![]() METHODS OF AUTOMATIC DISARMING AND USE OF AN INTRUSION ALARM SYSTEM AND ALARM SYSTEM THEREFOR
专利摘要:
To disarm an intruder alarm system (12) comprising an alarm central (14), at least one intrusion detector (20) comprising at least one sensor and a transmission circuit communicating with the alarm center (14), and at least one automatic disarming module (34), one proceeds as follows: following an intrusion detection by the intruder detector (20), the intrusion detector (20) seeks to establish a communication with a nomadic terminal (40), then if the call is established and if the automatic disarming module (34) recognizes the nomadic terminal (40) as belonging to a list of one or more authorized terminals, the automatic disarming module (34) disarms the alarm system (12). 公开号:FR3040817A1 申请号:FR1558215 申请日:2015-09-04 公开日:2017-03-10 发明作者:Maxime Briquet;Gilles Grange 申请人:Domis SA; IPC主号:
专利说明:
METHODS OF AUTOMATIC DISARMING AND USE OF AN INTRUSION ALARM SYSTEM, AND ALARM SYSTEM THEREOF TECHNICAL FIELD OF THE INVENTION The invention relates to the disarmament of an anti-extrusion alarm system, particularly in a building or more generally in a large area to protect such as a speaker, a ship or an aircraft. STATE OF THE PRIOR ART An alarm system generally consists of a central alarm that receives information from detectors [eg movement, opening, breakage of ice ...) distributed in the area to protect and at its periphery, and other devices such as a keypad. To activate and deactivate such an alarm system, the user has a code to enter on a keyboard or a remote control, or an RF1D badge to present in front of a badge reader. In all cases, a specific action of the user is required, and this action is sometimes a source of error and an inadvertent triggering of the alarm. Also known is an alarm system with an alarm panel connected to the mains and equipped with a Bluetooth low energy communication module ("Bluetooth Low Energy" or BLE) which scrutinizes the emission of frames by a remote control of the alarm system or by a computer equipped with a specific application and which allows the automatic arming and disarming of the alarm, as well as monitoring the presence of people in the monitored building. This system requires an installation of the alarm center within range of the remote control or the ordiphone when entering the building, so close to the entrance of the building. However, it is generally advisable to keep the alarm center away from the openings of the monitored building, to keep it operational for as long as possible in the event of attempted intrusion. If we follow this rule of caution by keeping the alarm center as far as possible from the exits of the monitored building, the connection with the control panel becomes more difficult, even random, because of the reduced range of the low-power communication protocol. . Moreover, and although the communication protocol used is low consumption, the energy required for exchanges between the remote control and the central alarm remains high because these exchanges are incessant as long as the remote control is within the monitored perimeter by the central alarm. STATEMENT OF THE INVENTION The invention aims to overcome the disadvantages of the state of the art and to provide simple means to automatically disable a control panel, which give more freedom in the positioning of the control panel with respect to from the area to be protected, or monitored area, while having very low energy consumption characteristics. To do this is proposed, according to a first aspect of the invention, an automatic disarming method of an intruder alarm system comprising a central alarm, at least one intrusion detector comprising at least a sensor and a transmission circuit communicating with the alarm control unit, and at least one automatic disarming module, according to which following an intrusion detection by the intrusion detector, the intrusion detector seeks to establish a communication with a mobile terminal, and if the communication is established and if the automatic disarming module recognizes the mobile terminal as belonging to a list of one or more authorized terminals, the automatic disarming module disarms the alarm system. The intrusion detector thus constitutes a relay between the nomadic terminal and the central alarm. It is thus possible to cover with the intrusion detector a zone for receiving signals from the nomadic terminal, which is centered on the intrusion detector and therefore independent of the positioning of the alarm center, and at low energy cost, because triggered only in case of intrusion detection. The process is implemented by the alarm system. Preferably, the intrusion detector establishes communication with the mobile terminal by a bidirectional communication protocol. If necessary, the same communication protocol can be used for the communication between the intrusion detector (s) and the alarm center on the one hand, and for the communication between the intrusion detector and the mobile terminal of somewhere else. However, and preferably, the transmission circuit of the intruder detector communicates with the alarm center by a first communication protocol, and the intrusion detector establishes a communication with the mobile terminal by a second communication protocol which differs from the first communication protocol. This combines a first communication protocol between the intrusion detector and the alarm center, and a second communication protocol between the automatic disarming module and the mobile terminal. Each protocol can thus be chosen according to its own characteristics. This will promote a protocol with low energy consumption for the first protocol. An open or non-proprietary protocol may also be preferred for the second protocol, in order to make the method compatible with a wide variety of nomadic communicating devices that may constitute nomadic terminals. In practice, the installation comprises several intrusion detectors, which are not necessarily all able to communicate with a nomadic terminal, but all of which are intended to communicate with the central alarm and include for this purpose each to less a sensor and a transmission circuit communicating with the alarm center. In this case, the intrusion detectors communicate with the central alarm by the same communication protocol, namely the first communication protocol, which can be bidirectional, or preferably unidirectional. When the alarm system is activated, the alarm control unit and the intrusion detectors communicate according to the first protocol intermittently, for example at regular intervals, these intervals possibly being spaced apart by several minutes in the absence of