(19)
(11) EP 2 393 071 B1

(12) EUROPEAN PATENT SPECIFICATION

(45) Mention of the grant of the patent:
01.05.2013 Bulletin 2013/18

(21) Application number: 11386009.2

(22) Date of filing: 02.05.2011
(51) International Patent Classification (IPC): 
G08B 13/08(2006.01)
G08B 25/00(2006.01)
G08B 29/18(2006.01)
G08B 25/01(2006.01)
G08B 13/22(2006.01)

(54)

Peripheral device that connects to home alarm systems and serves the global protection of an opening through magnetic switches and motion sensors

Peripherievorrichtung, die Heimalarmsysteme verbindet und durch Magnetschaltern und Bewegungssensoren dem allgemeinen Schutz eines Eingangs dient

Dispositif périphérique qui connecte des systèmes d'alarme de domicile qui sert de protection globale d'une ouverture au moyen de commutateurs magnétiques et de capteurs de mouvement


(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

(30) Priority: 03.05.2010 GR 20100100257

(43) Date of publication of application:
07.12.2011 Bulletin 2011/49

(73) Proprietor: Chlapoutakis, Georgios
151 25 Marousi Attikis (GR)

(72) Inventor:
  • Chlapoutakis, Georgios
    151 25 Marousi Attikis (GR)


(56) References cited: : 
EP-A2- 0 323 621
GB-A- 2 032 666
GB-A- 2 354 068
WO-A2-98/12068
GB-A- 2 286 423
   
       
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description


    [0001] This invention constitutes a peripheral device that connects to the control center of a home alarm system and aims in detecting conditions of a breaking through a door/window. It combines information from two motion sensors and two magnetic switches. The purpose of the invention is to close in security gaps that exist in the method of perimeter protection using magnetic switches and help the residential alarm systems become more user-friendly.

    [0002] Today, magnetic switches are used in most home alarm systems for the protection of the perimeter. Referring to the advantages of this method we can cite the low cost, the reduced maintenance requirements, the longevity of switches, the reliable functioning, as well as the ability to provide protection while the occupants are inside their home. Major drawbacks are the significant security gaps and that they do not provide the distinctiveness of the location from which the door/window is opened. As a result these sytems do not provide full protection against burglary and they also trap occupants inside their home.

    [0003] There are already several patents in which motion detector signal processing is made in order that these devices become more reliable and the false alarms will be reduced. In such cases, the signals from the detectors operate in supporting one another to cause alarm. According to our knowledge there is no device in which a signal from a motion sensor can be either supportive or suppressive to the signal from the other sensor, depending on the sequence of stimulation. The combination of a motion sensor which suspends an alarm signal caused by magnetic switch opening exists in JP2170298 (HIROMICHI NAMIKOSHI). The invention, however, suffers from a major security gap because it does not protect the glass against breakage. This is very important because if a burglar breaks the glass of a window and the motion sensor device is triggered by this movement, it will suppress the alarm from the following opening of the window from the exterior of the house. In this case the invention JP2170298 (NAMIKOSHI HIROMICHI) would leave the burglar enter the house and the alarm would never sound. Therefore, in order to implement an application that will suspend alarm by movement within the home, care must be taken to protect the glass.

    [0004] GB 2,286,423 discloses a security system having an "occupied" node of operation.

    [0005] Although alarm systems had an explosive development in recent decades, concerning the technology and their capabilities, the undercurrent philosophy has remained constant, even though the requirements are no longer the same. The role to be played by residential security systems is different from that 30 years ago when their dynamic development begun. In the 1980s, most cases of burglary were happening when the occupants were absent, and therefore the purpose of a security system was the protection of home during that period. In the 1990s the cases of burglary in which the occupants were inside their home, but were dormant, increased considerably. In 2010, the incidences of burglary with the occupants being inside their homes, awake, are multyplying. This happens probably because it is chosen deliberately by the burglars as they know that the alarms will be disabled. Many times these break-ins are combined with criminal acts. Now we believe that the role played by alarm systems is more important than ever. So on, their mission will be to protect the lives and the physical integrity of the occupants. In modern cities with strong social problems such as unemployment and illegal immigration, crime indices will constantly keep on growing. Citizens are invited to live their lives with their security systems armed. Consequently, the last should be made more user-friendly, in the sense that it should not cause impediments in every day life. The tenant should not be treated by the alarm system as a burglar ie door opening → alarm. This relationship should be changed to door opening from a burglar →alarm and door opening from the occupant→ wait until the door is closed again. Therefore an ideal alarm system shall be able to distinguish the owner from a burglar. Up to a certain extent this is feasible with this invention, as the burglar opens a door from the exterior of the house and the occupant usually from the interior.

    [0006] The method of protection via magnetic switches, while the most commonly used way of protecting homes, suffers from significant security gaps. So this method is vulnerable to following ways violation. 1) Effect of external magnetic field: the impact of a strong magnetic field, through an electromagnet from the outside of the window, can keep the switches closed even if a violation occurs. After the burglary, the door is closed and the magnet is removed. To resolve this problem, the balanced magnetic field switches are used in high-security applications . The disadvantages are the large size, the cost, and that they require perfect alignment during mounting, which if lost due to damage from use, they stop working. 2)Short-circuit: When the shutter of the window is open, the cables connecting switches to the control center may be exposed. Short circuit at this point can take switches out of the circuit. Solution to this problem are the switches with built-in terminal resistance which are costly. 3) Breaking the glass and pass through it without opening the construction: to address this problem using other peripherals such as vibration detectors and glass breaking detectors with sound. Both these devices under conditions can cause false alarms (e.g. the vibration sensor when a heavy vehicle passes near the house), or may fail to detect breaking (e.g. the breaking Detector with sound in a very noisy environmentor or when the burglar cuts the glass of the window). From the above we realize that even though various technical solutions have been found, there is no device that would solve the issue of protection of an opening intergrately, and without drawbacks of the individual solutions above.

