Vigil Technologies is revolutionizing the way safety and security is approached in the industry.
The Vigil system may contain multiple wireless network sites and user interfaces. Each of these sites can be made up of multiple devices: Access Points (APs) and Personal Notification Nodes (PINs) which can be monitored through the Vigil User Interface. The APs communicate with the gateway either directly or through other devices (multi-hop). When one device fails, other devices are used to restore communication in the affected part of the network. The server and the GUI can be deployed on a local computer or in the cloud.
Vigil’s core technology is a spatially distributed wireless network that can be quickly and cost-effectively deployed in all environments including “off the grid” where no electrical infrastructure exists. The wireless network enables the real-time management of sites, equipment, and environmental conditions dispersed over a geographic area providing real-time situational awareness. The enterprise system may contain multiple wireless network sites and user interfaces.
Each of these sites can be made up of multiple devices: Access Points (APs), Personal Notification Nodes (PINs) and in-field sensors (IFS) all of which are monitored through the Vigil User Interface. If any device fails, other devices are used to restore communication in the affected part of the network to ensure robust and reliable coverage and minimize downtime.
Each site can be composed of multiple modules, containing a set of stationary routers (APs) and gateways (GIPs) which potentially allows for unlimited site size coverage.
The system can have multiple wireless network sites and multiple graphical user interfaces (GUIs). The server and the GUI can be deployed either on a local computer or on the cloud.
The system can be deployed in any environment, indoors or outdoors.
APs can communicate with the gateway, either directly or through other nodes (multi-hop). When one device fails, other devices are used to restore the communication path to the affected part of the network.
Vigil uses state of the art mesh networking architecture to connect the devices that constitute the communication backbone of the system. The wireless mesh network architecture significantly extends the size and efficiency of coverage in rugged environments.
The Vigil system can also be deployed using existing networking protocols. Mesh network sites are connected to a server through a wireless (or wired) connection. The server hosts a database aggregating the system’s information: user data, access rights, and event reports, which can be accessed through the map-based graphical interface.
Stationary and mobile nodes are combined into a single comprehensive system. Stationary Access Points (APs) communicate with the gateway either directly or through other devices. The system may contain hundreds of sites and thousands of devices all controlled and monitored from multiple GUIs.
The system can be deployed in remote sites and “off the grid” locations where no electrical infrastructure exists. This allows the system to be easily adapted for a variety of industries including mining, exploration, military, airports, and medical facilities.
The server hosts a database aggregating the system’s information: user data, access rights, and event reports, which can be accessed through the map-based graphical interface. Data management and reporting provides site monitoring, time on site data collection (accountability), asset monitoring, and incident management. This information is used for regulatory compliance as well as security, safety, and value management.
Reducing energy consumption of battery-powered devices is essential to extending operating life, reducing cost, and increasing reliability. Vigil products are developed with smart power reduction and energy management that enhances overall system operation and dynamically adjusts the trade-off between energy consumption and performance.
Sensitive environments require limiting access to certain assets and areas on a site. However, the inclusion of fences and gates increase cost and affect operations. By utilizing personnel identification monitoring and virtual fencing, the system allows for real-time notification of intruders without impacting business including in temporary applications.
All devices can be fully configured and updated remotely without needing direct access to the equipment, which is crucial for remotely deployed systems.
Zones with corresponding assigned PINs can be defined with different access levels and authorities. This feature is useful for access control and during an evacuation, where a list of personnel present at the muster station is provided in real-time through the user interface.
Knowing the location and identity of an individual and/or asset allows for a more efficient allocation of resources, which in turn, reduces risk and operating costs. Its also provides life-saving information in the event of an emergency. Vigil has developed a unique localization method that can extract the most pertinent components of a person’s identity and location reliably and efficiently.
Providing mass notification and emergency communication for a user, site, and working area is essential. The system can relay a complete situational assessment and provide appropriate recourse to handle emergencies that may arise. In the event of an evacuation, the system uses route signalization to direct personnel to muster stations. Additionally, the real-time localization network allows precise personnel location which can be used for missing or downed person reporting.
When activated the nodes automatically enroll on the network and the system use localization methods to determine their coordinates on the ground. This information is displayed on the graphical user interface which is used to display and edit the functionality of the devices (e.g. the attached sensors) through dialogue lists and menus.
Each device in the system can be set to report its status periodically. The status messages are used to update device records in the database which includes device identity, timestamp, voltage supply level (battery or grid), temperature, and sensor operation.
The devices are equipped with an accelerometer to monitor its position. When a change in position is detected, e.g. an intruder attempts to tamper with the device, an alarm message is generated and is immediately displayed on the GUI.
Portable Identification Nodes (PINs) are wearable devices used to identify people and assets in the GUI as well as monitoring accountability and location tracking. PINs are equipped with a variety of sensors enabling data collection and alarm generation such as duress, man down, and fall detection. The PIN devices can also be used to provide access to restricted zones, open doors, or activate machinery.
Access Point devices can be equipped with intrusion sensors. When the intrusion sensor is triggered, the MAP device verifies the identity of intruder. If an authorized PIN device is detected in close proximity, the intrusion is discarded. If no authorized PIN devices are detected in close proximity, then an alarm message is generated and communicated to the server. This feature enables continuous intrusion detection even with authorized personnel on site.
The Vigil system can be deployed with no prior planning or configuration making it cost-effective and the ideal solution for temporary, changing, or mobile sites.
Vigil equipment is compatible with practically any hardware and can be layered on any existing radio frequency due to universal protocol.