Improvements in detection technology innovations provide technology for burglar alarms

Anti-theft alarm system has been developing steadily in the security industry. The areas of rapid technological innovation are mainly changes in various detectors. The anti-theft alarm system is a system that uses the detectors of various functions to protect the perimeter of the house, space, environment and people. The wireless intelligent anti-theft alarm system uses the principle of infrared radiation, pyrogram, and magnetic switch closure. With the help of telecommunication networks, it has achieved complete closed invisible protection for home doors, windows, and balconies.

Wireless anti-theft alarm system principle Anti-theft alarm system is to use physical or electronic technology to automatically detect the intrusion that occurs in the deployment monitoring area, generate an alarm signal, and prompt the on-duty personnel to place an alarm in the area where the alarm may be taken. In the event of an emergency, it is possible to accurately display the location of incidents in the security control center through sound and light alarm signals, facilitating the rapid adoption of emergency measures. The anti-theft alarm system and the entrance and exit control system, closed-circuit television monitoring system, visitor intercom system and electronic patrol system together constitute a security system.

The principle of wireless anti-theft alarm work is composed of an alarm host and some detectors and remote controllers. The detectors in wireless anti-theft alarm systems use infrared detectors. The detector is composed of sensors and signal processing. It is used to detect intruder intrusion. The device consisting of electronic and mechanical components is the key to the anti-theft alarm system. The sensor is the core component of the alarm detector. The use of different principles of the sensor components, can constitute different types, different uses, to achieve different detection purposes of the alarm detection device. When the detector detects that there is movement of the human body, a wireless alarm signal is emitted; the door magnet is installed on the door and window, and a wireless alarm signal is emitted when the door and window are opened; when smoke detectors and gas detectors respectively detect that the concentration of smoke and gas exceeds the standard A horn sounds and a wireless alarm signal is emitted.

A small detector also has a core zone, which is the "heart" of the burglar alarm system. It looks like a CPU and is the central nervous system of the detector. Here, the technician writes his own unique intelligent analysis software program, so as to distinguish itself from the products of other manufacturers. According to Hirsch Electronic’s Shi Zhijie, the focus of the previous detectors was on the hardware. Now that digital technology is more and more focused on software, it is possible to generate false positives and false negatives, such as hot air flow, wind, Small animals and other interference signals are quantified and then programmed into the software to allow the software to identify various false alarm signals. This reduces the chance of false alarms.

The anti-theft host is the core of the system and is used to receive timely feedback from the detector when it receives the alarm signal. After the host receives the alarm signal, it will generate a high decibel alarm sound, and at the same time, it will automatically dial the pre-stored alarm phone to report the alarm situation; if a camera host is installed, the camera host will start the camera to take pictures on the scene, via MMS or email The method is sent to the user's mobile phone or computer.

Innovative wireless alarm system anti-theft and video linkage technology In burglar alarm system and closed-circuit television monitoring system linkage application is when the alarm occurs in the system, the camera in the alarm area is automatically opened, the image will be immediately displayed in the central control room, and can alarm time, Alarm images, camera numbers, and other information are recorded in real time; if it is a computer-connected system, it can be stored in the form of an alarm information database for easy retrieval and analysis.

With the popularization of networks and the wide application of network video technologies, networked, intelligent, and digital security products are becoming the future trend of security industry technology development. The integration of security and surveillance is becoming increasingly apparent. Longhorn launched the fifth-generation anti-theft alarm integration program, the Global Guardian System, at the end of last year at the 11th CPSE AMB held in Shenzhen at the end of last year. The digital network cameras based on the Internet have integrated the anti-theft and video surveillance for the first time, demonstrating their unique development advantages. Users can network the monitoring area with alarm controllers at any time and anywhere. There are two aspects of networking between the controller and the alarm center. Both types of networking include both wired and wireless transmission methods. The networking methods used between the alarm controller and the alarm center include telephone lines, dedicated buses (such as RS485, CAN BUS, etc.), IP networks, and telecommunication wireless networks (such as 3G). Telephone lines, networks, and telecommunication wireless networks (such as 3G) are mainly used to network alarms in large-area urban areas. Dedicated buses (such as RS485, CAN BUS, etc.), power line carriers, and radios are only used in small-area alarms within the community and plant areas. networking.