    Advantages of the invention



    [0007] The advantage of this invention is that it fills in all the security gaps of the method of perimeter protection of a house with magnetic switches, in a single integrated solution. Specifically, the device monitors the magnetic switches, the glass of the window and simultaneously detects the presence of additional magnetic fields that have enough strength to disable the magnetic switches. Furthermore, it is too small not to cause visual disturbance of the tenant and gives the opportunity to have the alarm system constantly armed without trapping the occupants inside the house. It also allows to change the alarm triggering conditions through manipulations on the existing keyboard of the control center. So when the owner wishes for example to sleep, he can convert the security system to a conventional one that any manipulation of a door/ window will cause an alarm. Finally it protects itself from potential short circuit using a built in terminal resistance. For the construction of the device, low cost materials can be used making it widely accessible to the public. The installation is very easy even in homes that already have alarm systems, without a change in the control center, the magnetic switches, or the wiring. The device is placed inline the course of the wires from the control center to the magnetic switches. Making use of cheap and small-sized magnetic traps, which can be installed in such a way as to be invisible from the inside of the home, it provides protection similar to the huge balanced magnetic field traps with built-in terminal resistance, which because of their deformity, they are no more used in homes and they have found application in closed cabinets and safes. Furthermore regarding the protection offered to the glass, it is certainly higher than the protection of the sound or vibration sensors because it is not affected by noise or vibration. The software of the device will signal an alarm when a human body crosses from outside to inside the house. Due to the great benefit of specialization to detect human body infrared radiation the system does not fail to detect a break in (high sensitivity), and does not give false alarms (high specificity). These two features cannot be attributed to the existing glass breaking detecting devises.

    [0008] The innovative features of the device will be revealed through the description of the attached figures:

    Fig 1 . This drawing presents the outer surface of the device (1) and the motion sensors (17) and (18). A special construction or a specific formulation of the surface of the box (1) of the device is marked with "X" (2). The main purpose is to restrict the visual fields of the sensors so that the space that is monitored by the device is devided into two parts: in space (3) that is supervised by the the sensor (17) and space (4) that is supervised by the sensor (18). There is no point in space that is monitored by both motion sensors.

    Fig2. The drawing shows the functional orientation of the device. Space (4) involves the largest possible surface of the glass (of the door/window), while space (3) extends towards the interior of the home, but it contains no point of the glass (6). So, when approaching the opening from inside the home, the tenant has to pass through space (3) firstly and space (4) secondly. Consequently the sensor (17) is triggered first and sensor (18) second.

    Fig3. The drawing presents schematically the interconnection of electronic components inside the device (the standard model), as well as the interface with the control center (11) of the alarm system. The device consists of a microcontroller (23), two infrared motion sensors (17) (18), a relay (20), a led (22),a button (19), jumpers (21), a terminal resistor (end-of-line resistor, EOL) (24), a tamper switch (16) (for protection of the box for the device)and other elements necessary for the support, interface and the proper functioning of the above-mentioned items. The device is wired with : a) The zone wires from the control center (11). b) The power cables(12) that come from the alarm's control center (11). C) The 24 hours zone cables that support the tamper(16). d) The magnetic switches that are destined to the window glass and the shutter of the opening (8), (9) and (10). Looking at the drawing 3 we realize that the necessary wiring for the connection of the device to the control center consists of 4 cables, from which 2 are for the zone and 2 for the power. Using one cable for the negative, the necessary cables are reduced to 3. With the option of electronic components with very low consumption as low power regulator , microcontrollers with nanowatt technology and solid-state relay, the consumption of the device may be reduced to 300µA. In this case, the device can be powered directly from the zone cables which are usually operate on 3mA current without disrupting its operation. Therefore, the device can operate well with 2 cables if low-power components are selected. Wireless device variation can be easily manufactured with processor interfacing directly with a radiofrequencies subunit for encoded signal broadcast and with the addition of a power unit.



    [0009] Magnetic switches (8) and (9) are discrete. The first one (8) is installed to the outer construction(shutter) that closes a window and it is connected only to terminal (14). Respectively switch (9) which is installed to the inner construction which carries the glass is connected to the terminal (15). In this way, microprocessor can distinguish when the inner or the outer contruction of a widnow is opened/closed. In drawing 3 the switch (10), is one or more magnetic switches connected in parallel with the port (25). As the main program runs (37) the permissible status of the switch is open. When the switch is closed, the microprossecor causes an alarm. In other subrutines it may have another purpose as the initiation of other subroutines (fig 8 (47)). It can therefore be used as an additional function switch such as when it is closed after the tentant has opened both constructions from inside of the home. The fig 4 A presents two different ways of installing the magnetic switch (10), which may coexist if one installs two magnetic switches connected in parallel with the port (25). In the first installation-way, the switch (10) is placed in proximity to the switch (9),in such a distance that is not affected by the field of the magnet. A burglar with simple means such as a compass, could detect the location of bogie magnet switch (9) and therefore the switch itself. Administering a strong magnetic field from the outside of the home will take the switch (9) out of order, but it will cause the closure of switch(10) and thus cause an alarm. The second way to install switch (10) and magnet (27) is to place them in such a relationship in order that during the opening of the closed construction, they will come into close proximity and the originally open switch (10) will close and cause an alarm. The arrow indicates the course of the opening. So even if someone succeeds in disabling switches (8) and (9), as the door/window opens the switch (10) will inevitably detect the magnet (27) and the alarm will go off. The advantages of using this method is that unlike the switches (8) and (9), the switch (10) is not detected from the exterior and it is protected by the motion detector (18). Alternatively instead of a reed switch, a hall effect sensor can be used too.

    [0010] The relay (20) is connected in series to the terminals that accept the wires of the zone, in a normally open (N.O.) condition. So when the device is not powered, the zone (13) of the control center is opened. When the processor (23) closes the relay (20) and therefore the zone (13), with energy expenditure, it holds them closed until there is a condition that breeds an alarm. In this case the signal to relay (20)comes to zero and it returns to its original normally open status opening the zone (13) of the control center.

