WO2009111996A1 - Wireless security system with control panel as a web application - Google Patents
Wireless security system with control panel as a web application Download PDFInfo
- Publication number
- WO2009111996A1 WO2009111996A1 PCT/CZ2009/000035 CZ2009000035W WO2009111996A1 WO 2009111996 A1 WO2009111996 A1 WO 2009111996A1 CZ 2009000035 W CZ2009000035 W CZ 2009000035W WO 2009111996 A1 WO2009111996 A1 WO 2009111996A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- detector
- arming
- security system
- intrusion
- web application
- Prior art date
Links
- 238000004891 communication Methods 0.000 claims abstract description 7
- 238000012544 monitoring process Methods 0.000 claims description 6
- 230000003993 interaction Effects 0.000 claims description 3
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 abstract description 2
- 238000001514 detection method Methods 0.000 description 3
- 238000009434 installation Methods 0.000 description 3
- 101150012579 ADSL gene Proteins 0.000 description 1
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 1
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/14—Central alarm receiver or annunciator arrangements
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/008—Alarm setting and unsetting, i.e. arming or disarming of the security system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/009—Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range
Definitions
- the invention relates to a security system of buildings, flats and other similar premises which includes at least one wireless WiFi intrusion detector and at least one arming/disarming device.
- At present security systems make use of facilities whose basic component is a control panel connected to particular intrusion detectors via hardwire or wireless connection.
- a keypad for controlling and programming the whole system is also included as well as a siren or other warning device in a general way. All these components are installed straight in the protected property.
- the control panel evaluates intrusion signals from detectors and based on system configuration it causes alarm condition by sounding the siren; and/or by message transmission addressed to the owner or to the central monitoring via telephone network. Therefore the basic component of the whole system is the central panel device and as late as this central panel is connected through the communicator to the receiving party.
- the object of the invention is to provide a system making use of contemporary information technologies, with affordable price and more efficiency particularly for residential customers and small business environments.
- the object mentioned above can be reached by a security system making use of at least one wireless WiFi intrusion detector and at least one arming/disarming device.
- the principle of the system is following: detectors and arming/disarming devices are connected via local wireless access point and internet connectivity directly to the web server equiped with a communication interface for interaction with the receiving party.
- the receiving party may be a mobile telephone and/or central monitoring and/or a siren.
- the intrusion detector may be a motion detector (PIR) and/or a glassbreak detector and/or a gas leak detector and/or a fire detector and/or a water flood detector and/or a magnetic detector.
- the arming /disarmig device may be a keypad and/or arming /disarmig tag and/or mobile electronic device.
- Intrusion detectors are long life battery-powered devices with ultra low-power consumption and very easy installation. After purchasing intrusion detectors, their installation, registration to the web application on the web server and configuration for the required security the system is ready to use. Services making use of this system may be provided by specialized security systems providers, web portal operators or mobile phone network operators. Compared to existing security systems the most expensive part of the system - the control panel with its communicator - is moved to the sevice provider and it has a form of a web application running on the server. This application provides realiable web services directly to particular detectors and arming/disarming devices installed in customer's property.
- the intrusion detector 1 involves: a motion detector (PIR) H, a glassbreak detector 11, a gas leak detector H, a fire detector 14, a water flood detector 15 and a magnetic detector 16.
- the system also includes arming /disarmig devices 2 such as system control keypad 2J_, arming/disarming tags 22, mobile electronic device 23 . .
- an arming /disarmig device 2 may be chosen any mobile device equiped with WiFi communication interface if equipped with corresponding software.
- All these detectors i and arming /disarmig devices 2 are connected via local wireless access point 1 ,via connectivity 5_ of internet provider 6 to the internet network 61 and web server 8 with web application which functions as the control panel of the security system.
- the web server 8 is equiped with the communication interface for interaction with the receiving party 7 which is represented by a mobile phone 71, central monitoring 72 and a siren 73 in the protected object in this implementation example.
- the application and function of this security system suppose the existence of a home wireless WiFi network with at least one access point 3 . which provides the internet connectivity for all devices within the wireless signal coverage area.
- the primary purpose of the access point 3 is to distribute the internet connectivity from its source (e.g. ADSL, cable TV, wireless access) to all devices in the household (like computer and consumer electronics) within its signal coverage area.
