Automated Intelligent Video Review
AIVR provides digital inspection capability across the rail network, for remote infrastructure monitoring, surveying, inspection and more. The web-based Platform hosts over 1,000,000 miles of national video data, enabling safe monitoring of the rail environment. The end-to-end solution feeds captured data from fleet installations into the Platform via the cloud.
Features
- Instant video review and replay
- Machine Learning model automation
- Measure and markup video using in browser tools
- Automatic video transmission and replay
- Remote access for viewing video from assets
- Accessible through web browser with secure login
- In browser markup and annotation for building Machine Learning models
- Collaboration within browser by marking up and communicating with team
- Export reports and marked up video
- Linked to standard and bespoke geographical systems
Benefits
- Work remotely and remove the need for site based work
- Complete planning works remotely from a browser
- Inspect completed works remotely
- Manage incidents with up to date footage, automatically transmitted
- Build Machine Learning capability through simple annotation
- Run AI and Machine Learning automatically to generate insight
- Share work securely with colleagues through online collaboration
- Train staff using easily available footage
- Generate reports including video and data to be used offline
- Integrated seamlessly with geographical data to ensure accurate response
Pricing
£100 to £100 a licence a month
- Free trial available
Service documents
Request an accessible format
Framework
G-Cloud 14
Service ID
4 9 8 7 6 5 2 5 6 7 6 7 9 3 8
Contact
One Big Circle Ltd
Barnaby Kent
Telephone: 07888679198
Email: barnaby@onebigcircle.co.uk
Service scope
- Software add-on or extension
- No
- Cloud deployment model
-
- Public cloud
- Private cloud
- Hybrid cloud
- Service constraints
- Our standard deployment is to a secure public cloud with a SaaS based subscription. We are able to deploy to a public cloud as a separate bespoke task based on your requirements.
- System requirements
- Availability of browser listed in capabilities.
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- We aim to respond to all queries within 1 working hour. Working hours are 9am - 5pm, Monday to Friday. We also have an out of hours escalation service for handling out of hours service.
- User can manage status and priority of support tickets
- No
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- No
- Onsite support
- Yes, at extra cost
- Support levels
- As standard we provide email and telephone support during business hours. We provide heightened support on request and also further technical consultancy and account management tasks.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Online training is available by booking a session. Online help guides and FAQs are available. In person training can be arranged if circumstances dictate necessity.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- Users are able to download data and footage throughout the subscription period. Captured data can be transmitted over the course of the contract to a separately specified cloud location. If the client wishes to have all data exported at the end of a contract separately to the methods above this can be agreed during the contract.
- End-of-contract process
- Users are reminded 3 months before contract end and asked if they would like to renew. Regular meetings are generally held with customers to determine the procedures due at the end of the contract and the manner in which they can be handled.
Using the service
- Web browser interface
- Yes
- Supported browsers
-
- Internet Explorer 11
- Microsoft Edge
- Firefox
- Chrome
- Safari
- Opera
- Application to install
- No
- Designed for use on mobile devices
- Yes
- Differences between the mobile and desktop service
- A limited version of the service will run on mobile browsers
- Service interface
- Yes
- User support accessibility
- None or don’t know
- Description of service interface
- An administrative user is able to login and view service status of their deployed devices and the manner in which they are being used.
- Accessibility standards
- None or don’t know
- Description of accessibility
- AIVR is centred around playing back, viewing insight and collaborating with video in the browser. This means it is an advanced website and without viewing the video it is not possible to get the full value from the product. We have endeavoured to ensure that if the user is able to view video the remainder of the interface is as simple and accessible to use as possible, including tool tips and text alternatives.
- Accessibility testing
- Testing has been completed when AIVR has been used as part of a wider application and a provided a set of material that can be used with signing partners. We plan to do further assistive technology testing on our roadmap.
- API
- Yes
- What users can and can't do using the API
- API is available for clients on request. We have a graded approach to the API to meet our clients needs rather than a public, one size fits all API.
