CN101175127A - Safety and guide against detector device with telephone alarm and programming method thereof - Google Patents
Safety and guide against detector device with telephone alarm and programming method thereof Download PDFInfo
- Publication number
- CN101175127A CN101175127A CNA2007101629326A CN200710162932A CN101175127A CN 101175127 A CN101175127 A CN 101175127A CN A2007101629326 A CNA2007101629326 A CN A2007101629326A CN 200710162932 A CN200710162932 A CN 200710162932A CN 101175127 A CN101175127 A CN 101175127A
- Authority
- CN
- China
- Prior art keywords
- telephone
- key
- alarm
- circuit
- signal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Alarm Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The present invention discloses a security detector with a telephone alarm function and a programming method. The detector is composed of a detector shell, an infrared detecting head and a control circuit, wherein, the control circuit is composed of a single-chip microcomputer, a siren circuit and a telephone communication circuit, the telephone communication circuit includes a port connected with an exterior telephone line, a port connected with a random telephone, a dialing part, a number receiving part, a switching control circuit, a remote controller and a radio signal receiving circuit. The programming method includes the configuration of an alarm receiving telephone number or / and the configuration of the access password of an exterior telephone or / and the learning method of exterior wireless defence area detectors or / and the learning method of the remote controller. The security detector does not need a keyboard, uses the wireless remote control programming and can independently realize telephone remote alarm, and moreover, the security detector can also be added with the extended functions of exterior wired or wireless defence areas and provide the sharing of the telephone alarm resources of multiple detectors.
Description
Technical Field
The invention relates to a detector device which can alarm and is used for safety precaution, in particular to a detector device which can remotely alarm by a telephone and a method for programming the device by utilizing remote control guidance.
Background
Common safety precaution detectors include anti-theft passive pyroelectric infrared mobile human body detectors, infrared detectors for short, fireproof smoke detectors, gas sensitive detectors for preventing harmful gas poisoning, and the like. The security detector can only sound an alarm on site when used alone. And on the basis of field alarm, wireless remote control arming and disarming functions are added, such as Shenzhen Rui electric RD-HW200 infrared field alarm detectors and deterrence KM-2000T infrared field alarm detectors. The security probe needs to realize telephone remote alarm by an alarm host or a special telephone dialing tool, and a programming keyboard is needed when a telephone number is set. The installation and programming of the equipment are difficult to master, the manufacturing cost is high, the equipment is difficult to accept by common people, the equipment is generally used for community batch users, and special managers are used for installing and programming the equipment. Because the existing security detector is limited by volume and space, the telephone alarm system and the detector are difficult to combine together to form a detector with telephone alarm, which has small volume and convenient use.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a security detector device which can independently realize remote telephone alarm. The device does not need a keyboard, uses wireless remote control to guide programming, simplifies the programming procedure and enables ordinary people to use the device. The extension function of an external wired and wireless defense area is added, and the sharing of telephone alarm resources of a plurality of detectors is provided; the functions of entering an external telephone password, performing arming and disarming on the external telephone password, monitoring the external telephone password on the external telephone password, and the like are added.
It is another object of the present invention to provide a method of programming the above-described detector apparatus using remote guidance. The programming is the setting of the telephone number for receiving the alarm condition, the setting of the password for the external telephone to enter and the learning of the external wireless defense area.
In order to achieve the first object, the following technical solutions may be adopted: the detector of this scheme includes:
a detector housing;
a probe and its amplifying circuit;
a wireless receiving circuit for receiving the signal of the remote controller. Has the functions of receiving, amplifying and demodulating.
The alarm whistle circuit comprises a buzzer and a driving circuit thereof, and can send out alarm whistle sound for on-site alarm;
a telephone communications circuit comprising:
an interface for connecting the telephone outside line and an interface for connecting the random telephone;
the dialing part is a coding circuit for sending a telephone number and an alarm prompt tone for a singlechip dialing program, and is used for dialing a telephone for receiving an alarm condition and transmitting alarm condition information;
the number receiving part is a decoding circuit for receiving the telephone number, is used for receiving the telephone key information on the telephone line and transmitting the telephone key information to the singlechip for corresponding processing;
the switch control circuit is used for controlling the on-off of the random telephone and the off-hook and on-hook of the telephone of the detector;
and the control circuit consists of a singlechip and software thereof. The single chip microcomputer is respectively connected with the infrared detection head, the wireless receiving circuit, the siren circuit and the telephone communication circuit, and controls the whole circuit to work, read, write and store various data and information;
and the key signals transmitted by the remote controller are demodulated by the wireless receiving circuit and then are sent to the singlechip for identification and processing. The detector is used for controlling arming, disarming, alarming for help, alarming for midway quitting and the like. In the programming, it sends out programming instructions to guide the telephone number setting, or/and password setting, or/and the learning of the external wireless defense area.