- Arming/disarming of the security system is executed through the arming /disarmig device 2, e.g. pressing the button on the arming/disarmig tag 22 or the absence/presence of the tag within wireless signal coverage area of the access point 3.
- the security system is disarmed if arming/disarming tag 22 is within the signal coverage area of the access point 3_.
- the system is armed if the tag 22 is out of the signal coverage area of the access point 3_.
- the arming /disarmig tag 22 can have a form of a key case or it can be placed inside a car. Thereafter the security system can be armed/disarmed automatically when the owner comes to/leaves the protected property.
- the other way of arming/disarming the system is entering a personal PIN on the system control keypad 21.
- This keypad 2J_ interacts directly with the web application on the web server 8 via internet connection 5 and the access point 3.
- the system is using a electronic device 23_ equipped with a WiFi communication interface with a software installed for providing the arming/disarming function, hi this case the system is armed/disarmed automatically when the owner equipped with this electronic device 23_ comes to/leaves the protected property or he can manually run the software command from the mobile electronic device, such as mobile phone Jl or personal digital assistante (PDA).
- a mobile electronic device such as mobile phone Jl or personal digital assistante (PDA).
- the signal from the particular intrusion detector 1 is transmitted via access point 3 and the internet 6 to the web server 8.
- the web server 8 transmits back a command to sound the siren 73_ and a message about intrusion is sent through the communication interface 9 to the mobile phone 71 eventually central monitoring 72.
- the security system based on this invention with detection of different kinds of intrusion may be utilized especially for residential customers or small business environments.
Landscapes
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Alarm Systems (AREA)
Abstract
Wireless security system comprises at least one intrusion detector and at least one arming/disarming device, where principle of operation is in the fact, that detectors and arming/disarming devices are conected through local wireless access point and internet connectivity direct to web application on web server. Web application on web server communicates direct with detectors and arming/disarming devices, provides all control panel functionality and is equiped with communication interface for alarm transmission to receiving party.
Description
WIRELESS SECURITY SYSTEM WITH CONTROL PANEL AS A WEB APPLICATION
TECHNICAL FIELD
The invention relates to a security system of buildings, flats and other similar premises which includes at least one wireless WiFi intrusion detector and at least one arming/disarming device.
BACKGROUND ART
At present security systems make use of facilities whose basic component is a control panel connected to particular intrusion detectors via hardwire or wireless connection. A keypad for controlling and programming the whole system is also included as well as a siren or other warning device in a general way. All these components are installed straight in the protected property. The control panel evaluates intrusion signals from detectors and based on system configuration it causes alarm condition by sounding the siren; and/or by message transmission addressed to the owner or to the central monitoring via telephone network. Therefore the basic component of the whole system is the central panel device and as late as this central panel is connected through the communicator to the receiving party.
The disadvantage of this solution are financial costs and the system complexity because the control panel and its required communicator to receiving party is the most expensive component of the electronic security system. This results in utilization of these security systems firstly in business environments while residential customers are a minority, especially in case of systems connected to the central monitoring.
The object of the invention is to provide a system making use of contemporary information technologies, with affordable price and more efficiency particularly for residential customers and small business environments.
DISCLOSURE OF THE INVENTION
The object mentioned above can be reached by a security system making use of at least one wireless WiFi intrusion detector and at least one arming/disarming device. The principle of the system is following: detectors and arming/disarming devices are connected via local wireless access point and internet connectivity directly to the web server equiped with a communication interface for interaction with the receiving party. The receiving party may be a mobile telephone and/or central monitoring and/or a siren. According to the level and the kind of security the intrusion detector may be a motion detector (PIR) and/or a glassbreak detector and/or a gas leak detector and/or a fire detector and/or a water flood detector and/or a magnetic detector. The arming /disarmig device may be a keypad and/or arming /disarmig tag and/or mobile electronic device.
The main benefit of the security system based on this invention constitutes the substantial simplification of its installation and configuration, significant cost reduction of the equipment required and the opportunity of providing the electronic security system services to homeowners. Intrusion detectors are long life battery-powered devices with ultra low-power consumption and very easy installation. After purchasing intrusion detectors, their installation, registration to the web application on the web server and configuration for the required security the system is ready to use. Services making use of this system may be provided by specialized security systems providers, web portal operators or mobile phone network operators. Compared to existing security systems the most expensive part of the system - the control panel with its communicator - is moved to the sevice provider and it has a form of a web application running on the server. This application provides realiable web services directly to particular detectors and arming/disarming devices installed in customer's property.