- API documentation
- Yes
- API documentation formats
- Other
- API sandbox or test environment
- Yes
- Customisation available
- Yes
- Description of customisation
-
The customisation of AIVR comes the configurations of the type, location and insight available based on the footage that is received from multiple moving locations. We also enable the following customisation:
- Ability to annotate on images to collaborate with other staff.
- Ability to share links to footage and provide different levels of access to different users.
- Ability to create a machine learning dataset with annotated labels that can be configured.
- Ability to configure and change icons that show for different incidents.
- Ability to view, review and interact with different types of insight determined by AIVR on the footage.
Scaling
- Independence of resources
- We use horizontally scaling elastic cloud technologies, dependent on load
Analytics
- Service usage metrics
- Yes
- Metrics types
- User required metric reports supplied at agreed intervals.
- Reporting types
-
- Real-time dashboards
- Regular reports
- Reports on request
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Other security clearance
- Government security clearance
- Up to Developed Vetting (DV)
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- User control over data storage and processing locations
- No
- Datacentre security standards
- Managed by a third party
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- ‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
- Protecting data at rest
-
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Explicit overwriting of storage before reallocation
- Equipment disposal approach
- In-house destruction process
Data importing and exporting
- Data export approach
-
Users are able to export their data by selecting a section of a route and having download links emailed to them.
We are able to work with a client to ensure that data can be automatically synchronised to their own private cloud setup depending on their requirements. - Data export formats
-
- CSV
- Other
- Other data export formats
-
- MP4 Video Files
- JPEG Images
- JSON Meta Data
- Data import formats
- Other
- Other data import formats
-
- GPX files from Garmin VIRB
- GPX from GoPro
- MP4 and GPX from Drones
- Unencrypted video format from onboard video systems
- Excel or CSV instrumented insight based data from other systems
- JSON based data from other instrumentation systems
- LIDAR based data formats
- Mapping based formats for linear referencing systems
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
Availability and resilience
- Guaranteed availability
-
We run a full service desk that operates 7 days a week. We provide SLA's as following:
- Response to first line support query - 2 hours in office hours, 12 hours out of office hours.
- Response to security patches or bugs - 48 hours.
- Response to critical service affecting incident - 30 mins in office hours. Up to 6 hours out of office hours.
Our platform as currently not experienced any service affecting issues after 12 months of continual operation. We are able to provide a bespoke service agreement for clients if they require additional capability or refunds for not meeting certain SLAs. - Approach to resilience
-
Our service utilises one of the large cloud providers and takes advantage of a number of the resilience services provided including:
- Data automatically backed up and sharded across nodes.
- Horizontally scalable services and applications that dynamically respond to load.
- Secure and resilient authentication and access control.
In addition to these services we also utilise industry standard software development and deployment techniques for ensuring resilience and quality in an evolving product.
Further information on system architecture and security policy is available on request. - Outage reporting
- A dashboard is provided to show usage of platform and also any outages. We also provide messaging systems utilising an API and email alerts to inform of any outages.
Identity and authentication
- User authentication needed
- Yes
- User authentication
-
- 2-factor authentication
- Username or password
- Access restrictions in management interfaces and support channels
- Contact management principles are applied to verify identity in support channels. Management interface is restricted by user type (and the user requires login credentials)
- Access restriction testing frequency
- At least once a year
- Management access authentication
-
- 2-factor authentication
- Username or password
Audit information for users
- Access to user activity audit information
- Users contact the support team to get audit information
- How long user audit data is stored for
- Between 6 months and 12 months
- Access to supplier activity audit information
- Users contact the support team to get audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- No
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- No
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- No
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
- Other
- Other security governance standards
- We are a Cyber Essentials Plus organisation and have been working on our ISO27001 ISMS since Jan 2024 which we aim to complete by August 2024.
- Information security policies and processes
-
Each employee signs an agreement which contains information around confidentiality and security. We hold regular training sessions to ensure that any security issue can be identified and then raised immediately with the Chief Technology Officer or designated person in their absence. The CTO has full authority to take any steps necessary if the issue reported needs immediate investigation and remediation.