In addition to the above scheme, the telephone communication circuit may further include:
a broken line detection circuit, when the telephone alarm is given, if the broken line of the telephone is changed into the on-site alarm; or/and a ringing detection circuit, when the ringing sound is ringing continuously for the set number of times and the random telephone is not picked up by man, the single chip microcomputer controls automatic picking up; or/and a monitoring circuit which is a field monitoring amplifying circuit.
On the basis of the scheme, the single chip microcomputer can be further connected with a wireless defense area detector arranged outside through a wireless receiving circuit.
On the basis of the scheme, the single chip microcomputer can be further connected with an external wired defense area detector through a wired defense area interface circuit.
In order to achieve the second object, the present invention adopts the following technical solutions: the programming method of the scheme comprises the steps of setting an alarm receiving telephone number or/and an external telephone entering password or/and learning an external wireless defense area detector or/and learning a remote controller; wherein,
the setting of the telephone number of receiving alarm adopts a remote controller to guide programming, and the steps are as follows:
firstly, a remote controller sends out a telephone programming instruction;
secondly, the device receives the programming instruction and then connects a telephone line to prepare for receiving the key information of the random telephone;
thirdly, the random call is dialed to receive the alarm call, and the end is finished by pressing an end mark key; the device reads, decodes and temporarily stores the random telephone dialing key number from the line in real time; storing the telephone number after receiving the 'end' mark key;
the setting of the external phone access password is as follows:
after the random telephone dials the alarm receiving telephone number, the interval mark key is pressed, then the password is input, and the ending key is pressed to end; meanwhile, the device reads, decodes and temporarily stores the data from the line in real time; after receiving the 'end' mark key, respectively storing the telephone number and the password according to the 'interval' key;
the learning of the external wireless defense area detector is approved by adopting a method of programming and guiding learning by a remote controller, and the method comprises the following steps:
firstly, a remote controller sends out a wireless defense area programming instruction;
secondly, the device is in a learning waiting state after receiving the signal;
triggering external wireless defense area equipment to transmit signals; meanwhile, the device receives, decodes and temporarily stores the data in real time; after checking, storing the address code, the defense area is approved by learning;
the remote controller learning is as follows:
the learning method is adopted for recognition, namely the device receives effective wireless signals for the first time after being electrified, and the address code of the device is stored as the address code of the remote controller.
The invention has the beneficial effects that:
1. the detector can independently realize telephone remote alarm;
2. because the remote controller is adopted to guide programming, hardware of a keyboard system is saved, the cost is reduced, and the problem of insufficient structural space of the detector is solved;
3. the programming method is simple and convenient, and is suitable for wide crowds;
4. because the defense area expanding function is added, the multifunctional mobile phone is multipurpose.
In order that the invention may be more clearly and readily understood, reference will now be made in detail to the accompanying drawings and examples.
Drawings
FIG. 1 is a circuit block diagram of an embodiment of a detector of the present invention;
FIG. 2 is a circuit block diagram of the portion of the telephone communications circuitry of FIG. 1;
FIG. 3 is a specific circuit diagram of an embodiment of the detector of the present invention;
FIG. 4 is a software workflow diagram of an embodiment of the present invention.
Detailed Description
Example 1, see figures 1-3. The detector of the present embodiment includes:
a probe housing (not shown);
an infrared detector 5, it includes infrared sensing head and its amplifying circuit;
a single chip microcomputer circuit 1 comprises a single chip microcomputer and internal software thereof. The single chip microcomputer is respectively connected with the infrared detector 5, a wireless receiving circuit 7, a siren circuit 10, a telephone communication circuit 2 and the like. The whole work of the circuit is controlled by the internal program of the singlechip 1.
