EP2393071A2 - Peripheral device that connects to home alarm systems and serves the global protection of an opening through magnetic switches and motion sensors - Google Patents
Peripheral device that connects to home alarm systems and serves the global protection of an opening through magnetic switches and motion sensors Download PDFInfo
- Publication number
- EP2393071A2 EP2393071A2 EP11386009A EP11386009A EP2393071A2 EP 2393071 A2 EP2393071 A2 EP 2393071A2 EP 11386009 A EP11386009 A EP 11386009A EP 11386009 A EP11386009 A EP 11386009A EP 2393071 A2 EP2393071 A2 EP 2393071A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- alarm
- window
- door
- motion sensors
- magnetic switches
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/08—Mechanical actuation by opening, e.g. of door, of window, of drawer, of shutter, of curtain, of blind
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/008—Alarm setting and unsetting, i.e. arming or disarming of the security system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/018—Sensor coding by detecting magnitude of an electrical parameter, e.g. resistance
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
- G08B29/18—Prevention or correction of operating errors
- G08B29/183—Single detectors using dual technologies
Definitions
- This invention constitutes a peripheral device that connects to the control center of a home alarm system and aims in detecting conditions of a breaking through a door/window. It combines information from two motion sensors and two magnetic switches.
- the purpose of the invention is to close in security gaps that exist in the method of perimeter protection using magnetic switches and help the residential alarm systems become more user-friendly.
- the advantage of this invention is that it fills in all the security gaps of the method of perimeter protection of a house with magnetic switches, in a single integrated solution.
- the device monitors the magnetic switches, the glass of the window and simultaneously detects the presence of additional magnetic fields that have enough strength to disable the magnetic switches.
- it is too small not to cause visual disturbance of the tenant and gives the opportunity to have the alarm system constantly armed without trapping the occupants inside the house.
- It also allows to change the alarm triggering conditions through manipulations on the existing keyboard of the control center. So when the owner wishes for example to sleep, he can convert the security system to a conventional one that any manipulation of a door/ window will cause an alarm. Finally it protects itself from potential short circuit using a built in terminal resistance.
- the device For the construction of the device, low cost materials can be used making it widely accessible to the public. The installation is very easy even in homes that already have alarm systems, without a change in the control center, the magnetic switches, or the wiring. The device is placed inline the course of the wires from the control center to the magnetic switches.
- the software of the device will signal an alarm when a human body crosses from outside to inside the house. Due to the great benefit of specialization to detect human body infrared radiation the system does not fail to detect a break in (high sensitivity), and does not give false alarms (high specificity). These two features cannot be attributed to the existing glass breaking detecting devises.
- Magnetic switches (8) and (9) are discrete.
- the first one (8) is installed to the outer construction(shutter) that closes a window and it is connected only to terminal (14).
- Respectively switch (9) which is installed to the inner construction which carries the glass is connected to the terminal (15).
- the switch (10) is one or more magnetic switches connected in parallel with the port (25).
- the main program runs (37) the permissible status of the switch is open.
- the microprossecor causes an alarm.
- the fig 4 A presents two different ways of installing the magnetic switch (10), which may coexist if one installs two magnetic switches connected in parallel with the port (25).
- the switch (10) is placed in proximity to the switch (9),in such a distance that is not affected by the field of the magnet.
- a burglar with simple means such as a compass, could detect the location of bogie magnet switch (9) and therefore the switch itself.
- Administering a strong magnetic field from the outside of the home will take the switch (9) out of order, but it will cause the closure of switch(10) and thus cause an alarm.
- switch (10) and magnet (27) are to place them in such a relationship in order that during the opening of the closed construction, they will come into close proximity and the originally open switch (10) will close and cause an alarm.
- the arrow indicates the course of the opening. So even if someone succeeds in disabling switches (8) and (9), as the door/window opens the switch (10) will inevitably detect the magnet (27) and the alarm will go off.
- the advantages of using this method is that unlike the switches (8) and (9), the switch (10) is not detected from the exterior and it is protected by the motion detector (18). Alternatively instead of a reed switch, a hall effect sensor can be used too.
- the relay (20) is connected in series to the terminals that accept the wires of the zone, in a normally open (N.O.) condition. So when the device is not powered, the zone (13) of the control center is opened. When the processor (23) closes the relay (20) and therefore the zone (13), with energy expenditure, it holds them closed until there is a condition that breeds an alarm. In this case the signal to relay (20)comes to zero and it returns to its original normally open status opening the zone (13) of the control center.
- the operating principle of device as shown in the drawing 4B is the following: the microprocessor (23) which controls the relay (20), opens the zone (13) of the control center (11) thus causing alarm.
- the microprocessor (23) is equipped with software that allows the user to select the appropriate function of the device that best meets his/her needs by changing the settings of the jumpers (21).
- Each program requires different conditions to cause alarm (opening zone by the relay) and therefore provides the user with different permissions and therefore of a different' quality 'or 'level' of protection.
- Each program may use a different number of sensors (one, two, or even any) as well as different number of peripherals (one or two magnetic switches, with or without sensor for magnetic fields).
- the final number of rights and protection parameters e.g. glass protection, protection against magnetic fields
- the final number of rights and protection parameters e.g. glass protection, protection against magnetic fields
- FIG 5A a variation of the device is displayed that targets to more demanding users. It can be installed as a peripheral device in control centers which support dual end of line resistor (dual end-of-line resistor, DEOL). As it is described below, this device variant has two relays and enables users to modify the conditions causing alarm, of all the peripheral devices that are installed in home, by handling the keyboard of the control center.
- the operating principle of the DEOL resistance is shown in draft 5. So far, the aim of this circuit was the omission of cabling for the device's tamper, resulting in a saving of time and materials during the installation of an alarm system. Opening the switch 1 ( fig 5 B) implies a violation of the tamper.
- the relay (20) binds only in a normally open condition, while the relay (29) can be connected in both ways, N.O. and N.C..
- the existence of the relay (20) does not preclude the tamper switch (16) which can be connected in series.
- the conditions under which the relay (20) or the relay (29) are opened/closed, are programmed in the microprocessor, again with different subroutines which can be defined by the user. So potential scenarios that can occur are the following: 1) relay (29)opens each time a door is opened despite the triggering of the motion sensors, while the relay (20) is opened only when a door/window is opened from the exterior of the home or when there is an excitation firstly of the detector (18) and then of the detector (17).
- the device has a slot (30) for re-programming.
- This enables the demanding user or the installer, to design his own solution to protect an opening, which will be implemented by the developers of the company which will manage the invention. Due to the existence of this slot (30), on site programming can be made in case the current program/subroutines do not meet the user's desirable level of protection.