Our automated systems trigger in our messaging tools and dashboards to ensure that any issues are flagged and need to be identified and resolved. If they are not they are automatically escalated to a more senior manager.
Operational security
- Configuration and change management standard
- Supplier-defined controls
- Configuration and change management approach
-
Change management is completed through our software development and configuration control tools. Changes are discussed during bi-weekly sprint planning and estimation sessions. Work is then tracked and tested during sprints. We deploy any chances to our staging environment where it is tested before being deployed to our production environment.
All changes to software and configuration are able to be rolled back if any issues are identified. - Vulnerability management type
- Supplier-defined controls
- Vulnerability management approach
-
Vulnerabilities are identified by the following techniques:
- Automated internal tools alerting an engineer.
- Externally relevant security alert from relevant mailing lists or industry publications.
- User generated alerts.
Any potential issues will be raised on a daily meeting aside from urgent issues which will be raised immediately on internal messaging tools. Staff are encouraged to raise any concerns immediately and a more senior member will assess the threat level. Ultimately the CTO will decide the threat level. Patches can be deployed immediately if the threat level is sufficiently high. - Protective monitoring type
- Supplier-defined controls
- Protective monitoring approach
-
Monitoring systems detect any unusual behaviour and these are made available to our service team. We also run a routine manual check to ensure integrity of the system.
Our team are also trained to identify whether any user reported problems maybe a potential compromise.
All staff are trained to immediately raise any concerns that there has been a compromise and alert other team members to implement a resolution plan. The CTO will be notified of any compromise and manage the resolution. - Incident management type
- Supplier-defined controls
- Incident management approach
-
Common events are handled using our service management tool. This ensures that common events can be handled via pre-approved canned replies that are sent to users. Cases are kept open and managed until completion.
Users are able to report incidents via a dedicated support email, telephone line or instance message tool available on the website.
Monthly reports of incidents and their resolution are made available to the management team and ultimately CTO.
Secure development
- Approach to secure software development best practice
- Conforms to a recognised standard, but self-assessed
Public sector networks
- Connection to public sector networks
- No
Social Value
- Social Value
-
Social Value
- Fighting climate change
- Covid-19 recovery
- Equal opportunity
- Wellbeing
Fighting climate change
AIVR reduces the need for site visits, eliminating the associated road travel to site, which has a large impact on reducing carbon emissions. Using AIVR to detect faults and plan proactive maintenance improves the reliability of the rail network, encouraging the use of rail transport by the public. Uptake of sustainable mass transit is key to hitting net zero carbon targets. Additionally, the benefits also apply for use in rail freight - which produces 76% less CO2 per ton than road freight.Covid-19 recovery
The pandemic restricted rail workers from visiting site, highlighting the need for remote imagery. AIVR allows for the rail network to be efficiently and remotely navigated - this ability to work remotely provides health and safety benefits to rail workers. Partners of One Big Circle have predicted that using AIVR can reduce overall site visits by 40%, in addition to the necessary road travel, which can be a high-risk activity for shift workers.Equal opportunity
One Big Circle is an equal opportunities employer and ensures all suppliers are reviewed against the company's modern slavery policy. One Big Circle also sponsors awards and organisations that promote equal opportunity such as the Rugby Black List promoting the celebration of Black Rugby players achievements.Wellbeing
The contract workforce for the AIVR product has their mental and physical health supported in various ways by One Big Circle. Policies include flexible working hours, one day of working from home per week (or more for those with children, or other caring or personal needs), and health and life assurance. There is also a cycle to work scheme in place to encourage healthy, carbon free commuting. Staff are also encouraged to participate in fundraising activities - previous examples of company wide efforts include Dragon Boat racing and tag rugby.
Pricing
- Price
- £100 to £100 a licence a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- For new companies, we provide full Access and Support for 2 Weeks (10 working days)