, thereby to enable incident-centric recording. This frees up an operator to focus on monitoring of an incident, without needing to be concerned with the collection of evidence; the collection of evidence is automated based on an incident recording protocol, and that evidence associated with a common identifier thereby to streamline subsequent identification and review of evidence.

Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification discussions utilizing terms such as “processing,” “computing,” “calculating,” “determining”, analyzing” or the like, refer to the action and/or processes of a computer or computing system, or similar electronic computing device, that manipulate and/or transform data represented as physical, such as electronic, quantities into other data similarly represented as physical quantities.

In a similar manner, the term “processor” may refer to any device or portion of a device that processes electronic data, e.g., from registers and/or memory to transform that electronic data into other electronic data that, e.g., may be stored in registers and/or memory. A “computer” or a “computing machine” or a “computing platform” may include one or more processors.

The methodologies described herein are, in one embodiment, performable by one or more processors that accept computer-readable (also called machine-readable) code containing a set of instructions that when executed by one or more of the processors carry out at least one of the methods described herein. Any processor capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken are included. Thus, one example is a typical processing system that includes one or more processors. Each processor may include one or more of a CPU, a graphics processing unit, and a programmable DSP unit. The processing system further may include a memory subsystem including main RAM and/or a static RAM, and/or ROM. A bus subsystem may be included for communicating between the components. The processing system further may be a distributed processing system with processors coupled by a network. If the processing system requires a display, such a display may be included, e.g., a liquid crystal display (LCD) or a cathode ray tube (CRT) display. If manual data entry is required, the processing system also includes an input device such as one or more of an alphanumeric input unit such as a keyboard, a pointing control device such as a mouse, and so forth. The term memory unit as used herein, if clear from the context and unless explicitly stated otherwise, also encompasses a storage system such as a disk drive unit. The processing system in some configurations may include a sound output device, and a network interface device. The memory subsystem thus includes a computer-readable carrier medium that carries computer-readable code (e.g., software) including a set of instructions to cause performing, when executed by one or more processors, one of more of the methods described herein. Note that when the method includes several elements, e.g., several steps, no ordering of such elements is implied, unless specifically stated. The software may reside in the hard disk, or may also reside, completely or at least partially, within the RAM and/or within the processor during execution thereof by the computer system. Thus, the memory and the processor also constitute computer-readable carrier medium carrying computer-readable code.

Furthermore, a computer-readable carrier medium may form, or be included in a computer program product.

In alternative embodiments, the one or more processors operate as a standalone device or may be connected, e.g., networked to other processor(s), in a networked deployment, the one or more processors may operate in the capacity of a server or a user machine in server-user network environment, or as a peer machine in a peer-to-peer or distributed network environment. The one or more processors may form a personal computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a cellular telephone, a web appliance, a network router, switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.

Note that while some diagrams only show a single processor and a single memory that carries the computer-readable code, those in the art will understand that many of the components described above are included, but not explicitly shown or described in order not to obscure the inventive aspect. For example, while only a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.

Thus, one embodiment of each of the methods described herein is in the form of a computer-readable carrier medium carrying a set of instructions, e.g., a computer program that is for execution on one or more processors, e.g., one or more processors that are part of web server arrangement. Thus, as will be appreciated by those skilled in the art, embodiments of the present invention may be embodied as a method, an apparatus such as a special purpose apparatus, an apparatus such as a data processing system, or a computer-readable carrier medium, e.g., a computer program product. The computer-readable carrier medium carries computer readable code including a set of instructions that when executed on one or more processors cause the processor or processors to implement a method. Accordingly, aspects of the present invention may take the form of a method, an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of carrier medium (e.g., a computer program product on a computer-readable storage medium) carrying computer-readable program code embodied in the medium.

The software may further be transmitted or received over a network via a network interface device. While the carrier medium is shown in an exemplary embodiment to be a single medium, the term “carrier medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database, and/or associated caches and servers) that store the one or more sets of instructions. The term “carrier medium” shall also be taken to include any medium that is capable of storing, encoding or carrying a set of instructions for execution by one or more of the processors and that cause the one or more processors to perform any one or more of the methodologies of the present invention. A carrier medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media includes, for example, optical, magnetic disks, and magneto-optical disks. Volatile media includes dynamic memory, such as main memory. Transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise a bus subsystem. Transmission media also may also take the form of acoustic or light waves, such as those generated during radio wave and infrared data communications. For example, the term “carrier medium” shall accordingly be taken to included, but not be limited to, solid-state memories, a computer product embodied in optical and magnetic media; a medium bearing a propagated signal detectable by at least one processor of one or more processors and representing a set of instructions that, when executed, implement a method; a carrier wave bearing a propagated signal detectable by at least one processor of the one or more processors and representing the set of instructions a propagated signal and representing the set of instructions; and a transmission medium in a network bearing a propagated signal detectable by at least one processor of the one or more processors and representing the set of instructions.