    [0011] The operating principle of device as shown in the drawing 4B is the following: the microprocessor (23) which controls the relay (20), opens the zone (13) of the control center (11) thus causing alarm. The microprocessor (23) is equipped with software that allows the user to select the appropriate function of the device that best meets his/her needs by changing the settings of the jumpers (21). Each program requires different conditions to cause alarm (opening zone by the relay) and therefore provides the user with different permissions and therefore of a different' quality 'or 'level' of protection. Each program may use a different number of sensors (one, two, or even any) as well as different number of peripherals (one or two magnetic switches, with or without sensor for magnetic fields). The final number of rights and protection parameters (e.g. glass protection, protection against magnetic fields) which are provided by the device is specified by the program chosen by the user and by the peripherals that are connected to the device.

    [0012] In figure 5A, a variation of the device is displayed that targets to more demanding users. It can be installed as a peripheral device in control centers which support dual end of line resistor (dual end-of-line resistor, DEOL). As it is described below, this device variant has two relays and enables users to modify the conditions causing alarm, of all the peripheral devices that are installed in home, by handling the keyboard of the control center. The operating principle of the DEOL resistance is shown in draft 5. So far, the aim of this circuit was the omission of cabling for the device's tamper, resulting in a saving of time and materials during the installation of an alarm system. Opening the switch 1 (fig 5 B) implies a violation of the tamper. This constitutes an alarm condition in case which the control center is armed or when it is disarmed but the tamper protection is enabled. It is not an alarm condition when the control center is disarmed and the tamper protection disabled. When the switch 2 (fig 5B) is opened, resistance 2 enters the circuit and the whole resistance that is measured by the control center is the summation of the two resistors EOL1 + EOL2. This is an alarm treaty only when the control center is armed. In the variation of our device, the above layout is integrated with the difference that the switch 1 is substituted by the relay (20), while the switch 2 is substituted by the relay (29). The two relays (20), (29) are connected with the microprocessor (23) which controls their operation. The relay (20) binds only in a normally open condition, while the relay (29) can be connected in both ways, N.O. and N.C.. The existence of the relay (20) does not preclude the tamper switch (16) which can be connected in series. The conditions under which the relay (20) or the relay (29) are opened/closed, are programmed in the microprocessor, again with different subroutines which can be defined by the user. So potential scenarios that can occur are the following: 1) relay (29)opens each time a door is opened despite the triggering of the motion sensors, while the relay (20) is opened only when a door/window is opened from the exterior of the home or when there is an excitation firstly of the detector (18) and then of the detector (17). In this case when the tamper protection is activated and the control center disarmed, there is a clever system of 24-hour protection which enables the tenants to open and close their door/windows from the interior of the home. When the control center is armed, there is a conventional system that doesn't allow any manipulation of the structures of a door/window. 2) The relay (29) opens only in the case of treaties that brings on a possible breaking of the glass of a door/window. In this case we have a 24-hour protection on magnetic contacts while the glass is protected only when the system is armed. 3) The relay (29) opens only when the door/window is open and someone passes from the outside inwards. In this case we have 24 hour protection for the glass and the magnetic contacts. When the system is armed and if a door/window is open, the conditions of transit towards the interior of the home will trigger an alarm. So even if the door/window has been forgotten open, the home continues to be protected. 4)The relay (29) is opened and remains open during the opening of the shutter. In this way, the tenant may be informed by the keyboard, when he arms the system, which openings have their shutters open. This function is particularly useful during night hours when doing the last check out at his home before falling asleep. These combinations of functions are indicative. The system is flexible enough to incorporate several more functions into the software which will be chosen according to the user protection needs by the usage of the device jumpers. Furthermore, a specific programming can be made in special cases or even the desirable program can be selected from a programs library. For this purpose, the device has a slot (30) for re-programming. This enables the demanding user or the installer, to design his own solution to protect an opening, which will be implemented by the developers of the company which will manage the invention. Due to the existence of this slot (30), on site programming can be made in case the current program/subroutines do not meet the user's desirable level of protection. Once the device is installed, the daily selection of alarm conditions is made from the keyboard of the central alarm system by enabling or disabling the tamper protection and the arming or disarming the system. So in everyday life , there are three possible choices, depending on the user's requirements for protection with the rights or prohibitions that he has selected during device's setup: 1) tamper protection disabled and alarm disarmed, 2) tamper protection enabled and 3) alarm armed. In the proceeding description of the drawings related to the operation of the device, the reference to the word 'alarm', marks the opening of the relay (20) in the basic version of the device. The opening of the relay (29) can be added to the flow charts at any point, thus creating a great number of functions, the reference of which at this point would create a multitude of drawings which would cause confusion. The purpose of the figures is to better understand the operation of the device and not to include all possible cases, which is practically impossible. Thus, this will be omitted. In practice, this option offers unlimited flexibility, which makes the device able to adapt to the wishes of the residents regarding the conditions causing alarm when the system is armed or when not. Furthermore , there is a port (31) for connecting two devices together. The interface is required in cases of large openings as in the drawing 5C. In this case the installation of the devices varies in the extent that only one of the two devices is connected to the control center (11), while the two devices are linked with cables (32).

    [0013] Drawing 6 displays in the form of a flow chart the main program of the device that is common in any setting of the jumpers. At the launch of the device the switches' condition is checked (initial control) (33). Compulsory conditions for the continuation are a) at least one of the two magnetic switches located on the window glass (9) and the shutter (8) is closed (34) and b)switch (10) does not detect a magnetic field (35). These conditions ensure that the door or window is closed and that the installation of the device's magnetic field sensor (10) was not placed in proximity to the magnetic switches (8), (9)so as to detect the fields of the coupled magnets and is therefore ineffective. If one of these conditions is not met, the relay (20) does not close the zone (13) and thus a fault zone is displayed on the keypad of the control center. If both conditions are met the relay closes the zone (36) and the device goes to the main function (37). The microcontroller then stores (38) the condition of magnetic switches (8) and (9) and then keep comparing it with the current one(39). Any change will bring an alarm. Alarm goes off also if the switch (10) is found closed. Having established that there is no alarm treaty from the magnetic switches the system checks the motion sensors and if there is an excitation (40),it calls the subroutines that has been preselected by the user by adjusting the jumper's settings (21). Indicatively, some of the subroutines are analyzed in the following paragraphs. In these subroutines, alarm can occur either by changing the state of switches or by certain patterns of motion sensors stimulation. Especially in the latter case, the conditions causing alarm by motion sensors are: a) stimulation of the sensor (18) with a duration above a predetermined value, and b) Sequential stimulation of the first sensor (18) regardless of its duration and then of the sensor (17).