BRIEF DESCRIPTION OF DRAWINGS
The security system based on the invention is described more closely through an example of implementation with the help of the schematic drawing attached.
BEST MODE FOR CARRYING OUT THE INVENTION
As an example of the security system was chosen example of a system with relatively complex detection of different kinds of intrusion. The intrusion detector 1 involves: a motion detector (PIR) H, a glassbreak detector 11, a gas leak detector H, a fire detector 14, a water flood detector 15 and a magnetic detector 16. The system also includes arming /disarmig devices 2 such as system control keypad 2J_, arming/disarming tags 22, mobile electronic device 23.. As an arming /disarmig device 2 may be chosen any mobile device equiped with WiFi communication interface if equipped with corresponding software. All these detectors i and arming /disarmig devices 2 are connected via local wireless access point 1 ,via connectivity 5_ of internet provider 6 to the internet network 61 and web server 8 with web application which functions as the control panel of the security system. The web server 8 is equiped with the communication interface for interaction with the receiving party 7 which is represented by a mobile phone 71, central monitoring 72 and a siren 73 in the protected object in this implementation example.
The application and function of this security system suppose the existence of a home wireless WiFi network with at least one access point 3. which provides the internet connectivity for all devices within the wireless signal coverage area. The primary purpose of the access point 3 is to distribute the internet connectivity from its source (e.g. ADSL, cable TV, wireless access) to all devices in the household (like computer and consumer electronics) within its signal coverage area.
Arming/disarming of the security system is executed through the arming /disarmig device 2, e.g. pressing the button on the arming/disarmig tag 22 or the absence/presence of the tag within wireless signal coverage area of the access point 3. The security system is disarmed if arming/disarming tag 22 is within the signal coverage area of the access point 3_. The system is armed if the tag 22 is out of the signal coverage area of the access point 3_. The arming /disarmig tag 22 can have a form of a key case or it can be placed inside a car. Thereafter the security system can be armed/disarmed automatically when the owner comes to/leaves the protected property. The other way of arming/disarming the system is entering a personal PIN on the system control keypad
21. This keypad 2J_ interacts directly with the web application on the web server 8 via internet connection 5 and the access point 3.
Third way of arming/disarming the system is using a electronic device 23_ equipped with a WiFi communication interface with a software installed for providing the arming/disarming function, hi this case the system is armed/disarmed automatically when the owner equipped with this electronic device 23_ comes to/leaves the protected property or he can manually run the software command from the mobile electronic device, such as mobile phone Jl or personal digital assistante (PDA).
If intrusion detection of the protected property occurs, the signal from the particular intrusion detector 1 is transmitted via access point 3 and the internet 6 to the web server 8. After the signal evaluation the web server 8 transmits back a command to sound the siren 73_ and a message about intrusion is sent through the communication interface 9 to the mobile phone 71 eventually central monitoring 72.
INDUSTRIAL APPLICABILITY
The security system based on this invention with detection of different kinds of intrusion may be utilized especially for residential customers or small business environments.
Claims
1. The security system including at least one wireless WiFi intrusion detector, wherein intrusion detectors (1) and arming/disarming devices (2) are connected via local wireless access point (3), internet provider (6), internet network (61) to web server with web application (8) equipped with the communication interface (9) for interaction with the receiving party (7).
2. The security system according to claim 1, wherein the receiving party (7) is a mobile phone (71) and/or a central monitoring (72) and/or a siren (73).
3. The security system according to claim 1, wherein the intrusion detector is a motion detector (11) and/or a glassbreak detector (12) and/or a gas leak detector (13) and/or a fire detector (14) and/or a water flood detector (15) and/or a magnetic detector (16).
4. The security system according to claim 1, wherein the arming /disarmig device (2) is a keypad (21) and/or arming /disarmig tag (22) and/or mobile electronic device (23).
