
immediate environment. If you tell him which direction you’re heading, he can
“preview” the path by checking on the surveillance cameras along the way to make
sure it is safe to proceed. If not, he may suggest an alternate route. A service like this
may last between five minutes and half an hour or longer. And it can be called upon
anytime, anywhere.
The concept of
VIRTUAL PERSONAL SECURITY, as depicted here, is centered on the
keyword virtual, which implies that the service provider and its recipient don’t have
to be physically together in the same place at the same time. Instead, the co-presence
is created by the seamless integration of three different technologies: location-aware
mobile devices, fixed-location, Web-enabled surveillance cameras, and Web Services.
The mobile device (i.e., PDA or cell phone) is the real-time personal locator. The
exact locationing mechanism and the accuracy may vary depending on the specific
type of devices being used. For example, most cell phones use a combination of GPS
and cell-based triangulation, and their accuracy ranges from 5 to 50 meters. Most
PDAs, in contrast, use 802.11 signals to pinpoint the location of the device holder. Its
accuracy can reach as high as one meter in outdoor settings [6]. Besides locationing,
the mobile device also serves as the primary interface between the user and the
service provider. To that end, it supports wireless voice and data. The voice channel is
important in that it provides the remote service provider auditory clues (i.e., “ears”) to
the user environment.
The surveillance camera is the situated “eyes” for the security service provider,
allowing them to see remotely what is happening in real-time. Since the recipient is
constantly moving, the key here is to be able to quickly determine and select which
cameras to view. Since the application knows the real-time location of the recipient,
and that each surveillance camera also publishes its own coordinates and orientation,
the application can automatically determine which cameras are relevant at any given
moment. As the recipient moves, the views are shifted from one camera to another.
Depending on the camera density in the area where the recipient happens to be, and
the service provider selected, multiple camera views can be supported at the same
time. This ensures that most or all directions of the scene are covered.
The third enabling technology is Web Services, or more specifically, the Universal
Description, Discovery, and Integration (UDDI) [7]. In a nutshell, Web services are a
set of open standards (e.g., XML, SOAP, UDDI) that enable applications of different
sources (e.g., languages, platforms, and organizations) to automatically find, link and
interact with one another over the Internet, sharing data and performing tasks, all
without human intervention. As the name implies, UDDI provides a standard
framework for application publishing, discovery, and dynamic integration. At its core
is a registry that contains detailed descriptions of businesses and services. UDDI
specifies an API that allows programmatic publishing and searching in this registry.
Underlying the virtual personal security application are two UDDI registries:
surveillance cameras and security service providers. Each geo-coded surveillance
camera has an entry in the first registry, and each entry contains information like
camera type, coordinates, orientation, owner, and possibly price. Each security service
provider maintains an entry in the second registry, which provides detailed
specifications about the service, including current availability, price, and interface
details required to invoke the service. Given the user’s requirements and location, the
application makes use of the standard UDDI API to discover the right service
142