    [0014] Figure 7. This drawing shows the way in which the microcontroller processes the signals received by the two motion sensors in order to detect the presence of alarm conditions (eg breakage of glass or breach of the shutter). This subroutine is called since at least one of the two structures are closed and the state of the switches is the same as the saved one . Alternatively it can be called only when the glass is closed. The sensor (17) is used so that no false alarm occurs whenever a tenant is approaching the door/window from the interior of the house. Under certain conditions both sensors can cause an alarm. Of the two, however, only (17) can inhibit the alarm caused by sensor(18). So starting from where the two sensors are initially inactive and sensor (18) stimulation occurs which lasts over a predetermined time (41), an alarm is caused. If the duration of the stimulation is less than the one required (42) to cause alarm, the device continues its operation with the main program (37). If immediately after stimulation of sensor (18), sensor (17) is activated, the alarm goes off(43) regardless the duration of the stimulation of sensor (18). The stimulation (44) of the motion detector (17) when preceding the stimulation of sensor (18) inhibits the alarm. It also inhibits the alarm caused by the change of state (45) of the magnetic switches (8,9,10). The detector (17) causes an alarm, only when its stimulation follows the stimulation of sensor(18).

    [0015] This way of protecting the glass through two motion sensors which inhibit or confirm each other depending on their exciting sequences, is innovative and highly reliable in its operation, because it does not give false alarms and it does not fail to detect the movement of the human body in such a short distance from the devise's detectors. In addition it does not have the vulnerability of vibration detectors which, as their name says, are constructed to detect a vibration and not a violation, resulting in many false alarms. Instead, this invention is a system for detecting human body movement (since infrared detectors are designed to be stimulated by the body temperature) and is therefore fully specialized to detect the violation.

    [0016] Figure 8. This subroutine assigns more rights to the user. The alteration lies at the point (46) of the chart. Stimulation of the detector (17) allows the user not only to approach the door/window but it gives him the right to change the status of the switches and even leave them both open (47). In other words, it entitles him to open the closed construction and leave it open. The microcontroller (23) holds the relay (20) closed and so no alarm is triggering from the control center. At this point a variation can be referred to, as the change of the status of switches should be allowed to follow a specific sequence (48) which suggests motion from the inside of the house to the outside. Therefore the window glass (6) should be opened first and then the shutter (7). With this variant, since the two structures are closed, no handling at the shutter (7), is allowed, if the glass (6) is shut, even if the sensor (17) is excited. The first subroutine can be used in door/windows which are opened by an electrical mechanism, while the second can be used for the simple ones that are opened by the tenant. When both structures (glass and shutter) are opened, the device goes into a standby mode while keeping the zone closed. When at least one of the two switches (8), (9) is closed, it continues the execution of the main program (37). In practice this means that with the central system being armed, the tenant is allowed to approach a door (from the interior), open the glass or /and the shutter and then close them again in any combination or leave them open for long as he wishes. The benefit of such a system can be perceived if one imagine a house where at each door / window one such devise is installed. In this case the residents can live with the house alarm system armed, but without them being trapped inside. They can handle their doors/windows without any restriction and as long as the protection of the house is concerned this has the following positive impacts a) the alarm system is armed for longer periods and so their homes are more protected, b) the system reads the tenant's intention to open a construction by detecting the movement toward it, and automatically it disables the protection for this opening, while the main system continues to protect the rest of the house that is not visually supervised by the tenant, c) each time the glass/shutter is closed, the protection is activated automatically, d) pointless routes toward and from the control center's keyboard are avoided for simple manipulation of the structures such as for example to open a window during a hot summer night. With this invention, residential alarm systems become really smart and in a way, they behave as they distinguish the burglar from the owner. There is no reason why the response of the alarm system to owner (who opens a window from the inside), must be the same as the burglar (who opens it from the outside) . Taking into consideration the modern practice that implies alarm systems been linked to centers that accept signals, this invention saves them from extra noise caused by false alarms for example when one forgets to disarm his system before opening a window in the morning. An example of the function of the dual terminal resistance (DEOL) device is the following: the relay (29) breaks the circuit at point 2 (47). If the system is armed the alarm sounds, if not the internal process of opening the relay remains silent.

    [0017] Figure 9. As far as the implementing protection is cocerned, dr. 9 is the same with dr. 8 except that an additional right is granted. The user while stepping out of a door, may close the opening behind him. In this case, the device awaits the closed construction to be opened from the outside of the house (49). If the tenant is leaving home and he wants to activate the protection with him being outside of the house, he can perform a particular pattern of opening and closing of the closed structure (open and then close within a few sec). After this handling any attempt to open the door from the outside of the house will cause an alarm.

    [0018] At this point it should be noted that if the installed device has one terminal resistor and the user has selected the program which gives him the opportunity to leave a door/windw open , the device should be powered from the control center's terminals that give power only when the alarm system is armed. So when arming the central system, the devices that monitor open door/windows, will give a fault zone signal to the alarm keypad.

    [0019] Figure 10. This subroutine demands 2 conditions in order to be called :a) Switches (8) and (9) is open and b) the tenant must push the button on the surface of the device or alternatively close the switch (10) when opening the door/window while the sensor (17) is triggered. Another way to start the subroutine is to detect a specific pattern of an open-close movement of the closed structure (open-closed-open of the door/window in specific time). By using this pattern the window or the door are used as function buttons of the device. When performing the subroutine of Figure 10 the system detects whether a passage from the outside to the inside of the house has happened and in that case the alarm sounds. The scenario covered by this drawing is as follows: The tenant, intending to renew the air of the house, opens the doors or the window closes and reopens it to the desired range. Alternatively presses the button of the device. Then he returns to the interior of the house. From that point if someone passes from outside to inside the house, the device detects the movement and causes an alarm. So with this system, the doors / windows can remain completely open without a reduction to the home's safety.