- the daily selection of alarm conditions is made from the keyboard of the central alarm system by enabling or disabling the tamper protection and the arming or disarming the system.
- this option offers unlimited flexibility, which makes the device able to adapt to the wishes of the residents regarding the conditions causing alarm when the system is armed or when not. Furthermore , there is a port (31) for connecting two devices together. The interface is required in cases of large openings as in the drawing 5C. In this case the installation of the devices varies in the extent that only one of the two devices is connected to the control center (11), while the two devices are linked with cables (32).
- Drawing 6 displays in the form of a flow chart the main program of the device that is common in any setting of the jumpers.
- the switches' condition is checked (initial control) (33).
- Compulsory conditions for the continuation are a) at least one of the two magnetic switches located on the window glass (9) and the shutter (8) is closed (34) and b)switch (10) does not detect a magnetic field (35). These conditions ensure that the door or window is closed and that the installation of the device's magnetic field sensor (10) was not placed in proximity to the magnetic switches (8), (9)so as to detect the fields of the coupled magnets and is therefore ineffective.
- the relay (20) does not close the zone (13) and thus a fault zone is displayed on the keypad of the control center. If both conditions are met the relay closes the zone (36) and the device goes to the main function (37).
- the microcontroller then stores (38) the condition of magnetic switches (8) and (9) and then keep comparing it with the current one(39). Any change will bring an alarm. Alarm goes off also if the switch (10) is found closed. Having established that there is no alarm treaty from the magnetic switches the system checks the motion sensors and if there is an excitation (40),it calls the subroutines that has been preselected by the user by adjusting the jumper's settings (21). Indicatively, some of the subroutines are analyzed in the following paragraphs.
- alarm can occur either by changing the state of switches or by certain patterns of motion sensors stimulation.
- the conditions causing alarm by motion sensors are: a) stimulation of the sensor (18) with a duration above a predetermined value, and b) Sequential stimulation of the first sensor (18) regardless of its duration and then of the sensor (17).
- FIG. 7 This drawing shows the way in which the microcontroller processes the signals received by the two motion sensors in order to detect the presence of alarm conditions (eg breakage of glass or breach of the shutter).
- This subroutine is called since at least one of the two structures are closed and the state of the switches is the same as the saved one . Alternatively it can be called only when the glass is closed.
- the sensor (17) is used so that no false alarm occurs whenever a tenant is approaching the door/window from the interior of the house. Under certain conditions both sensors can cause an alarm. Of the two, however, only (17) can inhibit the alarm caused by sensor(18). So starting from where the two sensors are initially inactive and sensor (18) stimulation occurs which lasts over a predetermined time (41), an alarm is caused.
- the device continues its operation with the main program (37). If immediately after stimulation of sensor (18), sensor (17) is activated, the alarm goes off(43) regardless the duration of the stimulation of sensor (18).
- the stimulation (44) of the motion detector (17) when preceding the stimulation of sensor (18) inhibits the alarm. It also inhibits the alarm caused by the change of state (45) of the magnetic switches (8,9,10).
- the detector (17) causes an alarm, only when its stimulation follows the stimulation of sensor(18).
- This way of protecting the glass through two motion sensors which inhibit or confirm each other depending on their exciting sequences, is innovative and highly reliable in its operation, because it does not give false alarms and it does not fail to detect the movement of the human body in such a short distance from the devise's detectors.
- this invention is a system for detecting human body movement (since infrared detectors are designed to be stimulated by the body temperature) and is therefore fully specialized to detect the violation.
- FIG 8 This subroutine assigns more rights to the user.
- the alteration lies at the point (46) of the chart. Stimulation of the detector (17) allows the user not only to approach the door/window but it gives him the right to change the status of the switches and even leave them both open (47). In other words, it entitles him to open the closed construction and leave it open.
- the microcontroller (23) holds the relay (20) closed and so no alarm is triggering from the control center.
- a variation can be referred to, as the change of the status of switches should be allowed to follow a specific sequence (48) which suggests motion from the inside of the house to the outside. Therefore the window glass (6) should be opened first and then the shutter (7).
- the first subroutine can be used in door/windows which are opened by an electrical mechanism, while the second can be used for the simple ones that are opened by the tenant.
- the device goes into a standby mode while keeping the zone closed.
- at least one of the two switches (8), (9) is closed, it continues the execution of the main program (37). In practice this means that with the central system being armed, the tenant is allowed to approach a door (from the interior), open the glass or /and the shutter and then close them again in any combination or leave them open for long as he wishes.
- FIG 9 As far as the implementing protection is cocerned, dr. 9 is the same with dr. 8 except that an additional right is granted.
- the user while stepping out of a door, may close the opening behind him.
- the device awaits the closed construction to be opened from the outside of the house (49). If the tenant is leaving home and he wants to activate the protection with him being outside of the house, he can perform a particular pattern of opening and closing of the closed structure (open and then close within a few sec). After this handling any attempt to open the door from the outside of the house will cause an alarm.
- the device should be powered from the control center's terminals that give power only when the alarm system is armed. So when arming the central system, the devices that monitor open door/windows, will give a fault zone signal to the alarm keypad.
- FIG. 10 This subroutine demands 2 conditions in order to be called :a) Switches (8) and (9) is open and b) the tenant must push the button on the surface of the device or alternatively close the switch (10) when opening the door/window while the sensor (17) is triggered.
- Another way to start the subroutine is to detect a specific pattern of an open-close movement of the closed structure (open-closed-open of the door/window in specific time). By using this pattern the window or the door are used as function buttons of the device.
- the system detects whether a passage from the outside to the inside of the house has happened and in that case the alarm sounds.
- the scenario covered by this drawing is as follows:
- the tenant intending to renew the air of the house, opens the doors or the window closes and reopens it to the desired range.
- Figure 11 shows another function of the devise that provides security even when the doors are completely open and the tenant can pass freely to the outside and inside of his home.
- the initial choice of the function is made by the jumpers settings and it is called at the point 47 of the drawing 8.
- Each time the device detects conditions of a passage to the exterior of the house adds a value of 1 to a variable X, whose starting value is 0.
- the value of X is checked. If it is found less than 0 the alarm goes off. The subroutine continues until one of the switches (8) and (9) is closed.
- Figure 12 describes an operation without the use of infrared detectors. In this case fewer protections exist (not glass protection) as well as fewer rights (the user can not open both structures ,glass and shutter or either one if the other is already open).