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CZ20080162A CZ2008162A3 (en) | 2008-03-14 | 2008-03-14 | Building alarm system |
| CZPV2008-162 | 2008-03-14 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2009111996A1 true WO2009111996A1 (en) | 2009-09-17 |
Family
ID=40749162
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CZ2009/000035 WO2009111996A1 (en) | 2008-03-14 | 2009-03-04 | Wireless security system with control panel as a web application |
Country Status (2)
| Country | Link |
|---|---|
| CZ (1) | CZ2008162A3 (en) |
| WO (1) | WO2009111996A1 (en) |
Cited By (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101859154A (en) * | 2010-04-02 | 2010-10-13 | 上海博繁企业发展有限公司 | A substation pond water treatment system and method using floating balls |
| CN102598076A (en) * | 2009-10-28 | 2012-07-18 | 罗伯特·博世有限公司 | Alarm device for detecting and communicating environment- and system-specific states |
| CN102831746A (en) * | 2012-08-20 | 2012-12-19 | 伽伽集团股份有限公司 | Intelligent two-level fire alarm and linkage control system based on ARM [advanced RISC (reduced instruction set computer) machine] processors |
| GB2513402A (en) * | 2013-04-26 | 2014-10-29 | Dale Alexander Aggett | A fire detector/alarm |
| EP2826028A4 (en) * | 2012-03-15 | 2015-11-18 | Ericsson Telefon Ab L M | A home security system using wireless communication |
| CN105825616A (en) * | 2016-05-24 | 2016-08-03 | 东莞市兴中泰智能科技有限公司 | Intelligent wireless fire detection alarm system |
| US10062264B2 (en) | 2015-09-18 | 2018-08-28 | Carrier Corporation | System, apparatus and method to facilitate alarm system communication |
| CN109191750A (en) * | 2014-12-19 | 2019-01-11 | 华为技术有限公司 | A kind of theft preventing method and device |
| GB2624378A (en) * | 2022-11-09 | 2024-05-22 | Linked Up Alarms Ltd | Improved alarm system |
Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030025603A1 (en) * | 2001-08-01 | 2003-02-06 | Smith Edwin Derek | Master authenticator |
| US20030202101A1 (en) * | 2002-04-29 | 2003-10-30 | Monroe David A. | Method for accessing and controlling a remote camera in a networked system with multiple user support capability and integration to other sensor systems |
| US20040205824A1 (en) * | 2003-04-10 | 2004-10-14 | Chic Technology Corp. | Web home security system |
| US20050242948A1 (en) * | 2004-04-30 | 2005-11-03 | Jeff Tarr | Alarm system |
| US20060064505A1 (en) * | 2004-09-20 | 2006-03-23 | Honeywell International, Inc. | Network communication for a security system |
| US20060136972A1 (en) * | 2003-02-11 | 2006-06-22 | Raymond Metzger | System for a plurality of video cameras disposed on a common network |
| WO2006087443A1 (en) * | 2005-02-16 | 2006-08-24 | Ivan Lovric | Intelligent remote multi-communicating surveillance system and method |
| WO2007032731A1 (en) * | 2005-09-12 | 2007-03-22 | Telefonaktiebolaget Lm Ericsson (Publ) | A mobile security monitoring method and system and an alarm security node in the system |
-
2008
- 2008-03-14 CZ CZ20080162A patent/CZ2008162A3/en unknown
-
2009
- 2009-03-04 WO PCT/CZ2009/000035 patent/WO2009111996A1/en active Application Filing
Patent Citations (8)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030025603A1 (en) * | 2001-08-01 | 2003-02-06 | Smith Edwin Derek | Master authenticator |
| US20030202101A1 (en) * | 2002-04-29 | 2003-10-30 | Monroe David A. | Method for accessing and controlling a remote camera in a networked system with multiple user support capability and integration to other sensor systems |
| US20060136972A1 (en) * | 2003-02-11 | 2006-06-22 | Raymond Metzger | System for a plurality of video cameras disposed on a common network |
| US20040205824A1 (en) * | 2003-04-10 | 2004-10-14 | Chic Technology Corp. | Web home security system |
| US20050242948A1 (en) * | 2004-04-30 | 2005-11-03 | Jeff Tarr | Alarm system |
| US20060064505A1 (en) * | 2004-09-20 | 2006-03-23 | Honeywell International, Inc. | Network communication for a security system |
| WO2006087443A1 (en) * | 2005-02-16 | 2006-08-24 | Ivan Lovric | Intelligent remote multi-communicating surveillance system and method |