A telephone communications circuit 2 comprising:
an interface JP1 for connecting the external line of the telephone and an interface JP2 for connecting the random telephone;
a dialing part 205, which is a coding circuit for sending telephone numbers and telephone alarm prompt tones for the singlechip dialing program, and is used for dialing the telephone for receiving the alarm condition and transmitting the alarm condition information;
a number receiving part 204, which is a receiving and decoding circuit for receiving the telephone key information and is used for receiving the telephone key information on the telephone line and sending the telephone key information to the singlechip for corresponding processing;
the switch control circuit 201 is used for controlling the on-off of a random telephone and the off-hook and on-hook of the telephone of the detector;
a wireless receiving circuit 7; the remote controller receives a wireless signal 9 of a remote controller 8, demodulates the signal and then transmits the demodulated signal to the singlechip 1;
a remote controller 8, which is used for controlling the detector to perform arming, disarming, alarming for help, giving an alarm in midway and quitting; in the programming, it sends out programming instructions to guide the telephone number setting, or/and password setting, or/and the learning of the external wireless defense area.
An alarm whistle circuit 10 includes a buzzer and a driving circuit thereof. In addition, the following can be added:
a disconnection detection circuit 202, which is used for alarming if the disconnection of the telephone is changed into on-site alarming;
a ringing detection circuit 203, when the ringing sound is set for the number of continuous ringing and the random telephone is not picked up by man, the single chip controls the detector to pick up the telephone and receives the control of the external telephone;
a monitor circuit 206, which is a site monitor amplifying circuit;
the model of the single chip microcomputer is preferably PIC 716. The dialing chip U3 in the dialing part is HT9200A, and the number receiving chip U4 in the number receiving part is MT 8870.
Example 2, see also fig. 1 and 3. In this embodiment, on the basis of the above embodiments, the single chip microcomputer 1 performs signal transmission with a plurality of wireless detectors (not shown in the figure) arranged outside the device in a defense area through a wireless receiving circuit to perform monitoring and alarming at a plurality of positions.
Example 3, see again figures 1 and 3. In this embodiment, on the basis of the above embodiment 1, the single chip microcomputer 1 is connected with two wired defense area interface circuits 61 and 62. The interface can be connected with a plurality of wired detectors which are connected with the interface and are outside the device, so that monitoring and alarming of a plurality of parts can be carried out.
Example 4, see fig. 4. The embodiment describes a programming method of a detector with a telephone alarm, which comprises the following steps:
(1) "Power on" 400: electrifying the detector;
(2) "learning remote controller" 401: is a waiting and learning wireless remote controller;
(3) "signal query" 402: various signals are inquired when the device is in standby operation;
signal interrogation includes several signal conditions:
(i) "ringing signal" 420, "receive incoming call key signal and correspond to and process" [403 ];
(ii) "remote controller arming and disarming signal" 421, "arming and disarming program processing" 404;
(iii) "alarm signal" 422, "execute alarm program" 405, "alarm complete" 406;
(iv) "remote control programming signal" 423, "remote control second key signal" 407.
After receiving the remote control programming signal, the remote control second key signal is checked to determine the programming content. In the embodiment, the remote control programming signal is obtained by pressing the 'D' key of the remote controller for three seconds, and the single chip microcomputer waits for a second remote control signal after entering a programming program so as to determine the programming content. If the second remote control key is the 'A' key, the first group of alarm receiving telephone numbers are set, if the second remote control key is the 'B' key, the second group of alarm receiving telephone numbers are set, if the second remote control key is the 'C' key, the first wireless defense area is learned, and if the second remote control key is the 'D' key, the second wireless defense area is learned.
(4.1) "set phone 1 or 2" 424, i.e. receive the remote programming second key "a" or "B" key signal;
(4.2) "learn wireless defence area 1 or 2" 425, i.e. receive remote programming second key "C" or "D" key signal;
the telephone programming is:
(5.1) "off hook (i.e., pull-in J2), receive gate" 408: when the device is in an off-hook state, the number receiving circuit and the singlechip prepare to receive the telephone number;
(5.2) "random telephone off-hook, dial" 409: inputting an alarm receiving telephone number or/and an external line access password for the random telephone;
(5.3) "receive number circuit real-time receive number" 410: receiving and decoding signals for the device on the telephone line in real time;
(5.4) "real-time read, staging" 411: reading and temporarily storing the data for the singlechip in real time;
(5.5) "# bond no" 412: whether the read key signal has a "#" key is indicated, and the "#" key is an end mark;
(5.6) "hang up, U4 forbidden to select, sort, store" 413, the number is finished, the sorting means that "+" key is as the interval mark of telephone number and password, namely the number before "+" key is the telephone number, the number after "+" key is the password;
the wireless defense area programming is:
(6.1) "wait for Wireless Signal" 414: waiting for the single chip microcomputer for a corresponding external wireless defense area detector to transmit a signal;
(6.2) "Wireless device Transmission Signal" 415: triggering an external wireless defense area detector to transmit a signal;
(6.3) "receive" 416: receiving, decoding and temporarily storing the device in real time;
(6.4) "check" 417, checking the signal, and re-accepting again if there is an error;
(6.5) "memory address code" 418: and storing the address code for the singlechip as the identity code of the wireless defense area, finishing the wireless defense area and returning the program.