- This chart shows the function of a more economic version of the device, without the motion detectors. This device provides the sole right to open the window glass when the shutter is closed. It also protects itself from external magnetic fields and from malicious short circuit
Abstract
Description
- This invention constitutes a peripheral device that connects to the control center of a home alarm system and aims in detecting conditions of a breaking through a door/window. It combines information from two motion sensors and two magnetic switches. The purpose of the invention is to close in security gaps that exist in the method of perimeter protection using magnetic switches and help the residential alarm systems become more user-friendly.
- Today, magnetic switches are used in most home alarm systems for the protection of the perimeter. Referring to the advantages of this method we can cite the low cost, the reduced maintenance requirements, the longevity of switches, the reliable functioning, as well as the ability to provide protection while the occupants are inside their home. Major drawbacks are the significant security gaps and that they do not provide the distinctiveness of the location from which the door/window is opened. As a result these sytems do not provide full protection against burglary and they also trap occupants inside their home.
- There are already several patents in which motion detector signal processing is made in order that these devices become more reliable and the false alarms will be reduced. In such cases, the signals from the detectors operate in supporting one another to cause alarm. According to our knowledge there is no device in which a signal from a motion sensor can be either supportive or suppressive to the signal from the other sensor, depending on the sequence of stimulation. The combination of a motion sensor which suspends an alarm signal caused by magnetic switch opening exists in
JP2170298 JP2170298 - Although alarm systems had an explosive development in recent decades, concerning the technology and their capabilities, the undercurrent philosophy has remained constant, even though the requirements are no longer the same. The role to be played by residential security systems is different from that 30 years ago when their dynamic development begun. In the 1980s, most cases of burglary were happening when the occupants were absent, and therefore the purpose of a security system was the protection of home during that period. In the 1990s the cases of burglary in which the occupants were inside their home, but were dormant, increased considerably. In 2010, the incidences of burglary with the occupants being inside their homes, awake, are multyplying. This happens probably because it is chosen deliberately by the burglars as they know that the alarms will be disabled. Many times these break-ins are combined with criminal acts. Now we believe that the role played by alarm systems is more important than ever. So on, their mission will be to protect the lives and the physical integrity of the occupants. In modern cities with strong social problems such as unemployment and illegal immigration, crime indices will constantly keep on growing. Citizens are invited to live their lives with their security systems armed. Consequently, the last should be made more user-friendly, in the sense that it should not cause impediments in every day life. The tenant should not be treated by the alarm system as a burglar ie door opening → alarm. This relationship should be changed to door opening from a burglar →alarm and door opening from the occupant→ wait until the door is closed again. Therefore an ideal alarm system shall be able to distinguish the owner from a burglar. Up to a certain extent this is feasible with this invention, as the burglar opens a door from the exterior of the house and the occupant usually from the interior.
- The method of protection via magnetic switches, while the most commonly used way of protecting homes, suffers from significant security gaps. So this method is vulnerable to following ways violation. 1) Effect of external magnetic field: the impact of a strong magnetic field, through an electromagnet from the outside of the window, can keep the switches closed even if a violation occurs. After the burglary, the door is closed and the magnet is removed. To resolve this problem, the balanced magnetic field switches are used in high-security applications . The disadvantages are the large size, the cost, and that they require perfect alignment during mounting, which if lost due to damage from use, they stop working. 2)Short-circuit: When the shutter of the window is open, the cables connecting switches to the control center may be exposed. Short circuit at this point can take switches out of the circuit. Solution to this problem are the switches with built-in terminal resistance which are costly. 3) Breaking the glass and pass through it without opening the construction: to address this problem using other peripherals such as vibration detectors and glass breaking detectors with sound. Both these devices under conditions can cause false alarms (e.g. the vibration sensor when a heavy vehicle passes near the house), or may fail to detect breaking (e.g. the breaking Detector with sound in a very noisy environmentor or when the burglar cuts the glass of the window). From the above we realize that even though various technical solutions have been found, there is no device that would solve the issue of protection of an opening intergrately, and without drawbacks of the individual solutions above.
- The advantage of this invention is that it fills in all the security gaps of the method of perimeter protection of a house with magnetic switches, in a single integrated solution. Specifically, the device monitors the magnetic switches, the glass of the window and simultaneously detects the presence of additional magnetic fields that have enough strength to disable the magnetic switches. Furthermore, it is too small not to cause visual disturbance of the tenant and gives the opportunity to have the alarm system constantly armed without trapping the occupants inside the house. It also allows to change the alarm triggering conditions through manipulations on the existing keyboard of the control center. So when the owner wishes for example to sleep, he can convert the security system to a conventional one that any manipulation of a door/ window will cause an alarm. Finally it protects itself from potential short circuit using a built in terminal resistance. For the construction of the device, low cost materials can be used making it widely accessible to the public. The installation is very easy even in homes that already have alarm systems, without a change in the control center, the magnetic switches, or the wiring. The device is placed inline the course of the wires from the control center to the magnetic switches. Making use of cheap and small-sized magnetic traps, which can be installed in such a way as to be invisible from the inside of the home, it provides protection similar to the huge balanced magnetic field traps with built-in terminal resistance, which because of their deformity, they are no more used in homes and they have found application in closed cabinets and safes. Furthermore regarding the protection offered to the glass, it is certainly higher than the protection of the sound or vibration sensors because it is not affected by noise or vibration. The software of the device will signal an alarm when a human body crosses from outside to inside the house. Due to the great benefit of specialization to detect human body infrared radiation the system does not fail to detect a break in (high sensitivity), and does not give false alarms (high specificity). These two features cannot be attributed to the existing glass breaking detecting devises.