    [0020] Figure 11 shows another function of the devise that provides security even when the doors are completely open and the tenant can pass freely to the outside and inside of his home. The initial choice of the function is made by the jumpers settings and it is called at the point 47 of the drawing 8. Each time the device detects conditions of a passage to the exterior of the house, adds a value of 1 to a variable X, whose starting value is 0. When a passage from the outside inwards happens, it subtracts 1 point from the variable X. At the end of each cycle the value of X is checked. If it is found less than 0 the alarm goes off. The subroutine continues until one of the switches (8) and (9) is closed.

    [0021] Figure 12 describes an operation without the use of infrared detectors. In this case fewer protections exist (not glass protection) as well as fewer rights (the user can not open both structures ,glass and shutter or either one if the other is already open). This chart shows the function of a more economic version of the device, without the motion detectors. This device provides the sole right to open the window glass when the shutter is closed. It also protects itself from external magnetic fields and from malicious short circuit


    Claims

    1. A security device that is connected to a central alarm system as a peripheral device, installed in an interior under protection above or adjacent to the door/window under protection, the device comprising: a first infrared motion sensor (17) and the second infrared motion sensor (18) that are arranged to detect the infrared radiation of moving persons inside the interior; terminals for the magnetic reed switches(8,9) which are installed on the side door/window and which react to the proximity of the magnets installed on moving parts of the door window constructions that close the said door /window; a button(19) for manually activating the device's functions; and a microprocessor, whereby the microprocessor runs a security program that controls the operation of a first relay (29) inside the enclosure, the first and the second relays having contacts, the contacts being connected in series to terminals the other side of which are connected to the central alarm system to form a wire loop of a zone (13), through which a current produced and monitored by the central alarm system can flow, whereby through the operation of the relays a first resistor (24) and a second resistor (28)can be incorporated into the end of the loop so that the said current can be modulated to three different values which are monitored by the central alarm system, enabling a user to modify the conditions for causing an alarm; the microprocessor being also connected to a programming slot and jumpers for updating and final adjustments of the said program respectively; the microprocessor of the device being operable to monitor the status of a) the magnetic reed switches and b) the said infrared sensors, whereby the first motion sensor (17) has an optical field extending toward the interior, while the second motion sensor(18) has an optical field extending towards the door/window such that the two fields do not overlap, wherein the stimulation sequence of the first and the second motion sensors, the status of the magnetic reed switches and the conditions for causing an alarm determine whether or not the alarm is issued by the central alarm system.
     
    2. The security device according to claim 1, wherein the two motion sensors (17) and (18) are embedded in the device's box in such a way that their visual fields extend in opposite directions and therefore are distinct and do not penetrate each other.
     
    3. The security device according to claim 1 wherein when the window and a shutter associated with the window are closed , the magnetic reed switches (8) and (9) are coupled with their magnets and thus closed while a third magnetic reed switch (10) or any other that is connected in parallel with the third magnetic reed switch is not affected by any magnetic field and so they are open.
     
    4. The security device according to claim 1, wherein the first relay (20), operate as a circuit breaker of the wire loop while the second relay(29) is connected in parallel with the second resistor (28) connected in series with the loop of the zone (13) so that it can short-circuit or not the second resistor (28).
     
    5. Peripheral security device according to claim 4, wherein the contact of the first relay (20) is a normally open contact connected in series with the loop of the zone (13).
     
    6. Method of operating a security device according to any previous claim, whereby the security program is composed of a main program(37) and from subroutines; the method comprising the step of calling the subroutines from the main program when the first and the second motion sensors (17) and (18) are stimulated.
     
    7. Operation method according to claim 6 comprising the step of installing the security device adjacent to or above a door/window so that the direction of the optical field of the first motion sensor (17) extends towards the interior of a house, while the second motion sensor (18) has an optical field extending towards the door/window glass, and so that the first motion sensor (17) is stimulated by the movement in the area extending to the interior of the room (3) to the range of sensor capabilities and a plane passing through the device, perpendicular to the floor or inclined towards the interior of the house, while the second motion sensor (18) is stimulated by movement in the space defined by the level above and the level of the door widow(6).
     
    8. Method according to claim 6 wherein during the execution of the main program(37), any change in condition of magnetic switches (8), (9) and (10) will cause an alarm.
     
    9. Method according to claim 6, characterized by the security program having minor subroutines called by specific patterns of opening and closing of the magnetic switches, so that the window glass and the shutter can be used as function buttons of the device and can enable protection from the exterior of the house.
     
    10. Method according to claim 6, characterized in that the initial stimulation sequence with the motion sensor (17) facing the inside of the house stimulating first and the motion sensor (18) facing the glass stimulating secondly, calls the subroutine during which no alarm sounds when changing the condition of magnetic reed switches (8), (9),(10) to any possible combination, thereby allowing the opening of the door's/window's glass and shutter which are installed with the magnetic switches and remain in their new situation for an indefinite period of time(47).
     
    11. Method according to claim 10, wherein if the occupant leaves the house and closes behind him the glass or the shutter, the subroutine continues to run and in the subsequent change of the state of the magnetic switches without prior stimulation of motion sensors, which happens when the occupant opens the closed construction from the exterior of the house to enter the interior (49), the alarm does not go off.
     
    12. Method of according to claim 6 wherein the excitation of the second motion sensor (18) which is pointing to the glass without prior stimulation of the first motion sensor (17) which is facing the interior of the house, causes an alarm.
     
    13. Home protection system comprising a security devise according to claim 1; a home alarm control center; a wire loop of a zone(13); and devices protecting door/window having magnetic switches and motion sensors wherein the security device is arranged to collect and process data from the associated magnetic switches, (8), (9) and (10) and built in motion sensors, (17)(18) and signal to the control center (11) of the home alarm system by changing the value of current passing through the wire loop of the zone (13).
     