Example 5, see figure 3. This embodiment is based on the above embodiment 3, and the remote controller is designed to include a plurality of keys, in this embodiment 4 keys, each of which can be represented and distinguished by letters "a", "B", "C" and "D", respectively, and different data codes can be transmitted through these keys. In the figure, "U2" is a single chip microcomputer, and the model adopts PIC16C 716. The infrared detector 5 is a pyroelectric infrared sensor and an amplifying circuit thereof; the wired defense area 1 and the wired defense area 2 are wired defense area normally open/normally closed interface circuits; the wireless receiving circuit 7 is a wireless signal receiving circuit; dialing 205 is a circuit for sending telephone double-tone signals and telephone alarm prompt tones; the receiving number 204 is used for receiving a telephone dual-audio signal and a decoding circuit; monitor 206 is a live monitor amplifier circuit, and "M1" is a receiver. "JP 1" is the telephone outside line jack and "JP 2" is the user telephone (i.e., random access telephone) jack. The telephone external line of the telephone control switch 201 is connected with the device to control the switch circuit and consists of a triode Q3, a relay J2, a transformer T1 and the like; the user telephone control of the telephone control switch 201 is composed of a transistor "Q2", a relay "J1", and the like. The telephone line disconnection detection 202 is composed of a bridge rectifier stack 'BRG 1', an optical coupler 'U1' and the like; the telephone ringing signal detection 203 is composed of a bridge rectifier "BRG 2", an optical coupler "U5", and the like; the alarm whistle circuit 10 comprises a triode 'Q1', an inductor 'L1', a buzzer 'Y1' and the like; "C6", "C7", and "C9" are signal coupling capacitances. In the figure, a piezoresistor [ RV1] and a transient suppression diode [ DV1] are telephone line protection elements; the light-emitting diode [ D1] is a working state indicator light; the resistors [ R6] and the thermistor [ RT1] are infrared detector signal temperature compensation devices and are processed by software.
The working principle of the detector is explained in detail as follows:
the term terms in this specification are defined as:
a defense area: refers to a unit composed of detectors in the same area or type, for example, a wireless defense area is composed of a plurality of wireless detectors.
Full defense deployment: it means that all the defence areas are set to a monitoring state. After full defense arrangement, the detectors in any defense area can alarm in case of alarm.
And (3) peripheral defense arrangement: outside areas of defense that may be individually armed, such as a detector head disposed on a gate of a yard.
And (3) complete defense withdrawal: and the monitoring states of all defense areas are removed, and all defense areas cannot give an alarm.
Address code: the wireless device transmits a signal containing a code for its own identity.
Programming: the method refers to the setting of a telephone number for receiving an alarm condition, the setting of a password for an external telephone to enter and the learning of an external wireless defense area.
Learning: when the alarm enters the learning state, the process of reading the address code of the received wireless signal into the storage is called learning. The learned address code is used as a basis for later identification of the wireless device.
Alarm quitting: the finger exits the alarm state.
1. The detector is firstly powered on;
2. learning the remote controller:
the alarm is in a state of waiting for the remote controller to send a signal, namely the port of the singlechip RB0 repeatedly inquires a wireless signal. If a valid wireless signal is received, the address code is stored in the internal memory as the identity code of the remote controller;
3. and (3) signal query:
the contents of the query are as follows:
(1) remote controller signal: according to the data code of the remote controller, judgment is carried out, and five states exist during judgment: A. b, C, D the four keys are respectively for peripheral arming, full disarming and seeking help. The long press of the D key for 3 seconds enters programming. The arming and disarming are only related to the internal processing of the single chip microcomputer, the state marks are registered, and the external alarm signals are checked to see whether the marks are processed or not. If the program is entered, then the 2 nd remote control signal is checked, and the telephone number for setting the 1 st group alarm receiving or the telephone number for setting the 2 nd group alarm receiving, the learning wireless defense area 1 or the learning wireless defense area 2 are respectively and correspondingly input. When the 2 nd remote control signal is found, corresponding processing is carried out;
each time the remote controller is operated, it is received by the RB0 port of U2, which key of A, B, C, D is identified based on the data code of the remote controller, and then the corresponding task is executed. Except the C key, the arming and disarming keys are prompted by driving a buzzer to make different sounds through an RB3 port.