- The innovative features of the device will be revealed through the description of the attached figures:
-
Fig 1 . This drawing presents the outer surface of the device (1) and the motion sensors (17) and (18). A special construction or a specific formulation of the surface of the box (1) of the device is marked with "X" (2). The main purpose is to restrict the visual fields of the sensors so that the space that is monitored by the device is devided into two parts: in space (3) that is supervised by the the sensor (17) and space (4) that is supervised by the sensor (18). There is no point in space that is monitored by both motion sensors. -
Fig2 . The drawing shows the functional orientation of the device. Space (4) involves the largest possible surface of the glass (of the door/window), while space (3) extends towards the interior of the home, but it contains no point of the glass (6). So, when approaching the opening from inside the home, the tenant has to pass through space (3) firstly and space (4) secondly. Consequently the sensor (17) is triggered first and sensor (18) second. -
Fig3 . The drawing presents schematically the interconnection of electronic components inside the device (the standard model), as well as the interface with the control center (11) of the alarm system. The device consists of a microcontroller (23), two infrared motion sensors (17) (18), a relay (20), a led (22),a button (19), jumpers (21), a terminal resistor (end-of-line resistor, EOL) (24), a tamper switch (16) (for protection of the box for the device)and other elements necessary for the support, interface and the proper functioning of the above-mentioned items. The device is wired with : a) The zone wires from the control center (11). b) The power cables(12) that come from the alarm's control center (11). C) The 24 hours zone cables that support the tamper(16). d) The magnetic switches that are destined to the window glass and the shutter of the opening (8), (9) and (10). Looking at thedrawing 3 we realize that the necessary wiring for the connection of the device to the control center consists of 4 cables, from which 2 are for the zone and 2 for the power. Using one cable for the negative, the necessary cables are reduced to 3. With the option of electronic components with very low consumption as low power regulator , microcontrollers with nanowatt technology and solid-state relay, the consumption of the device may be reduced to 300µA. In this case, the device can be powered directly from the zone cables which are usually operate on 3mA current without disrupting its operation. Therefore, the device can operate well with 2 cables if low-power components are selected. Wireless device variation can be easily manufactured with processor interfacing directly with a radiofrequencies subunit for encoded signal broadcast and with the addition of a power unit. - Magnetic switches (8) and (9) are discrete. The first one (8) is installed to the outer construction(shutter) that closes a window and it is connected only to terminal (14). Respectively switch (9) which is installed to the inner construction which carries the glass is connected to the terminal (15). In this way, microprocessor can distinguish when the inner or the outer contruction of a widnow is opened/closed. In drawing 3 the switch (10), is one or more magnetic switches connected in parallel with the port (25). As the main program runs (37) the permissible status of the switch is open. When the switch is closed, the microprossecor causes an alarm. In other subrutines it may have another purpose as the initiation of other subroutines (
fig 8 (47)). It can therefore be used as an additional function switch such as when it is closed after the tentant has opened both constructions from inside of the home. Thefig 4 A presents two different ways of installing the magnetic switch (10), which may coexist if one installs two magnetic switches connected in parallel with the port (25). In the first installation-way, the switch (10) is placed in proximity to the switch (9),in such a distance that is not affected by the field of the magnet. A burglar with simple means such as a compass, could detect the location of bogie magnet switch (9) and therefore the switch itself. Administering a strong magnetic field from the outside of the home will take the switch (9) out of order, but it will cause the closure of switch(10) and thus cause an alarm. The second way to install switch (10) and magnet (27) is to place them in such a relationship in order that during the opening of the closed construction, they will come into close proximity and the originally open switch (10) will close and cause an alarm. The arrow indicates the course of the opening. So even if someone succeeds in disabling switches (8) and (9), as the door/window opens the switch (10) will inevitably detect the magnet (27) and the alarm will go off. The advantages of using this method is that unlike the switches (8) and (9), the switch (10) is not detected from the exterior and it is protected by the motion detector (18). Alternatively instead of a reed switch, a hall effect sensor can be used too. - The relay (20) is connected in series to the terminals that accept the wires of the zone, in a normally open (N.O.) condition. So when the device is not powered, the zone (13) of the control center is opened. When the processor (23) closes the relay (20) and therefore the zone (13), with energy expenditure, it holds them closed until there is a condition that breeds an alarm. In this case the signal to relay (20)comes to zero and it returns to its original normally open status opening the zone (13) of the control center.
- The operating principle of device as shown in the drawing 4B is the following: the microprocessor (23) which controls the relay (20), opens the zone (13) of the control center (11) thus causing alarm. The microprocessor (23) is equipped with software that allows the user to select the appropriate function of the device that best meets his/her needs by changing the settings of the jumpers (21). Each program requires different conditions to cause alarm (opening zone by the relay) and therefore provides the user with different permissions and therefore of a different' quality 'or 'level' of protection. Each program may use a different number of sensors (one, two, or even any) as well as different number of peripherals (one or two magnetic switches, with or without sensor for magnetic fields). The final number of rights and protection parameters (e.g. glass protection, protection against magnetic fields) which are provided by the device is specified by the program chosen by the user and by the peripherals that are connected to the device.
- In
figure 5A , a variation of the device is displayed that targets to more demanding users. It can be installed as a peripheral device in control centers which support dual end of line resistor (dual end-of-line resistor, DEOL). As it is described below, this device variant has two relays and enables users to modify the conditions causing alarm, of all the peripheral devices that are installed in home, by handling the keyboard of the control center. The operating principle of the DEOL resistance is shown indraft 5. So far, the aim of this circuit was the omission of cabling for the device's tamper, resulting in a saving of time and materials during the installation of an alarm system. Opening the switch 1 (fig 5 B) implies a violation of the tamper. This constitutes an alarm condition in case which the control center is armed or when it is disarmed but the tamper protection is enabled. It is not an alarm condition when the control center is disarmed and the tamper protection disabled. When the switch 2 (fig 5B ) is opened,resistance 2 enters the circuit and the whole resistance that is measured by the control center is the summation of the two resistors EOL1 + EOL2. This is an alarm treaty only when the control center is armed. In the variation of our device, the above layout is integrated with the difference that theswitch 1 is substituted by the relay (20), while theswitch 2 is substituted by the relay (29). The two relays (20), (29) are connected with the microprocessor (23) which controls their operation. The relay (20) binds only in a normally open condition, while the relay (29) can be connected in both ways, N.O. and N.C.. The existence of the relay (20) does not preclude the tamper switch (16) which can be connected in series. The conditions under which the relay (20) or the relay (29) are opened/closed, are programmed in the microprocessor, again with different subroutines which can be defined by the user. So potential scenarios that can occur are the following: 1) relay (29)opens each time a door is opened despite the triggering of the motion sensors, while the relay (20) is opened only when a door/window is opened from the exterior of the home or when there is an excitation firstly of the detector (18) and then of the detector (17). In this case when the tamper protection is activated and the control center disarmed, there is a clever system of 24-hour protection which enables the tenants to open and close their door/windows from the interior of the home. When the control center is armed, there is a conventional system that doesn't allow any manipulation of the structures of a door/window. 2) The relay (29) opens only in the case of treaties that brings on a possible breaking of the glass of a door/window. In this case we have a 24-hour protection on magnetic contacts while the glass is protected only when the system is armed. 3) The relay (29) opens only when the door/window is open and someone passes from the outside inwards. In this case we have 24 hour protection for the glass and the magnetic contacts. When the system is armed and if a door/window is open, the conditions of transit towards the interior of the home will trigger an alarm. So even if the door/window has been forgotten open, the home continues to be protected. 