    14. Home protection system according to claim 13, wherein the control center (11) is arranged to sound an alarm depending on whether the value of the current in the wire loop of the zone (13),which has been modulated by the security device via the operation of the first relay (20) and the second relay (29), is identical to the one that control center causes an alarm, so that a user can select the situation or situations of zone (13)which will cause an alarm by handling a keyboard of the control center (11).
     


    Ansprüche

    1. Ein Sicherungsschalter, der an ein zentrales Alarmsystem als ein Peripheriegerät angeschlossen ist und geschützt unter oder neben der zu schützenden Tür/dem zu schützenden Fenster installiert ist. Der Schalter bzw. das Gerät beinhaltet: einen ersten Infrarotsensor (17) und einen zweiten Infrarotsensor (18), die so arrangiert sind, dass sie die Infrarotstrahlung von sich bewegenden Personen im Inneren entdecken können; Netzstationen für die magnetischen Reed-Schalter (8, 9), die an der Seite der Tür/des Fensters installiert sind und die auf die Nähe der Magneten reagieren, die an den sich bewegenden Teilen der Tür/Fenster-Konstruktionen, durch die besagte Tür geschlossen werden kann, angebracht sind; ein Knopf (19), um die Funktionen des Schalters bzw. des Geräts manuell zu aktivieren; ein Mikroprozessor, über den ein Sicherheitsprogramm abläuft, durch das der Betrieb eines ersten Relais (29) im Inneren der Anlage gesteuert wird. Das erste und das zweite Relais verfügen über Kontakte, die in Reihe an die Netzstationen angeschlossen sind, deren andere Seite an das zentrale Alarmsystem angeschlossen ist, um so eine Drahtschleife einer Zone (13) zu bilden, durch die ein Strom erzeugt wird und fließt, was vom zentralen Alarmsystem kontrolliert wird. So können durch den Betrieb der Relais ein erster Widerstand (24) und ein zweiter Widerstand (28) in das Ende der Schleife integriert werden können, damit der besagte Strom an drei verschiedene Werte angepasst werden kann, die durch das zentrale Alarmsystem überwacht werden. Dadurch ist ein Benutzer dieses Systems in der Lage, die Bedingungen zum Auslösen eines Alarms anzupassen. Der Mikroprozessor ist außerdem mit einem Programmier-Slot und Jumpern verbunden, die jeweils zum Aktualisieren und finalen Anpassen des besagten Programms genutzt werden. Der Mikroprozessor des Geräts ist fähig, den Status von a) den magnetischen Reed-Schaltern und b) den besagten Infrarotsensoren zu überwachen, wobei der erste Bewegungsmelder (17) ein optisches Feld besitzt, das sich ins Innere erstreckt, während der zweite Bewegungsmelder (18) ein optisches Feld hat, welches sich zur Tür/zum Fenster hin erstreckt. Dies erfolgt solchermaßen, dass die beiden Felder sich nicht überlappen, wobei die Stimulationssequenz des ersten und zweiten Bewegungsmelders, der Status der magnetischen Reed-Felder und die Bedingungen zum Auslösen eines Alarms bestimmend dafür sind, ob ein Alarm vom zentralen Alarmsystem ausgelöst wird oder eben nicht.
     
    2. Der Sicherungsschalter laut Paragraph 1, worin die beiden Bewegungsmelder (17) und (18) in der Box des Geräts solchermaßen eingebettet sind, dass ihre visuellen Felder sich in entgegengesetzte Richtungen erstrecken und daher unterschiedlich sind, d.h. sich gegenseitig nicht stören bzw. sich überlappen.
     
    3. Der Sicherungsschalter laut Paragraph 1, worin, falls das Fenster und ein damit verbundener Fensterladen geschlossen sind, die magnetischen Reed-Schalter (8) und (9) mit ihren Magneten verbunden und so geschlossen sind, während ein dritter magnetischer Reed-Schalter (10) oder jeder andere, der parallel zu dem dritten magnetischen Reed-Schalter geschaltet ist, von keinem magnetischen Feld betroffen und daher offen ist.
     
    4. Der Sicherungsschalter laut Paragraph 1, worin das erste Relais (20) als ein Stromkreisunterbrecher der Drahtschleife dient, während das zweite Relais (29) parallel zum zweiten Widerstand (28) und in Reihe mit der Schleife der Zone (19) geschaltet ist, damit es den zweiten Widerstand (28) kurzschließen kann (oder auch nicht).
     
    5. Der periphere Sicherungsschalter laut Paragraph 4, worin der Kontakt des ersten Relais (20) ein normal geöffneter Kontakt ist, der mit der Schleife der Zone (13) verbunden ist.
     
    6. Die Methode, einen Sicherungsschalter laut egal welchem vorherigen Paragraphen zu betreiben, worin das Sicherheitsprogramm aus einem Hauptprogramm (37) und Unterprogrammen besteht; die Methode umfasst den Schritt, die Unterprogramme vom Hauptprogramm aufzurufen, wenn der erste und zweite Bewegungsmelder (17) und (18) stimuliert werden.
     
    7. Funktionsweise laut Paragraph 6, die den Schritt beinhaltet, den Sicherungsschalter neben oder über einer Tür/einem Fenster, so dass die Richtung des optischen Felds des ersten Bewegungsmelders (17) zu dem Inneren eines Haus hin ausgerichtet ist, während der zweite Bewegungsmelder (18) ein optisches Feld hat, das zu Tür bzw. Fenster hin ausgerichtet ist, und so dass der erste Bewegungsmelder (17) durch die Bewegungen in dem Bereich stimuliert wird, der sich bis ins Innere des Raumes (3) und bis zur Reichweite der Sensorkapazitäten erstreckt und in einer Ebene, die durch das Gerät, welches senkrecht zum Boden oder ins Innere des Hauses geneigt ist, hindurch verläuft, während der zweite Bewegungsmelder (18) durch Bewegung in dem Bereich stimuliert wird, der durch die Ebene oben und die Ebene der Tür oder des Fensters (6) bestimmt wird.
     