(2) Infrared signals of the machine;
(3) external wireless defence area signals, but the wireless defence area signals must have been learned, otherwise no inquiry is given;
(4) a wired defense area signal;
(5) ringing signal, but the external telephone must pass the input of the above-mentioned step (1), i.e. set cipher code. Otherwise, no treatment is given;
4. programming:
(1) setting a telephone number: when receiving the telephone number setting signal of the remote control group 1 or group 2, the singlechip gates the U4, controls the J2 in the switch circuit to pick up, and the J1 keeps the state of connecting the telephone 4 (random telephone), so that the telephone 4 obtains the power from the external line 3 to carry out off-hook dialing. At this time, the external line interface JP1, the telephone interface JP2 and the internal communication line are all on the same signal line, the telephone is off-hook to dial the telephone handset or the telephone number to be alarmed (namely, the telephone number to be alarmed), the signal is sent out through the external line, and the internal part enters the DTMF end of the number receiving chip U4 through J2, T1 and C6 in the switch control circuit, after being internally decoded, the binary code is output through the ports D1-D4 and is sent to the RB2-RB7 interface of the singlechip U2. When U2 receives the signal of "#" number, U2 controls J2 to release, switch off, U4 forbids selection, number receiving is finished, and telephone number and password are stored at the same time;
(2) wireless defense area signal learning: when a signal for learning the wireless signal of the remote controller is received, the wireless defense area equipment is started to send a signal, the signal is demodulated by a wireless receiving circuit and sent to an RB0 port of a singlechip U2 for receiving, and an address code of the signal is stored as an identity code of the wireless defense area, namely the process is finished;
5. external phone entry (also known as remote control):
when the password is set, the external phone is allowed to enter. When a ringing signal exists, the ringing signal is sent to an RB7 port of a singlechip U2 through C8, R14, BRG2, DZ3 and an optical coupler U5 in a ringing detection circuit, and a program of U2 starts to record the ringing frequency. If ringing for 8 times, it is proved that the telephone is not answered by people, J2 is controlled to pick up, i.e. to pick up the telephone, and the signal receiving circuit U4 gates to prepare to receive an external line signal; the working process of the signal receiving circuit is the same as that of the signal receiving circuit: firstly, receiving the password and checking with the password originally stored in the password, then receiving the instruction code (namely the key number) downwards after checking, and respectively executing corresponding tasks such as arming, disarming, monitoring, password modification and the like according to the instruction. If the monitoring is carried out, the RB4 pin of the U2 outputs low level, so that the J-Q2 in the monitoring circuit is conducted, the monitoring circuit is electrified to work, a microphone M1 receives sound, J-U1A amplifies the sound, the J-Q1 is driven, the sound is sent out through C9, and the sound is coupled to a telephone line through a transformer T1. When the instruction of the # number is received, the J2 is controlled to release the on-hook, the U4 is forbidden to select, and the operation is finished.
The modified password is input twice, and after the modified password is determined by the alarm, a determination prompt sound is replied. During operation, the alarm will answer a warning tone. The prompt tone is sent to U3 through U2, RB1 and RB2 ports, is coded and decoded by U3, then is sent out a single tone group through a DTME pin, and is coupled to a telephone line through C7-T1.
6. And (3) alarming: the alarm is in accordance with the alarm condition. Pressing the 'help-seeking' key of the remote controller is unconditional alarm. The alarm is allowed in all defense arrangements, the infrared detector, the external wired defense area and the external wireless defense area. When the periphery is equipped with defense, the detectors in the peripheral defense area allow alarming. The wired defense area 1 and the wireless defense area 1 can be defined as peripheral defense areas. The alarm signal is received by the port corresponding to the U2, the internal program is screened, and the alarm program is entered after the internal program is determined.