intrusion, which limits energy consumption. The intrusion detectors can thus be powered autonomously by a local power source, the central alarm being preferably powered by the sector and by an autonomous source of emergency. The first communication protocol may be monodirectional or bidirectional, wired or wireless. The second communication protocol, which is also energy-consuming, is implemented only during the intrusion detection, which makes it possible to consider an autonomous power supply of the automatic disarming module. This second protocol is preferably a low-power protocol, for example a protocol according to the BLE Bluetooth low consumption standard. The automatic disarming module is preferably located at a distance from the alarm center, and preferably without a wired link with the alarm center. Preferably, the alarm center is located inside a supervised area which preferably comprises at least one exit monitored by the intrusion detector, the automatic disarming module and the intrusion detector being preferably located inside or on the periphery of the monitored area. The central alarm can be located away from the monitored exit. The bidirectional transmission module integrated into the intrusion detector is activated when the intrusion detector detects an intrusion by the monitored exit. The intrusion detector is preferably an opening detector of the monitored issue. In practice, the establishment of the communication between the mobile terminal and the intrusion detector comprises the sending by the mobile terminal and the reception by the intrusion detector of at least one identification data of the terminal nomadic. If necessary, the establishment of the communication may include an exchange of identification data of the mobile terminal or the automatic disarming module. According to a particularly economical embodiment of means, the automatic disarming module communicates with the central alarm via the intrusion detector transmission circuit. This arrangement is particularly suited to a hardware embodiment in which the automatic disarming module and the intrusion detector are integrated in a common, preferably autonomous, detection unit that can, if appropriate, share a local energy source. In another embodiment, the intrusion detector communicates with the automatic disarming module via the transmission circuit of the intrusion detector. This arrangement is particularly suitable for a configuration in which the automatic disarming module is integrated with the alarm center and forms with the latter a functional and structural whole. It offers the advantage of minimizing energy consumption at the intrusion detector. According to a particularly advantageous embodiment, it is expected that the intrusion detector comprises a bidirectional transmission module for communicating with the nomadic terminal, before the intrusion detector intrusion detection, the module of bidirectional transmission is in a state of sleep, and that following intrusion detection by the intrusion detector, the intrusion detector puts the bidirectional transmission module in a waking state. The sleep state is a low or no consumption state in which the bidirectional transmission module is not able to communicate with the mobile terminal. To minimize the energy consumed by the intruder detector, it is possible for the intruder detector to put the bidirectional transmission module in the sleep state when the bidirectional transmission module has been in the waking state more than a predetermined time, and wakes up the bidirectional transmission module only after a new intrusion detection by the intrusion detector. Furthermore, it is possible for the intrusion detector to put the bidirectional transmission module in a state of sleep after the communication with the mobile terminal has been established, and to wake up the bidirectional transmission module only after a new detection of the two-way transmission module. intrusion by the intrusion detector. These strategies make it possible to limit the energy consumed by the intrusion detector, which can thus be supplied locally by an on-board power source. The nomadic terminal can be any type of nomadic device able to embark the second communication protocol, including a nomadic remote control, an active radio-identifier badge (RFID), a near-field communication badge (NFC) or a terminal phone such as a smartphone (or smart phone or smartphone in English). Preferably, the mobile terminal starts a signaling procedure to discover the intrusion detector when the nomadic terminal enters an area close to the alarm system. Preferably the mobile terminal terminates the discovery procedure after the communication has been established or the nomadic terminal has been recognized. Preferably, the nomad terminal terminates the reporting procedure at the latest after a predetermined time. Taking the entry into the proximity zone as a triggering event rather than the positioning in the proximity zone, and ending the recognition procedure as soon as the nomadic terminal has been recognized, it is avoided that a mobile terminal forgotten at the inside of the monitored zone or the proximity zone connects unexpectedly to the automatic disarming module. In addition, it limits the consumption of energy. The steps are then implemented by the nomadic terminal. Preferably, the proximity zone includes the zone monitored by the alarm system, to prevent the mobile terminal from inappropriately detecting an output of the proximity zone, while the user is still in the zone. monitored by the alarm system. In practice, the nomadic terminal determines the entry into the proximity zone of the alarm system by means of a positioning module in a global positioning system or with respect to one or more local tags. The global geolocation system can notably use a satellite public geolocation service, a cellular network of GSM telephone antennas and / or a WiFi antennas cellular network. In the absence of a public geolocation service in the monitored area, or if the latter is inaccurate or unreliable, the proximity area can also be limited by private tags, including WiFi or Bluetooth tags. In a more general manner, it is ensured that the communication between the intrusion detector and the nomadic terminal is interrupted after the nomadic terminal has been recognized. Alternatively or additionally, it can be ensured that the communication between the intrusion detector and the nomadic terminal is interrupted at the latest after a predetermined time. By intrusion detector is meant any detector which, when the alarm system is activated, performs, continuously or at intervals, measurements of at least one physical or chemical quantity representative of an