    8. Die Methode laut Paragraph 6, worin während der Ausführung des Hauptprogramms (37) jede Änderung der Bedingungen der magnetischen Schalter (8), (9) und (10) einen Alarm auslöst.
     
    9. Die Methode laut Paragraph 6, gekennzeichnet durch die Tatsache, dass das Sicherheitsprogramm untergeordnete Unterprogramme hat, die durch spezifische Muster von Öffnen und Schließen der magnetischen Schalter ausgelöst werden, damit so das Fensterglas und der Laden als Funktionsschalter des Gerätes verwendet werden und so vom Äußeren des Hauses den Schutz aktivieren können.
     
    10. Die Methode laut Paragraph 6, gekennzeichnet durch die Tatsache, dass die anfängliche Stimulationssequenz mit dem Bewegungsmelder (17), der ins Innere des Hauses gerichtet ist, als erstes und dem Bewegungsmelder (18), der auf das Fenster gerichtet ist, als zweites das Unterprogramm aufruft, während dem kein Alarm ertönt, wenn der Zustand der magnetischen Reed-Schalter (8), (9), (10) zu egal welcher Position geändert wird. Dadurch wird das Öffnen der Fenster bzw. der Tür und der Läden möglich, die mit den magnetischen Schaltern ausgerüstet sind und in ihrer neuen Position für eine unbestimmte Dauer verbleiben (47).
     
    11. Die Methode laut Paragraph 10, worin, wenn der Bewohner das Haus verlässt und hinter ihm das Fenster oder den Laden schließt, das Unterprogramm weiter läuft und im Folgenden den Status der magnetischen Schalter ohne die Stimulation der Bewegungsmelder ändert, der sich vollzieht, wenn der Bewohner die geschlossene Konstruktion vom Äußeren des Hauses aus öffnet, um ins Innere zu gelangen (49), und so der Alarm nicht ertönt.
     
    12. Die Methode laut Paragraph 6, worin die Anregung des zweiten Bewegungsmelders (18), der zum Fenster ohne vorherige Stimulation des ersten Bewegungsmelders (17), der wiederum zum Inneren des Gebäudes ausgerichtet wurde, hin gerichtet ist, einen Alarm auslöst.
     
    13. Das Heim-Schutz-System beinhaltet einen Sicherungsschalter laut Paragraph 1, ein Heim-Alarm-Kontrollzentrum, eine Drahtschleife einer Zone (13) und Geräte, die Türen und Fenster schützen, die magnetische Schalter und Bewegungsmelder, worin der Sicherungsschalter so eingestellt ist, dass er Daten von den angeschlossenen magnetischen Schaltern sammelt und verarbeitet. (8). (9) und (10) und die eingebauten Bewegungsmelder, (17)(18) und signalisieren dem Kontrollzentrum (11) des Heim-Schutz-Alarms, indem der Wert des Stroms geändert wird, der durch die Drahtschleife der Zone (13) fließt.
     
    14. Heim-Schutz-System laut Paragraph 13, worin das Kontrollzentrum so angeordnet ist, Alarm auszulösen, je nachdem ob der Wert des Stroms in der Drahtschleife der Zone (13), die durch den Sicherungsschalter durch den Betrieb des ersten Relais (20) und des zweiten Relais (29) geregelt wird, dem Wert des Kontrollzentrums identisch ist und durch den ein Alarm ausgelöst wird, damit ein Nutzer die Situation oder Situationen der Zone (13) durch das Bedienen der Tastatur des Kontrollzentrums auswählen kann, die einen Alarm auslöst bzw. auslösen(11).
     


    Revendications

    1. Un dispositif de sécurité qui est relié à un système central d'alarme en tant que dispositif périphérique, installé dans un espace intérieur sous protection au-dessus ou à côté de la porte / fenêtre sous protection, le dispositif comprenant : un premier détecteur de mouvement infrarouge (17) et le deuxième détecteur de mouvement infrarouge (18) dont l'arc agencé afin de détecter le rayonnement infrarouge des personnes se déplaçant à l'intérieur de l'habitacle ; des bornes pour les interrupteurs à lames souples magnétiques (8,9) qui sont installés sur le côté de la porte / fenêtre et qui réagissent à la proximité des aimants installés sur les pièces mobiles des constructions des portes fenêtre qui ferment ladite porte / fenêtre ; un bouton (19) pour activer manuellement les fonctions de l'appareil, et un microprocesseur, de sorte que le microprocesseur exécute un programme de sécurité qui commande le fonctionnement d'un premier relais (29) à l'intérieur de l'enceinte, le premier et le second relais étant en contact, les contacts étant connectés en série aux bornes de l'autre côté de laquelle sont ils raccordés au système central d'alarme pour former une boucle de fil d'une zone (13), à travers laquelle un courant produit et surveillé par le système central d'alarme peut s'écouler, de sorte que par le fonctionnement des relais une première résistance (24) et une seconde résistance (28) peuvent être intégrées à l'extrémité de la boucle de telle sorte que ledit courant peut être modulé à trois valeurs différentes, qui sont contrôlées par le système central d'alarme, permettant à un utilisateur de modifier les conditions pour déclencher une alarme ; le microprocesseur étant également relié à une fente de programmation, pour la mise à jour et les derniers réglages dudit programme, respectivement ; le microprocesseur de l'appareil pouvant être utilisé pour surveiller l'état de a) les interrupteurs magnétiques et b) lesdits capteurs à infrarouge, de sorte que le premier détecteur de mouvement (17) a un champ optique qui s'étend vers l'intérieur, tandis que le deuxième détecteur de mouvement 8) présente un champ optique s'étendant vers la porte / fenêtre de telle sorte que les deux domaines ne se chevauchent pas, dans lequel la séquence de stimulation du premier et deuxième détecteur de mouvement, l'état magnétique de des commutateurs à lames et les conditions de déclenchement de l'alarme détermine si l'alarme est émise par le système central d'alarme.
     