When alarming, whether the telephone number exists in the internal memory is checked through a program, if not, the telephone is not dialed, the site alarming is carried out for one minute, namely, a RB3 pin of U2 sends out a siren sound to drive Q1 in a siren circuit, and L1 generates an audio high voltage to drive a buzzer Y1 to sound. If there is a telephone number, the alarm receiving telephone is dialed, i.e. firstly, the RA3 port of U2 drives Q2 to make J1 attract, the JP2 port of the telephone is disconnected with the external line, i.e. called "wire robbing", after 1-2 seconds of delay, the RA2 port drives Q3 and J2 to attract, the alarm is connected with the external line of the telephone, i.e. off-hook. Then the telephone number signal is sent out from ports RB1 and RB2 to a dialing chip U3, and the telephone number double-tone signal is sent out to a telephone line by a DTME pin after coding.
After dialing the number, because RA2 is in high level, the number receiving chip U4 is gated, waiting for the alarm receiving telephone to reply the key signal, if the alarm receiving telephone is connected, the key signal should be replied to control the alarm state of the alarm. If a key signal is returned, a corresponding double-tone signal appears on the telephone line, and the double-tone signal is decoded by the U4 and transmitted to the single chip microcomputer to process the alarm state, namely, the key signal content is returned according to the program definition to perform corresponding processing, namely, the alarm is terminated, or the site alarm is given or the monitoring is connected. If no key-back signal is received, it is proved that no alarm receiving telephone is dialed, another group of alarm receiving telephones is dialed after the telephone is hung up, if another group of alarm receiving telephones is not set, the group of telephones is redialed, if no key-back signal exists after the telephone is dialed three times, the site alarm is given for one minute, after that, the circuit is recovered, and the program returns.
After each dialing, the single chip sends corresponding alarm prompt tone to the alarm receiving telephone through the dialing circuit. Each defense zone is represented by a different alert tone, defined by software.
Before each dialing off hook, firstly, whether the telephone line is disconnected is detected, if so, the on-site alarm is entered, namely, whether the RB6 pin of the U2 is in a low level or not is checked, if the telephone line exists, the current of the light emitting diode in the U2 passes through, and the RB6 port is in a low level. If the high level is high level, the telephone line is disconnected.
The remote controller alarm-withdrawing key signal is inquired in real time in the alarm (the remote controller arming-withdrawing signal is not received in the alarm, in the embodiment, the remote controller D is used as the alarm-withdrawing key), and if the alarm-withdrawing key signal is received, the alarm is ended.
Claims (7)
1. The utility model provides a take security protection detector device of phone alarm which characterized by includes: a detector housing;
a probe and its amplifying circuit;
a wireless receiving circuit, which receives the remote controller signal and has the functions of receiving, amplifying and demodulating;
the alarm whistle circuit comprises a buzzer and a driving circuit thereof, and can send out alarm whistle sound for on-site alarm;
a telephone communications circuit comprising:
an interface for connecting the telephone outside line and an interface for connecting the random telephone;
the dialing part is a coding circuit for sending a telephone number for a singlechip dialing program and is used for dialing a telephone for receiving an alarm condition;
the number receiving part is a decoding circuit for receiving the telephone number, is used for receiving the telephone key information on the telephone line and transmitting the telephone key information to the singlechip for corresponding processing;
the switch control circuit is used for controlling the on-off of the random telephone and the off-hook and on-hook of the telephone of the detector;
the control circuit comprises a singlechip and software thereof; the single chip microcomputer is respectively connected with the infrared detection head, the wireless receiving circuit, the siren circuit and the telephone communication circuit, and controls the whole circuit to work, read, write and store various data and information;
the remote controller is used for sending the key signals transmitted by the remote controller into the singlechip for identification and processing after the key signals are demodulated by the wireless receiving circuit; the detector is used for controlling arming, disarming, distress alarm, midway exit of alarm and the like; in the programming, it sends out programming instructions to guide the telephone number setting, or/and password setting, or/and the learning of the external wireless defense area.
2. The security detector device with telephone alarm as claimed in claim 1, wherein said telephone communication circuit further comprises:
the circuit for detecting the disconnection, if the disconnection of the telephone is changed into the on-site alarming when the telephone gives an alarm; or/and a ringing detection circuit, when the ringing sound is ringing continuously for the set number of times and the random telephone is not picked up by man, the single chip microcomputer controls automatic picking up; or/and a monitoring circuit which is a field monitoring amplifying circuit.
3. The security detector device with telephone alarm as claimed in claim 1 or 2, wherein the said single chip microcomputer is connected to the wireless defense area detector through the wireless receiving circuit.
4. The security detector device with telephone alarm as claimed in claim 1 or 2, characterized by a wired defense area interface circuit device, through which the said single chip microcomputer is connected to an external wired defense area detector.