4)The relay (29) is opened and remains open during the opening of the shutter. In this way, the tenant may be informed by the keyboard, when he arms the system, which openings have their shutters open. This function is particularly useful during night hours when doing the last check out at his home before falling asleep. These combinations of functions are indicative. The system is flexible enough to incorporate several more functions into the software which will be chosen according to the user protection needs by the usage of the device jumpers. Furthermore, a specific programming can be made in special cases or even the desirable program can be selected from a programs library. For this purpose, the device has a slot (30) for re-programming. This enables the demanding user or the installer, to design his own solution to protect an opening, which will be implemented by the developers of the company which will manage the invention. Due to the existence of this slot (30), on site programming can be made in case the current program/subroutines do not meet the user's desirable level of protection. Once the device is installed, the daily selection of alarm conditions is made from the keyboard of the central alarm system by enabling or disabling the tamper protection and the arming or disarming the system. So in everyday life , there are three possible choices, depending on the user's requirements for protection with the rights or prohibitions that he has selected during device's setup: 1) tamper protection disabled and alarm disarmed, 2) tamper protection enabled and 3) alarm armed. In the proceeding description of the drawings related to the operation of the device, the reference to the word 'alarm', marks the opening of the relay (20) in the basic version of the device. The opening of the relay (29) can be added to the flow charts at any point, thus creating a great number of functions, the reference of which at this point would create a multitude of drawings which would cause confusion. The purpose of the figures is to better understand the operation of the device and not to include all possible cases, which is practically impossible. Thus, this will be omitted. In practice, this option offers unlimited flexibility, which makes the device able to adapt to the wishes of the residents regarding the conditions causing alarm when the system is armed or when not. Furthermore , there is a port (31) for connecting two devices together. The interface is required in cases of large openings as in the drawing 5C. In this case the installation of the devices varies in the extent that only one of the two devices is connected to the control center (11), while the two devices are linked with cables (32). -
Drawing 6 displays in the form of a flow chart the main program of the device that is common in any setting of the jumpers. At the launch of the device the switches' condition is checked (initial control) (33). Compulsory conditions for the continuation are a) at least one of the two magnetic switches located on the window glass (9) and the shutter (8) is closed (34) and b)switch (10) does not detect a magnetic field (35). These conditions ensure that the door or window is closed and that the installation of the device's magnetic field sensor (10) was not placed in proximity to the magnetic switches (8), (9)so as to detect the fields of the coupled magnets and is therefore ineffective. If one of these conditions is not met, the relay (20) does not close the zone (13) and thus a fault zone is displayed on the keypad of the control center. If both conditions are met the relay closes the zone (36) and the device goes to the main function (37). The microcontroller then stores (38) the condition of magnetic switches (8) and (9) and then keep comparing it with the current one(39). Any change will bring an alarm. Alarm goes off also if the switch (10) is found closed. Having established that there is no alarm treaty from the magnetic switches the system checks the motion sensors and if there is an excitation (40),it calls the subroutines that has been preselected by the user by adjusting the jumper's settings (21). Indicatively, some of the subroutines are analyzed in the following paragraphs. In these subroutines, alarm can occur either by changing the state of switches or by certain patterns of motion sensors stimulation. Especially in the latter case, the conditions causing alarm by motion sensors are: a) stimulation of the sensor (18) with a duration above a predetermined value, and b) Sequential stimulation of the first sensor (18) regardless of its duration and then of the sensor (17). -
Figure 7 . This drawing shows the way in which the microcontroller processes the signals received by the two motion sensors in order to detect the presence of alarm conditions (eg breakage of glass or breach of the shutter). This subroutine is called since at least one of the two structures are closed and the state of the switches is the same as the saved one . Alternatively it can be called only when the glass is closed. The sensor (17) is used so that no false alarm occurs whenever a tenant is approaching the door/window from the interior of the house. Under certain conditions both sensors can cause an alarm. Of the two, however, only (17) can inhibit the alarm caused by sensor(18). So starting from where the two sensors are initially inactive and sensor (18) stimulation occurs which lasts over a predetermined time (41), an alarm is caused. If the duration of the stimulation is less than the one required (42) to cause alarm, the device continues its operation with the main program (37). If immediately after stimulation of sensor (18), sensor (17) is activated, the alarm goes off(43) regardless the duration of the stimulation of sensor (18). The stimulation (44) of the motion detector (17) when preceding the stimulation of sensor (18) inhibits the alarm. It also inhibits the alarm caused by the change of state (45) of the magnetic switches (8,9,10). The detector (17) causes an alarm, only when its stimulation follows the stimulation of sensor(18). - This way of protecting the glass through two motion sensors which inhibit or confirm each other depending on their exciting sequences, is innovative and highly reliable in its operation, because it does not give false alarms and it does not fail to detect the movement of the human body in such a short distance from the devise's detectors. In addition it does not have the vulnerability of vibration detectors which, as their name says, are constructed to detect a vibration and not a violation, resulting in many false alarms. Instead, this invention is a system for detecting human body movement (since infrared detectors are designed to be stimulated by the body temperature) and is therefore fully specialized to detect the violation.
-
Figure 8 . This subroutine assigns more rights to the user. The alteration lies at the point (46) of the chart. Stimulation of the detector (17) allows the user not only to approach the door/window but it gives him the right to change the status of the switches and even leave them both open (47). In other words, it entitles him to open the closed construction and leave it open. The microcontroller (23) holds the relay (20) closed and so no alarm is triggering from the control center. At this point a variation can be referred to, as the change of the status of switches should be allowed to follow a specific sequence (48) which suggests motion from the inside of the house to the outside. Therefore the window glass (6) should be opened first and then the shutter (7). With this variant, since the two structures are closed, no handling at the shutter (7), is allowed, if the glass (6) is shut, even if the sensor (17) is excited. The first subroutine can be used in door/windows which are opened by an electrical mechanism, while the second can be used for the simple ones that are opened by the tenant. When both structures (glass and shutter) are opened, the device goes into a standby mode while keeping the zone closed. When at least one of the two switches (8), (9) is closed, it continues the execution of the main program (37). In practice this means that with the central system being armed, the tenant is allowed to approach a door (from the interior), open the glass or /and the shutter and then close them again in any combination or leave them open for long as he wishes. The benefit of such a system can be perceived if one imagine a house where at each door / window one such devise is installed. In this case the residents can live with the house alarm system armed, but without them being trapped inside. They can handle their doors/windows without any restriction and as long as the protection of the house is concerned this has the following positive impacts a) the alarm system is armed for longer periods and so their homes are more protected, b) the system reads the tenant's intention to open a construction by detecting the movement toward it, and automatically it disables the protection for this opening, while the main system continues to protect the rest of the house that is not visually supervised by the tenant, c) each time the glass/shutter is closed, the protection is activated automatically, d) pointless routes toward and from the control center's keyboard are avoided for simple manipulation of the structures such as for example to open a window during a hot summer night. With this invention, residential alarm systems become really smart and in a way, they behave as they distinguish the burglar from the owner. There is no reason why the response of the alarm system to owner (who opens a window from the inside), must be the same as the burglar (who opens it from the outside) . Taking into consideration the modern practice that implies alarm systems been linked to centers that accept signals, this invention saves them from extra noise caused by false alarms for example when one forgets to disarm his system before opening a window in the morning. An example of the function of the dual terminal resistance (DEOL) device is the following: the relay (29) breaks the circuit at point 2 (47). If the system is armed the alarm sounds, if not the internal process of opening the relay remains silent. -
Figure 9 . As far as the implementing protection is cocerned, dr. 9 is the same with dr. 8 except that an additional right is granted. The user while stepping out of a door, may close the opening behind him. In this case, the device awaits the closed construction to be opened from the outside of the house (49). If the tenant is leaving home and he wants to activate the protection with him being outside of the house, he can perform a particular pattern of opening and closing of the closed structure (open and then close within a few sec). After this handling any attempt to open the door from the outside of the house will cause an alarm. - At this point it should be noted that if the installed device has one terminal resistor and the user has selected the program which gives him the opportunity to leave a door/windw open , the device should be powered from the control center's terminals that give power only when the alarm system is armed. So when arming the central system, the devices that monitor open door/windows, will give a fault zone signal to the alarm keypad.