    2. Le dispositif de sécurité selon la revendication 1, dans lequel les deux capteurs de mouvement (17) et (18) sont noyés dans la zone périphérique, de telle manière que leur champs visuels s'étendent dans des directions opposées et donc sont distincts et ne se pénètrent pas l'un l'autre.
     
    3. Le dispositif de sécurité selon la revendication 1, dans lequel la fenêtre et un volet associé à la fenêtre est fermé, les interrupteurs à lames souples magnétiques (8) et (9) sont couplés avec leurs aimants et donc fermés lorsqu'il y a un troisième interrupteur à lames magnétique (10) ou tout autre qui est connecté en parallèle avec ie troisième interrupteur à lame magnétique qui n'est pas affecté par un champ magnétique et donc ouverts.
     
    4. Le dispositif de sécurité selon la revendication 1, dans lequel le premier relais (20), fonctionne comme un coupe-circuit de la boucle de fil tandis que le second relais (29) est relié en parallèle avec la seconde résistance (28) connectée en série avec la boucle de la zone (13) de manière à pouvoir court-circuiter ou non la seconde résistance (28).
     
    5. Le dispositif de sécurité selon la revendication 4, dans lequel le contact du premier relais (20) est un contact normalement ouvert connecté en série avec la boucle de la zone (13).
     
    6. Procédé de fonctionnement d'un dispositif de sécurité selon l'une des quelconques revendications précédentes, dans lequel le programme de sécurité est composé d'un programme principal (37) et de sous-programmes, le procédé comprenant l'étape consistant à appeler des sous-programmes du programme principal lorsque les premier et deuxième capteurs de mouvement (17) et (IS) sont stimulés.
     
    7. Procédé de fonctionnement selon la revendication 6, comprenant l'étape consistant à installer le dispositif de sécurité adjacent à ou au-dessus d'une sorte de porte / fenêtre que la direction du champ optique de manière à ce que le premier capteur de mouvement (17) s'étende vers l'intérieur d'une maison, tandis que le second capteur de mouvement (1S) a un champ optique s'étendant vers la porte / fenêtre en verre, de telle sorte que le premier capteur de mouvement (17) est stimulé par le mouvement dans la zone s'étendant à l'intérieur de la chambre (3) pour la gamme des capacités de détection et un plan passant par le dispositif, perpendiculaire au plancher ou incliné vers l'intérieur de la maison, tandis que le second capteur de mouvement (IS) est stimulé par le mouvement dans l'espace défini par le niveau au-dessus et le niveau de la fenêtre de la porte (6).
     
    8. Procédé selon la revendication 6, dans lequel au cours de l'exécution du programme principal (37), tout changement de l'état des interrupteurs magnétiques (S), (9) et (10) déclenche une alarme.
     
    9. Procédé selon la revendication 6, caractérisé par le programme de sécurité ayant des sous-routines appelées par petits modèles spécifiques d'ouverture et de fermeture des interrupteurs magnétiques, de sorte que la vitre de la fenêtre et le volet puissent être utilisés en tant que touches de fonction de l'appareil et puissent permettre la protection de l'extérieur de la maison.
     
    10. Procédé selon la revendication 6, caractérisé en ce que la séquence de stimulation initiale avec le capteur de mouvement (17) tourné vers l'intérieur de la maison stimulant le premier capteur de mouvement (18) tourné vers la vitre, appelle le sous-programme au cours duquel aucune alarme retentit lorsque changer l'état d'interrupteurs à lames souples magnétiques (8), (9), (10) pour toutes les combinaisons possibles, ce qui permet l'ouverture de la vitre de la porte / fenêtre et volets qui sont installés avec les commutateurs magnétiques et restent dans leur nouvelle situation pour une durée indéterminée (47).
     
    11. Procédé selon la revendication 10, dans lequel, si l'occupant quitte la maison et referme derrière lui la vitre ou le volet, le sous-programme continue de fonctionner et dans l'évolution ultérieure de l'état des interrupteurs magnétiques sans accord préalable de la stimulation des capteurs de mouvement, ce qui arrive lorsque l'occupant ouvre la construction fermée de l'extérieur de la maison pour entrer à l'intérieur (49), l'alarme ne se déclenche pas.
     
    12. Procédé selon la revendication 6, dans lequel la stimulation du second capteur de mouvement (18) qui est orienté vers la vitre sans stimulation préalable du premier détecteur de mouvement (17) qui est tourné vers l'intérieur de la maison, déclenche une alarme.
     
    13. Système de protection de sécurité de la maison comprenant un dispositif de sécurité selon la revendication 1 ; un centre de contrôle d'alarme de la maison ; une boucle de fil d'une zone (13), et des dispositifs protecteurs porte / fenêtre ayant des interrupteurs magnétiques ou des détecteurs de mouvement dans lesquels le dispositif de sécurité est agencé pour collecter et traiter des données à partir des commutateurs magnétiques associés, (8), (9) et (10) et des capteurs de mouvement, (17) (1S) et le signal au centre de contrôle (11) du système d'alarme à domicile en modifiant la valeur du courant traversant le la boucle de fil de la zone (13).
     
    14. Système de protection à domicile selon la revendication 13, dans lequel le centre de contrôle (11) est agencé pour déclencher une alarme, selon que la valeur du courant dans la boucle de fil de la zone (13), qui a été modulée par le dispositif de sécurité par l'intermédiaire du fonctionnement du premier relais (20) et du second relais (29) soit identique à celle qui provoque le centre de contrôle d'alarme, de sorte qu'un utilisateur puisse sélectionner la ou les situations de la zone (13) qui va provoquer une alarme de par la manipulation d'un clavier du centre de contrôle (11).
     




    Drawing









































    Cited references

    REFERENCES CITED IN THE DESCRIPTION



    This list of references cited by the applicant is for the reader's convenience only. It does not form part of the European patent document. Even though great care has been taken in compiling the references, errors or omissions cannot be excluded and the EPO disclaims all liability in this regard.

    Patent documents cited in the description