5. The security detector device with telephone alarm as claimed in claim 1 or 2, wherein said remote controller comprises a plurality of keys, each key being represented and distinguished by letters "a", "B", "C", "D", etc.
6. A programming method of security protection detector device with telephone alarm is characterized in that the programming method comprises the setting of alarm receiving telephone number or/and the setting of external telephone entering password or/and the learning of external wireless defense area detector or/and the learning method of remote controller; wherein,
the setting of the telephone number of receiving alarm adopts a remote controller to guide programming, and the steps are as follows:
firstly, a remote controller sends out a telephone programming instruction;
secondly, the device receives the programming instruction and then connects a telephone line to prepare for receiving the key information of the random telephone;
thirdly, the random call is dialed to receive the alarm call, and the end is finished by pressing an end mark key; the device reads, decodes and temporarily stores the random telephone dialing key number from the line in real time; storing the telephone number after receiving the 'end' mark key;
the setting of the external phone access password is as follows:
after the random telephone dials the alarm receiving telephone number, the interval mark key is pressed, then the password is input, and the ending key is pressed to end; meanwhile, the device reads, decodes and temporarily stores the data from the line in real time; after receiving the 'end' mark key, respectively storing the telephone number and the password according to the 'interval' key;
the learning of the external wireless defense area detector is approved by adopting a method of programming and guiding learning by a remote controller, and the method comprises the following steps:
firstly, a remote controller sends out a wireless defense area programming instruction;
secondly, the device is in a learning waiting state after receiving the signal;
triggering external wireless defense area equipment to transmit signals; meanwhile, the device receives, decodes and temporarily stores the data in real time; after checking, storing the address code, the defense area is approved by learning;
the remote controller learning is as follows:
the learning method is adopted for recognition, namely the device receives effective wireless signals for the first time after being electrified, and the address code of the device is stored as the address code of the remote controller.
7. The programming method of the security detector device with telephone alarm as claimed in claim 6, characterized by comprising the following steps:
(1) "power up" [400 ]: electrifying the detector;
(2) "learning remote controller" [401 ]: is a waiting and learning wireless remote controller;
(3) "Signal query" [402 ]: various signals are inquired when the device is in standby operation;
signal interrogation includes several signal conditions:
(i) a ringing signal [420], "an incoming call key signal is received and corresponding processing is performed" [403 ];
(ii) "remote controller arming and disarming signal" [421], "arming and disarming program processing" [404 ];
(iii) an alarm signal [422], "execute an alarm program" [405], "alarm end" [406 ];
(iv) "remote control programming signal" [423], "remote control second key signal" [407 ].
After receiving the remote control programming signal, the remote control second key signal is checked to determine the programming content. In the embodiment, the remote control programming signal is obtained by pressing the 'D' key of the remote controller for three seconds, and the single chip microcomputer waits for a second remote control signal after entering a programming program so as to determine the programming content. If the second remote control key is the 'A' key, the first group of alarm receiving telephone numbers are set, if the second remote control key is the 'B' key, the second group of alarm receiving telephone numbers are set, if the second remote control key is the 'C' key, the first wireless defense area is learned, and if the second remote control key is the 'D' key, the second wireless defense area is learned.