-
Figure 10 . This subroutine demands 2 conditions in order to be called :a) Switches (8) and (9) is open and b) the tenant must push the button on the surface of the device or alternatively close the switch (10) when opening the door/window while the sensor (17) is triggered. Another way to start the subroutine is to detect a specific pattern of an open-close movement of the closed structure (open-closed-open of the door/window in specific time). By using this pattern the window or the door are used as function buttons of the device. When performing the subroutine ofFigure 10 the system detects whether a passage from the outside to the inside of the house has happened and in that case the alarm sounds. The scenario covered by this drawing is as follows: The tenant, intending to renew the air of the house, opens the doors or the window closes and reopens it to the desired range. Alternatively presses the button of the device. Then he returns to the interior of the house. From that point if someone passes from outside to inside the house, the device detects the movement and causes an alarm. So with this system, the doors / windows can remain completely open without a reduction to the home's safety. -
Figure 11 shows another function of the devise that provides security even when the doors are completely open and the tenant can pass freely to the outside and inside of his home. The initial choice of the function is made by the jumpers settings and it is called at thepoint 47 of thedrawing 8. Each time the device detects conditions of a passage to the exterior of the house, adds a value of 1 to a variable X, whose starting value is 0. When a passage from the outside inwards happens, it subtracts 1 point from the variable X. At the end of each cycle the value of X is checked. If it is found less than 0 the alarm goes off. The subroutine continues until one of the switches (8) and (9) is closed. -
Figure 12 describes an operation without the use of infrared detectors. In this case fewer protections exist (not glass protection) as well as fewer rights (the user can not open both structures ,glass and shutter or either one if the other is already open). This chart shows the function of a more economic version of the device, without the motion detectors. This device provides the sole right to open the window glass when the shutter is closed. It also protects itself from external magnetic fields and from malicious short circuit
Claims (14)
- Peripheral device that connects to home alarm systems and aims to a global protection of a door/window through magnetic switches and motion sensors, characterized in that it consists of a microprocessor (23) running protection functions according to the device's jumpers (21) settings , 2 relays (20), (29), two motion sensors, (17) (18) electrically connected to the microprocessor, sockets (14), (15), (25) for the magnetic switches (8), (9) and (10), slot (31) used to interface with another device, slot (30) used for the reprogramming of the device, an indication led(22) and a button(19) for manually activating device's functions.
- Peripheral device that connects to home alarm systems and aims to a global protection of a door/window through two magnetic switches and motion sensors (17) and (18) connected to the processor according to claim 1, characterized by the fact that these two motion sensors (17) and (18) are embedded in the device's box in such a way that their visual fields extend in opposite directions and therefore are distinct and not penetrating each other. This means that every point in space that is monitored by each of them is not included in the supervision of the other.
- Peripheral device that connects to home alarm systems and aims to a global protection of a door/window through magnetic switches and motion sensors, which is enabled with 3 sockets (14), (15), (25) for receiving magnetic switches, (8) (9) and (10) according to claim 1, characterized in that when window glass and shutter are closed, the two switches (8) and (9) are coupled with their magnets and thus closed, while the third (10) or the others that are connected in parallel with it, are not affected by any magnetic field and so they are open.
- Peripheral device that connects to home alarm systems and aims to a global protection of a door/window through magnetic switches and motion sensors, which has two relays (20), (29) associated with the microprocessor (23) according to claim 1, characterized by the fact that both relays lay in a special circuit so that relay (20) operate as a zone's (13) circuit breaker while the other (29) is connected in parallel with a resistor (28) connected in series with the zone (13), and it short-circuits or not this resistor. This circuit gives three different values to the current of zone (13).
- Peripheral device that connects to home alarm systems and have two relays (20), (29), of which one (20) acts as a ciruit breaker of zone (13) of the control center (11) and another (29) connected in parallel with a resistor (28) connected in series with the zone (13) and it short-circuits the resistor or not, giving three different values to the current of zone (13) according to claim 4, characterized in that the relay (20) connected in series with the zone (13) is in a normally open condition.
- Operation method of peripheral device connected to home alarm systems that aims to a global protection of a door/window through magnetic switches and motion sensors, characterized by the installation's location (5)which is above or alongside the opening (6), (7) and by the software which is composed of a main program (37) and from subroutines (Drawing 8), and (Dr. 9), which are called from the main program when the two motion sensors (17) and (18) are stimulated.
- Operation method of peripheral device connected to home alarm systems and installed adjacent to or above a door/window according to claim 6, characterized in that at the functional direction of the device, motion sensor's (17) optical field extends towards the interior of the house, while the second motion sensor's(18) field extents towards the door/window glass. Consequently, the motion sensor (17) is stimulated by movement in the area extending to the interior of the room (3) to the range of sensor capabilities and a plane passing through the device, perpendicular to the floor or inclined towards the interior of the house, while the other motion sensor (18) is stimulated by movement in the space defined by the level above and the door/window (6).
- Operation method of peripheral device connected to home alarm systems , enabled with special software that comprises of the main program (37) and from subroutines (drawing 8) (drawing 9) which are called from the main program when the motion sensors (17) and (18) are stimulated according to claim 6, characterized in that during the execution of the main program (37), any change in condition of magnetic switches (8), (9) and (10) will cause an alarm.