It will be understood that the steps of methods discussed are performed in one embodiment by an appropriate processor (or processors) of a processing (i.e., computer) system executing instructions (computer-readable code) stored in storage. It will also be understood that the invention is not limited to any particular implementation or programming technique and that the invention may be implemented using any appropriate techniques for implementing the functionality described herein. The invention is not limited to any particular programming language or operating system.

Reference throughout this specification to “one embodiment” or “an embodiment” means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases “in one embodiment” or “in an embodiment” in various places throughout this specification are not necessarily all referring to the same embodiment, but may. Furthermore, the particular features, structures or characteristics may be combined in any suitable manner, as would be apparent to one of ordinary skill in the art from this disclosure, in one or more embodiments.

Similarly it should be appreciated that in the above description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, FIG., or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the Detailed Description are hereby expressly incorporated into this Detailed Description, with each claim standing on its own as a separate embodiment of this invention.

Furthermore, while some embodiments described herein include some but not other features included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the invention, and form different embodiments, as would be understood by those skilled in the art. For example, in the following claims, any of the claimed embodiments can be used in any combination.

Furthermore, some of the embodiments are described herein as a method or combination of elements of a method that can be implemented by a processor of a computer system or by other means of carrying out the function. Thus, a processor with the necessary instructions for carrying out such a method or element of a method forms a means for carrying out the method or element of a method. Furthermore, an element described herein of an apparatus embodiment is an example of a means for carrying out the function performed by the element for the purpose of carrying out the invention.

In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In other instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.

Similarly, it is to be noticed that the term coupled, when used in the claims, should not be interpreted as being limited to direct connections only. The terms “coupled” and “connected,” along with their derivatives, may be used. It should be understood that these terms are not intended as synonyms for each other. Thus, the scope of the expression a device A coupled to a device B should not be limited to devices or systems wherein an output of device A is directly connected to an input of device B. It means that there exists a path between an output of A and an input of B which may be a path including other devices or means. “Coupled” may mean that two or more elements are either in direct physical or electrical contact, or that two or more elements are not in direct contact with each other but yet still co-operate or interact with each other.

Thus, while there has been described what are believed to be the preferred embodiments of the invention, those skilled in the art will recognize that other and further modifications may be made thereto without departing from the spirit of the invention, and it is intended to claim all such changes and modifications as falling within the scope of the invention. For example, any formulas given above are merely representative of procedures that may be used. Functionality may be added or deleted from the block diagrams and operations may be interchanged among functional blocks. Steps may be added or deleted to methods described within the scope of the present invention. 