(4.1) "set phone 1 or 2" [424], i.e. receive the remote programming second key "A" or "B" key signal;
(4.2) "learn wireless defence area 1 or 2" [425], namely receive the second key "C" or "D" key signal of remote programming;
the telephone programming is:
(5.1) "off hook (i.e., pull-in J2), receive circuit gate" [408 ]: when the device is in an off-hook state, the number receiving circuit and the singlechip prepare to receive the telephone number;
(5.2) "random telephone off-hook, dial" [409 ]: inputting an alarm receiving telephone number or/and an external line access password for the random telephone;
(5.3) "receive circuit real-time receive" [410 ]: receiving and decoding signals for the device on the telephone line in real time;
(5.4) "real-time read, scratch" [411 ]: reading and temporarily storing the data for the singlechip in real time;
(5.5) "# bond no" 412: whether the read key signal has a "#" key is indicated, and the "#" key is an end mark;
(5.6) "hang up, U4 forbidden selection, sorting and storing" [413], finishing number reception, sorting means that "-" key is used as interval mark of telephone number and password, namely, the number before "-" key is telephone number, the number after "-" key is password;
the wireless defense area programming is:
(6.1) "wait for Wireless Signal" [414 ]: waiting for the single chip microcomputer for a corresponding external wireless defense area detector to transmit a signal;
(6.2) "Wireless device Transmit Signal" [415 ]: triggering an external wireless defense area detector to transmit a signal;
(6.3) "receive" [416 ]: receiving, decoding and temporarily storing the device in real time;
(6.4) "check" [417], check the signal, if there is an error, re-receive again;
(6.5) "memory address code" [418 ]: and storing the address code for the singlechip as the identity code of the wireless defense area, finishing the wireless defense area and returning the program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2007101629326A CN101175127A (en) | 2006-09-25 | 2007-09-24 | Safety and guide against detector device with telephone alarm and programming method thereof |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200620014869.2 | 2006-09-25 | ||
CN200620014869 | 2006-09-25 | ||
CNA2007101629326A CN101175127A (en) | 2006-09-25 | 2007-09-24 | Safety and guide against detector device with telephone alarm and programming method thereof |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101175127A true CN101175127A (en) | 2008-05-07 |
Family
ID=39423375
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2007101629326A Pending CN101175127A (en) | 2006-09-25 | 2007-09-24 | Safety and guide against detector device with telephone alarm and programming method thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101175127A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101887249A (en) * | 2009-05-15 | 2010-11-17 | 李凡兴 | Room state monitoring and management system |
CN104240464A (en) * | 2014-10-22 | 2014-12-24 | 成都市幻多奇软件有限公司 | Telephone network-based wireless alarm system |
CN110505358A (en) * | 2019-08-09 | 2019-11-26 | 苏州浪潮智能科技有限公司 | A kind of transaudient alarm method of phone and device |
CN113763655A (en) * | 2021-09-24 | 2021-12-07 | 深圳市蓝丝腾科技有限公司 | Alarm host control circuit with mobile phone communication function |
-
2007
- 2007-09-24 CN CNA2007101629326A patent/CN101175127A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101887249A (en) * | 2009-05-15 | 2010-11-17 | 李凡兴 | Room state monitoring and management system |
CN104240464A (en) * | 2014-10-22 | 2014-12-24 | 成都市幻多奇软件有限公司 | Telephone network-based wireless alarm system |
CN110505358A (en) * | 2019-08-09 | 2019-11-26 | 苏州浪潮智能科技有限公司 | A kind of transaudient alarm method of phone and device |
CN113763655A (en) * | 2021-09-24 | 2021-12-07 | 深圳市蓝丝腾科技有限公司 | Alarm host control circuit with mobile phone communication function |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7212114B2 (en) | Communication apparatus | |
US20040036573A1 (en) | Method and apparatus for providing access to a secure region | |
CN107093244A (en) | Abnormal unlocking control method based on door lock | |
CN207458160U (en) | Entrance intelligent access control system | |
KR20130080583A (en) | Security system | |
CN101175127A (en) | Safety and guide against detector device with telephone alarm and programming method thereof | |
KR100742754B1 (en) | Unattended detection security system and its operation method | |
CN201069874Y (en) | Theft and robber-prevention tracking alarming device for multi-function remote control car based on a mobile phone | |
KR200234152Y1 (en) | Telephone System Having Remote Alarm/Interphone Function | |
KR200427005Y1 (en) | Car Disinfection System | |
US20040204054A1 (en) | Automatic voice and image inter-cellular phone security communication system | |
JP4736924B2 (en) | Intercom system | |
JP2001140515A (en) | Lock control method and lock control system using radio telephone set | |
JP2003234848A (en) | Portable telephone set, remote monitoring system utilizing portable telephone set and remotely monitoring method | |
KR100713259B1 (en) | Car Disinfection System | |
KR101063751B1 (en) | Biometrics-based Passenger Identification and Information Transmission System | |
CN204887230U (en) | Building intercom system based on 4G communication | |
JP2008059311A (en) | Intruder detection system | |
KR200292172Y1 (en) | Digital lock for door | |
CN107277424A (en) | A kind of Intelligence Visible-speaking System | |
CN1169642A (en) | Radio call receiver | |
CN204887229U (en) | Building intercom system based on GSM and 4G duplex | |
KR100542610B1 (en) | Door phone and remote telephone call in home automation system and method thereof | |
JP2551594B2 (en) | Monitoring and calling system for apartments | |
CN207182051U (en) | A kind of online security pre-warning system of open cell |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Open date: 20080507 |