| WO2007032731A1 (en) * | 2005-09-12 | 2007-03-22 | Telefonaktiebolaget Lm Ericsson (Publ) | A mobile security monitoring method and system and an alarm security node in the system |
Cited By (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102598076A (en) * | 2009-10-28 | 2012-07-18 | 罗伯特·博世有限公司 | Alarm device for detecting and communicating environment- and system-specific states |
| US9202364B2 (en) | 2009-10-28 | 2015-12-01 | Robert Bosch Gmbh | Wireless alarm device for detecting and communicating environment and system specific states using the internet |
| CN101859154A (en) * | 2010-04-02 | 2010-10-13 | 上海博繁企业发展有限公司 | A substation pond water treatment system and method using floating balls |
| US9576448B2 (en) | 2012-03-15 | 2017-02-21 | Telefonaktiebolaget L M Ericsson | Home security system using wireless communication |
| EP2826028A4 (en) * | 2012-03-15 | 2015-11-18 | Ericsson Telefon Ab L M | A home security system using wireless communication |
| CN102831746A (en) * | 2012-08-20 | 2012-12-19 | 伽伽集团股份有限公司 | Intelligent two-level fire alarm and linkage control system based on ARM [advanced RISC (reduced instruction set computer) machine] processors |
| GB2513402A (en) * | 2013-04-26 | 2014-10-29 | Dale Alexander Aggett | A fire detector/alarm |
| CN109191750A (en) * | 2014-12-19 | 2019-01-11 | 华为技术有限公司 | A kind of theft preventing method and device |
| US10839675B2 (en) | 2014-12-19 | 2020-11-17 | Huawei Technologies Co., Ltd. | Anti-theft method and apparatus |
| US10964200B2 (en) | 2014-12-19 | 2021-03-30 | Huawei Technologies Co., Ltd. | Anti-theft method and apparatus |
| US10062264B2 (en) | 2015-09-18 | 2018-08-28 | Carrier Corporation | System, apparatus and method to facilitate alarm system communication |
| CN105825616A (en) * | 2016-05-24 | 2016-08-03 | 东莞市兴中泰智能科技有限公司 | Intelligent wireless fire detection alarm system |
| GB2624378A (en) * | 2022-11-09 | 2024-05-22 | Linked Up Alarms Ltd | Improved alarm system |
Also Published As
| Publication number | Publication date |
|---|---|
| CZ2008162A3 (en) | 2009-09-23 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2009111996A1 (en) | Wireless security system with control panel as a web application | |
| US10134265B2 (en) | Portable alarm system with self-monitoring sensor | |
| US8638210B2 (en) | Wireless takeover of wired alarm system components | |
| US8378808B1 (en) | Dual intercom-interfaced smoke/fire detection system and associated method | |
| Çavaş et al. | A review advancement of security alarm system using internet of things (IoT) | |
| JP4592769B2 (en) | Base station and mobile | |
| US7218217B2 (en) | False alarm reduction in security systems using weather sensor and control panel logic | |
| US7356429B2 (en) | Method for remotely changing the sensitivity of a wireless sensor | |
| US20070216531A1 (en) | Rfid Sensor and Ubiquitous Sensor Network System Thereof | |
| US20130155242A1 (en) | Stand-Alone, Portable Video Alarm System | |
| US20150194044A1 (en) | Mobile, location-aware, self-powered alarm and signal processing system | |
| CN106200480A (en) | A kind of Household security system | |
| CN102426762A (en) | Double-network intelligent antitheft alarm system | |
| US20250005987A1 (en) | Devices, systems, and methods for monitoring controlled spaces for transitory uses | |
| JP2004272763A (en) | Community-cooperative crime prevention and disaster prevention system | |
| US20030214401A1 (en) | Multi-point security system | |
| KR101186635B1 (en) | Method and apparatus for providing reply service | |
| KR100343045B1 (en) | A burglar alarm and method thereof by internet | |
| JP4887670B2 (en) | Communications system | |
| KR102228265B1 (en) | System for searching concealed transmitter | |
| JP2006309389A (en) | Communication terminal, earthquake information acquisition method and program | |
| JPH11283160A (en) | Detour notification system when telephone line is disconnected | |
| JP2006004040A (en) | Security system | |
| WO2025120434A1 (en) | Comprehensive iot based monitoring and security system | |
| Power | In Italy... |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09719520 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 09719520 Country of ref document: EP Kind code of ref document: A1 |