- Operation method of peripheral device connected to home alarm systems, enabled with special software that comprises of the main program (37) and of subroutines (drawing 8), (drawing 9) which are called from the main program when the motion sensors (17) and (18) are stimulated according to claim 6, characterized by the fact that there are minor subroutines called by specific patterns of opening and closing of the the magnetic switches. In this way the window glass and the shutter are used as functions buttons of the device and can enable the protection even from the outside of the house.
- Operation method of peripheral device connected to home alarm systems, enabled with special software that comprises of the main program (37) and of subroutines (drawing 8), (drawing 9) which are called from the main program when the motion sensors (17) and (18) are stimulated according to claim 6, characterized in that the initial stimulation sequence with the motion sensor (17) facing the inside of the house stimulating first and the motion sensor (18) facing the glass stimulating secondly, calls the subroutine (fig.8) during which no alarm sounds when changing the condition of magnetic switches (8), (9), (10) to any possible combination. This subroutine allows the opening of the door's/window's glass and shutter which are installed with the above mentioned magnetic switches and remain in their new situation for an indefinite period of time(47).
- Operation method of peripheral device connected to home alarm systems in which the excitation sequence of motion sensor (17)which is facing the inside of the house and then the motion sensor (18)which is facing the door's/window's glass calls the subroutine (Fig.8) in which no alarm sounds when changing the state of the magnetic switches, (8) (9), (10) in any combination according to claim 10, characterized in that it allows the occupant to leave the house and close behind him the glass or the shutter, so the subroutine continues to run and in the subsequent change of the state of magnetic switches without prior stimulation of motion sensors, which happens when the tenant opens the closed construction from the exterior of the house to enter the interior (49), the alarm does not go off.
- Operation method of peripheral device connected to home alarm systems and has special software that comprises of the main program (37) and from subroutines (fig.8) (fig.9) which are called by the main program when the two motion sensors (17) and (18) are stimulated according to claim 6, characterized in that the excitation of the motion sensor (18) which is pointing to the glass without prior stimulation of the motion sensor (17) which is facing the inside of the house, causes an alarm.
- Home protection system through a home alarm control center and peripheral devices protecting openings (door/widows) via magnetic switches and motion sensors characterized by that the peripheral device collects and processes data from the associated magnetic switches, (8) (9) and (10) and built-in motion sensors, (17) (18) and if a burst treaty is found it signals to the control center (11) of home alarm system by changing the value of current of control center's zone (13).
- Home protection system through a home alarm control center and peripheral devices protecting openings (door/widows) via magnetic switches and motion sensors that change the value of zone's current according to claim 13, characterized in that if eventually the control center(11) will sound an alarm depends on whether the value of the zone's (13) current which has been modulated by the peripheral device via the operation of the relays (20) and (29), is identical to the one that control center causes an alarm . In this way the user is enabled to select the situation or situations of zone (13) which will cause an alarm by handling the control center's (11) keyboard.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GR20100100257A GR20100100257A (en) | 2010-05-03 | 2010-05-03 | Peripheral device connectable to domestic alarm systems and aiming at the complete protection of doors or windows via magnetic switches and movement-sensing elements as well as at the distinction between openings attempted from the interior or the exterior of the house |
Publications (3)
Publication Number | Publication Date |
---|---|
EP2393071A2 true EP2393071A2 (en) | 2011-12-07 |
EP2393071A3 EP2393071A3 (en) | 2012-01-11 |
EP2393071B1 EP2393071B1 (en) | 2013-05-01 |
Family
ID=44840489
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP20110386009 Not-in-force EP2393071B1 (en) | 2010-05-03 | 2011-05-02 | Peripheral device that connects to home alarm systems and serves the global protection of an opening through magnetic switches and motion sensors |
Country Status (2)
Country | Link |
---|---|
EP (1) | EP2393071B1 (en) |
GR (1) | GR20100100257A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016109335A1 (en) * | 2014-12-30 | 2016-07-07 | Google Inc. | Systems and methods of intrusion detection |
US9501924B2 (en) | 2014-12-30 | 2016-11-22 | Google Inc. | Home security system with automatic context-sensitive transition to different modes |
US9613524B1 (en) * | 2016-04-27 | 2017-04-04 | Ecolink Intelligent Technologies, Inc. | Reduced false alarm security system |
EP3082115A3 (en) * | 2015-04-08 | 2017-04-26 | Google, Inc. | Guided installation feedback for an opening sensor |
US10115297B2 (en) | 2015-03-27 | 2018-10-30 | Google Llc | Configuring a smart home controller |
RU188798U1 (en) * | 2018-10-15 | 2019-04-23 | Общество с ограниченной ответственностью "ЕХ-ПРИБОР" | Detector security magnetic contact explosion-proof |
EP3514773A3 (en) * | 2018-01-18 | 2019-10-30 | Ademco Inc. | Systems and methods for protecting a bypassed zone in a security system or a connected home system |
CN110658735A (en) * | 2019-10-29 | 2020-01-07 | 北京金山云网络技术有限公司 | Intelligent household device and system |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9945574B1 (en) | 2015-03-31 | 2018-04-17 | Google Llc | Devices and methods for setting the configuration of a smart home controller based on air pressure data |
US9396599B1 (en) | 2015-05-29 | 2016-07-19 | Google Inc. | Systems and methods for anticipatory locking and unlocking of a smart-sensor door lock |
GR1010375B (en) * | 2021-01-11 | 2023-01-17 | Κυριακος Αντωνιου Βουκαλης | Magnetic contacts management system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH02170298A (en) | 1988-12-23 | 1990-07-02 | Hiromichi Namikoshi | Intrusion alarm |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4359721A (en) * | 1978-10-16 | 1982-11-16 | American District Telegraph Company | Two-wire multi-zone alarm system |
DE3744399C2 (en) * | 1987-12-29 | 1997-03-13 | Asea Brown Boveri | Radiation sensitive switch |
GB9402500D0 (en) * | 1994-02-09 | 1994-03-30 | Mccracken James | Security system |
US5777551A (en) * | 1994-09-09 | 1998-07-07 | Hess; Brian K. | Portable alarm system |
JP4092438B2 (en) * | 1999-08-19 | 2008-05-28 | オプテックス株式会社 | Intrusion detection method and apparatus |
-
2010
- 2010-05-03 GR GR20100100257A patent/GR20100100257A/en unknown
-
2011
- 2011-05-02 EP EP20110386009 patent/EP2393071B1/en not_active Not-in-force
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH02170298A (en) | 1988-12-23 | 1990-07-02 | Hiromichi Namikoshi | Intrusion alarm |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10339773B2 (en) | 2014-12-30 | 2019-07-02 | Google Llc | Home security system with automatic context-sensitive transition to different modes |