Now many anti-theft alarm manufacturers, whether it is the network between the alarm detector and the alarm controller, or the networked products between the alarm controller and the alarm center, are all equipped with a wired and wireless network alarm function. For example, AW-BM1600 large-scale network alarm host launched by Inventec can select RS232, RS485 and IP network communication modes according to application requirements; Quanzhou Hongtai's alarm products are mainly based on wireless transmission; and Essence Long launched EP208 wireless package is the industry The first product to use 3G network transmission.

With the prevalence of IP networks, TCP/IP telepresence networking has become the development direction. For example, manufacturers such as Night Wolf, Huaji, and Mei'an have all introduced alarm products that support TCP/IP networking and communication. Some manufacturers can also implement network interfaces by providing them with a network interface. TCP/IP networking, while TCP/IP networking has the advantages of fast transmission speed, large transmission capacity, and long transmission distance, it is believed that it will become the mainstream of future alarm networking applications.

Solar wireless radio detection technology is currently used in the security products of perimeter intrusion detectors. According to different application principles, they are divided into two major categories: active infrared radiation and electronic fences. Among them, electronic fences have not been widely adopted due to factors such as high manufacturing cost and poor installation effects, and active infrared radiation accounts for control. The "anti-theft + surveillance" mode was pioneered. In addition to early warning, the camera can be quickly used to view the scene of the alarm and easily playback the alarm moment, so as to accurately determine and promptly handle the alarm.

Also at this exhibition, Nanjing Vision Electronics Technology Co., Ltd. brought a set of network broadband security system - "no disaster burglary", which consists of two parts: networked intelligent terminal and internet security service platform. According to Chen Xiaoming, marketing director of Nanjing Weiwei, "Non-hazardous piracy" network intelligent terminals all have video eyes, with a moving object detection function, and can connect dozens of different wireless alarm devices, such as infrared, smoke, gas, flooding, etc. Sensors, when an alarm event occurs, the terminal can immediately send an alarm sound, while the cable, 3G and other broadband networks automatically send an alarm image and other information to inform the owner or security company, the smart terminal built-in semiconductor memory card, local continuous video. Easy to install, especially for homes, shops, offices, warehouses and other applications.

Alarm network transmission mode diversification At present, alarm network includes alarm detection 75, according to the vast majority of market share of perimeter security projects. Although the installation of infrared radiation is relatively simple compared to electronic fences, the construction volume is very large and it is also subject to development constraints. Currently, Hengbo Electronics has launched the HB-T001FM Solar All-Wire Detector to apply solar energy to all-radio fire detection technology, which solves the difficult problems of construction and maintenance and meets the mainstream of environmental protection.

Solar wireless radio detectors are powered by solar panels. No need for power cables, solar energy can be recycled, and environmental protection requirements are met. In general, the solar panel is amorphous silicon, which can generate electricity without direct sunlight, and the installation environment is greatly expanded. The power supply capacity of the solar panels is much greater than the power consumption of the shots, ensuring that there is no light at night and continuous rainy days can work as usual. In addition, the built-in wireless transmitter module is used to transmit the alarm signal wirelessly. Under the premise of complying with relevant national policies and regulations, a high-power transmit module is used as much as possible to ensure the effective wireless transmission distance between the radio detector and the host. The solar energy wirelessly uses the solar energy to transmit electricity, and the signal is transmitted wirelessly. It is no longer necessary to install the power line and the signal line, so that the wireless operation is truly realized, and the problems of construction and maintenance are largely solved. The advent of this product has injected new vitality into the field of wireless anti-theft alarms.

Conclusion With the continuous improvement of user needs, the concept of the alarm host has also begun to change, from a single alarm dialer to today's intelligent control platform, with more value-added services. At present, the alarm host uses modular settings to facilitate the user's secondary development. Such as Shenzhen Mei'an's wired and wireless compatible alarm host, users can remotely arm, disarm, remotely monitor and activate the sirens via phone and mobile phone, and can automatically play this information, and accurately inform the outside world of attacks, help and other information.

As the front-end equipment of the alarm system, the detector's integration and intelligence are more and more prominent. At present, the integration of burglar alarm systems with surveillance, access control, and intercom systems is becoming more and more obvious. For example, many detectors are linked with CCTV cameras, integrated with fire and smoke alarms, and linked with emergency lights. How to solve the detector to make a suitable adjustment to the surrounding environment such as temperature, humidity, wind, thunder and other changes to reduce the false alarm rate, it not only requires the front-end detector sensor technology updates, but also in the back-end host system The technical innovation based on the analysis of the alarm system error will be the direction that companies should pursue in the development of detector technology.

Posted on