The claims defining the invention are as follows:
 1. A method, performed by a computing device, for controlling a Digital Video Management (DVM) system, the method comprising: configuring the DVM system to operate in a normal mode of operation, whereby recordings are made manually and in response to a set of automated recording triggers; providing an incident trigger which is configured to be selectively actuated; in response to actuation of the incident trigger, defining a unique incident identifier; during a period of time for which the incident trigger is actuated, configuring the DVM system to cease operation in the normal mode of operation, and instead operate in an incident recoding mode of operation, wherein operating in the incident recording mode of operation includes applying an incident recording protocol, thereby to automatically make recordings in accordance with the incident recording protocol, wherein the recordings made automatically in accordance with the incident recording protocol include recordings that are not made automatically in the normal mode of operation, wherein applying the incident recording protocol comprises: (i) monitoring a user interaction with a DVM client thereby to identify a set of one or more cameras for which live video is being viewed by the user of the DVM client; (ii) triggering recordings of live video data responsive to the monitoring of the set of one or more cameras for which live video is being viewed by the user of the DVM client, such that a set of recordings is made that directly corresponds with what the user viewed; and (iii) associating each of the recordings made whilst in the incident recording mode of operation with the unique incident identifier and storing the recordings in association with the unique incident identifier in a database, wherein the recordings associated with the unique incident identifier are identified and retrieved from the database based on a user query including the unique incident identifier.
 2. A method according to claim 1 wherein the set of one or more cameras include a camera for which live video is displayed in a major video display object and one or more cameras for which live video is displayed in respective minor video display objects.
 3. A method according claim 1 wherein applying the incident recording protocol includes making recordings of activity at a DVM client.
 4. A method according to claim 3 wherein making recordings of activity at the DVM client includes making recordings of one or more screen images presented to a user of the DVM client.
 5. A method according to claim 4 wherein the one or more screen images define a video of what is presented to the user of the DVM client during the period of time for which the incident trigger is actuated.
 6. A method according to claim 1 wherein applying the incident recording protocol includes associating all image snapshots created at a DVM client with the incident identifier.
 7. A method according to claim 1 wherein the incident trigger is selectively manually actuated by a user of a DVM client.
 8. A method according to claim 1 wherein the incident trigger is automatically actuated in response to predefined criteria being met.
 9. A method according to claim 1 comprising providing an incident review interface via a DVM client for providing a user with access to all of the recordings associated with a given incident identifier.
 10. A Digital Video Management (DVM) system configured to perform a method comprising: providing an incident trigger; in response to actuation of the incident trigger: defining a unique incident identifier; configuring the DVM system to cease operation in the normal mode of operation, and instead operate in an incident recoding mode of operation, wherein operating in the incident recording mode of operation includes applying an incident recording protocol, thereby to automatically make recordings in accordance with the incident recording protocol, wherein the recordings made automatically in accordance with the incident recording protocol include recordings that are not made automatically in the normal mode of operation, wherein applying the incident recording protocol comprises: (i) monitoring a user interaction with a DVM client thereby to identify a set of one or more cameras for which live video is being viewed by the user of the DVM client; (ii) triggering recordings of live video data responsive to the monitoring of the set of one or more cameras for which live video is being viewed by the user of the DVM client, such that a set of recordings is made that directly corresponds with what the user viewed; and (iii) associating each of the recordings made whilst in the incident recording mode of operation with the unique incident identifier and storing the recordings in association with the unique incident identifier in a database, wherein the recordings associated with the unique incident identifier are identified and retrieved from the database based on a user query including the unique incident identifier.
 11. A DVM system according to claim 10 comprising: a plurality of camera servers, wherein each camera server is configured to make available video data from an assigned one or more video streaming units; and a plurality of video streaming units, wherein each streaming unit is configured to stream, onto a network, video data for a respective camera.
 12. A system according to claim 10 wherein the set of one or more cameras include a camera for which live video is displayed in a major video display object and one or more cameras for which live video is displayed in respective minor video display objects.
 13. A system according claim 10 wherein applying the incident recording protocol includes making recordings of activity at a DVM client.
 14. A tangible non-transitive carrier medium carrying computer executable code that, when executed via one or more processors, allows the performance of a method comprising: configuring a Digital Video Management (DVM) system to operate in a normal mode of operation, whereby recordings are made manually and in response to a set of automated recording triggers; providing an incident trigger; in response to actuation of the incident trigger, defining a unique incident identifier; during a period of time for which the incident trigger is actuated, configuring the DVM system to cease operation in the normal mode of operation, and instead operate in an incident recoding mode of operation, wherein operating in the incident recording mode of operation includes applying an incident recording protocol, thereby to automatically make recordings in accordance with the incident recording protocol, wherein the recordings made automatically in accordance with the incident recording protocol include recordings that are not made automatically in the normal mode of operation, wherein applying the incident recording protocol comprises: (i) monitoring a user interaction with a DVM client thereby to identify a set of one or more cameras for which live video is being viewed by the user of the DVM client; (ii) triggering recordings of live video data responsive to the monitoring of the set of one or more cameras for which live video is being viewed by the user of the DVM client, such that a set of recordings is made that directly corresponds with what the user viewed; and (iii) associating each of the recordings made whilst in the incident recording mode of operation with the unique incident identifier and storing the recordings in association with the unique incident identifier in a database, wherein the recordings associated with the unique incident identifier are identified and retrieved from the database based on a user query including the unique incident identifier.
 15. A tangible non-transitive carrier medium according to claim 14 wherein the set of one or more cameras include a camera for which live video is displayed in a major video display object and one or more cameras for which live video is displayed in respective minor video display objects.
 16. A tangible non-transitive carrier medium according to claim 14 wherein applying the incident recording protocol includes making recordings of activity at a DVM client. 