US9501924B2 (en) | 2014-12-30 | 2016-11-22 | Google Inc. | Home security system with automatic context-sensitive transition to different modes |
US9558639B2 (en) | 2014-12-30 | 2017-01-31 | Google Inc. | Systems and methods of intrusion detection |
EP3241195B1 (en) * | 2014-12-30 | 2021-10-13 | Google LLC | Systems and methods of intrusion detection |
WO2016109335A1 (en) * | 2014-12-30 | 2016-07-07 | Google Inc. | Systems and methods of intrusion detection |
US9672705B2 (en) | 2014-12-30 | 2017-06-06 | Google Inc. | Systems and methods of intrusion detection |
EP3241195A1 (en) * | 2014-12-30 | 2017-11-08 | Google LLC | Systems and methods of intrusion detection |
US10559192B2 (en) | 2015-03-27 | 2020-02-11 | Google Llc | Configuring a smart home controller |
US10115297B2 (en) | 2015-03-27 | 2018-10-30 | Google Llc | Configuring a smart home controller |
US11967222B2 (en) | 2015-03-27 | 2024-04-23 | Google Llc | Configuring a smart home controller |
US9952029B2 (en) | 2015-04-08 | 2018-04-24 | Google Llc | Guided installation feedback for an opening sensor |
US10401138B2 (en) | 2015-04-08 | 2019-09-03 | Google Llc | Guided installation feedback for an opening sensor |
EP3082115A3 (en) * | 2015-04-08 | 2017-04-26 | Google, Inc. | Guided installation feedback for an opening sensor |
US10210748B2 (en) | 2016-04-27 | 2019-02-19 | Ecolink Intelligent Technology, Inc. | Reduced false alarm security system |
US10854069B2 (en) | 2016-04-27 | 2020-12-01 | Ecolink Intelligent Technology, Inc. | Reduced false alarm security system |
US9613524B1 (en) * | 2016-04-27 | 2017-04-04 | Ecolink Intelligent Technologies, Inc. | Reduced false alarm security system |
US11631320B2 (en) | 2016-04-27 | 2023-04-18 | Ecolink Intelligent Technology, Inc. | Reduced false alarm security system |
EP3514773A3 (en) * | 2018-01-18 | 2019-10-30 | Ademco Inc. | Systems and methods for protecting a bypassed zone in a security system or a connected home system |
RU188798U1 (en) * | 2018-10-15 | 2019-04-23 | Общество с ограниченной ответственностью "ЕХ-ПРИБОР" | Detector security magnetic contact explosion-proof |
CN110658735A (en) * | 2019-10-29 | 2020-01-07 | 北京金山云网络技术有限公司 | Intelligent household device and system |
Also Published As
Publication number | Publication date |
---|---|
EP2393071A3 (en) | 2012-01-11 |
GR20100100257A (en) | 2012-01-17 |
EP2393071B1 (en) | 2013-05-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2393071B1 (en) | Peripheral device that connects to home alarm systems and serves the global protection of an opening through magnetic switches and motion sensors | |
ES2317137T3 (en) | METHOD OF PROGRAMMING SECURITY CONTROL PANELS FOR COMPATIBILITY WITH A DOOR ENTRY DEVICE. | |
US7965171B2 (en) | Security system entry control | |
CA2529642C (en) | Door security device for use in security systems | |
US6225903B1 (en) | Alarm system armed and disarmed by a deadbolt on a door | |
EP1713045B1 (en) | Method and apparatus for deciding whether to issue an alarm signal in a security system | |
US6249225B1 (en) | Auxiliary alert process and system thereof for alarm system | |
US20080136585A1 (en) | Wireless control of security system with key-operated key FOB | |
US4271405A (en) | Alarm control system | |
JPH02155095A (en) | Door dead bolt interlocking type safety system | |
EP2779119B1 (en) | Access control systems with variable threat level | |
JPS5843097A (en) | Security system with plurality of access levels | |
US7319391B2 (en) | Centralised security closure | |
US20220228400A1 (en) | Alarm device | |
JPH11134569A (en) | Burglar prevention device | |
US6094136A (en) | Burglar alarm protection system | |
EP2613299B1 (en) | Alarm system for windows and doors | |
JP3102020U (en) | Residential double door structure | |
CA2383407C (en) | Alarm system armed and disarmed by a deadbolt on a door | |
JPH057679Y2 (en) | ||
GB2208558A (en) | Security system | |
RU106014U1 (en) | DOOR ALARM SYSTEM | |
JP2005030176A (en) | Classification and recognition method by recognizing state, and door monitoring device | |
JP2000067333A (en) | Electric lock control system with equipment interlocking function | |
KR20010069310A (en) | Anti-theft security windows and doors |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G08B 13/08 20060101AFI20111206BHEP Ipc: G08B 13/22 20060101ALN20111206BHEP Ipc: G08B 29/18 20060101ALN20111206BHEP Ipc: G08B 25/01 20060101ALI20111206BHEP |
|
17P | Request for examination filed |
Effective date: 20120605 |
|
R17P | Request for examination filed (corrected) |
Effective date: 20120605 |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: G08B 25/00 20060101ALI20121126BHEP Ipc: G08B 13/22 20060101ALN20121126BHEP Ipc: G08B 13/08 20060101AFI20121126BHEP Ipc: G08B 25/01 20060101ALI20121126BHEP Ipc: G08B 29/18 20060101ALN20121126BHEP |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 610352 Country of ref document: AT Kind code of ref document: T Effective date: 20130515 Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R096 Ref document number: 602011001556 Country of ref document: DE Effective date: 20130627 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 610352 Country of ref document: AT Kind code of ref document: T Effective date: 20130501 |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: VDEP Effective date: 20130501 |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG4D |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130902 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130901 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130801 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130812 Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130802 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130801 Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: CY Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: BE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: MM4A |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20131127 Year of fee payment: 3 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
26N | No opposition filed |
Effective date: 20140204 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20130502 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602011001556 Country of ref document: DE Effective date: 20140204 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20131127 Year of fee payment: 3 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602011001556 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20140531 Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20140531 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST Effective date: 20150130 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R119 Ref document number: 602011001556 Country of ref document: DE Effective date: 20141202 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20141202 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20140602 Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: TR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 Ref country code: HU Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO Effective date: 20110502 Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20130502 |
|
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20150502 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20150502 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20130501 |