intrusion in the area monitored by the alarm system. It comprises for this purpose at least one sensor, which can be sensitive in particular to one or more of the following physical variables: the movement of an opening or a predetermined object to the periphery of the monitored area, the movements inside of the zone monitored, by radar or camera, in particular infrared camera, the cutting of a beam, for example a light beam or microwave located for example at the periphery of the monitored area or inside thereof, the sounds [measured for example inside the monitored zone if it is closed, in the audible or infrasonic spectrum], the vibrations [measured for example on a frame or an opening closing an access opening to the monitored area, or on a boundary wall of the monitored area, or in the ground), the temperature or the temperature gradient [measured for example within the monitored area]. Preferably, it is ensured that if, within a predetermined time following an intrusion detection by the intrusion detector, no communication is established between the intrusion detector and a nomadic terminal or the terminal. nomad is not recognized in a list of one or more authorized terminals, the alarm system activates an alarm triggering procedure preferably comprising at least one of the following steps: triggering a siren and / or a warning light in and / or around the surveillance zone protected by the alarm system; sending one or more recipients of a voice alert message over a wired or cellular telephone network; sending to a central monitoring station a trigger signal of an alert processing procedure; recording of images and / or sounds picked up in a protection zone protected by the alarm system. According to another aspect of the invention, it relates to a method of using an intruder alarm system comprising a central alarm, one or more intrusion detectors communicating with the central alarm unit by a first communication protocol, and at least one automatic disarming module, which comprises an automatic disarming method as described above and a preliminary procedure for configuring the automatic disarming module, comprising the storage of one or several mobile terminals in the list of one or more authorized terminals, preferably by exchanging encryption keys between the authorized terminal (s) and the automatic disarming module. This secures the communication between the automatic disarming module and the authorized terminal (s). According to another aspect of the invention, it relates to a method of using an intruder alarm system comprising a central alarm, at least one intrusion detector communicating with the central alarm, and at least one automatic disarming module, the method of use comprising a method of automatic disarming of the intruder alarm system as described above and a preliminary procedure for configuring a nomadic terminal, comprising storage by the mobile terminal of at least one coordinate of the proximity zone of the alarm system. The proximity zone can exactly cover the area monitored by the burglar alarm system. However, it is preferably provided that the proximity zone is larger than the monitored area and contains the monitored area, to ensure that the nomadic terminal is in the reporting mode at the time of intrusion detection by the detector. intrusion, even if the response time of the terminal is slow or if the positioning module is imprecise. In practice, the proximity zone may extend within a radius of a few hundred meters around the monitored area or around the alarm center. According to another aspect of the invention, it relates to a method of using an intruder alarm system comprising a central alarm, at least one intrusion detector communicating with the central alarm system, and at least one automatic disarming module, the method of use comprising a method of automatically disarming the intruder alarm system as described above and a preliminary procedure for installing the alarm system in an area to be protected, including the installation of the intrusion detector near a dedicated exit from the area to be protected and the installation of the alarm center at a place in the area to be protected farther from the exit dedicated as the intrusion detector. The intrusion detector is preferably an opening detector of the issue in question. According to another aspect of the invention, it relates to an intruder alarm system comprising an alarm center, at least one intrusion detector comprising at least one sensor and a transmission circuit. to communicate with the alarm center by a first communication protocol, the intrusion detector comprising a bidirectional transmission module for communicating with a mobile terminal according to a second communication protocol, the alarm system comprising an automatic disarming module and being configured to execute the method as described above. The intrusion detector is preferably intended to be located near a main entrance of the area monitored by the alarm system. The intruder detector is preferably able to monitor the exit dedicated to the entrances to the monitored area when the alarm system is activated. It may in particular be a motion detector intended to be located near this dedicated exit, or a door opening detector. According to a particularly advantageous embodiment, the second communication protocol differs from the first communication protocol, the first communication protocol can be monodirectional. Preferably, the automatic disarming module is integrated with the intrusion detector and forms with the intrusion detector a structural and functional unit. Preferably, the automatic disarming module and the intrusion detector share the transmission circuit. According to an alternative embodiment, the automatic disarming module is integrated with the central alarm and forms with the central alarm a structural unit and functional. The intrusion detector is preferably powered by an autonomous power source, including a battery. Assuming that the automatic disarm module and the intrusion detector form a structural unit, they can share a single autonomous power source. The central alarm is preferably powered by the sector and, where appropriate, by an autonomous source of emergency. The technical features of the invention mentioned in connection with an aspect of the invention or a specific embodiment are intended to be applicable to all aspects of the invention and all embodiments. BRIEF DESCRIPTION OF THE FIGURES Other features and advantages of the invention will emerge on reading the description which follows, with reference to the appended figures, which illustrate: FIG. 1, an alarm system according to one embodiment of the invention deployed in a supervised area; FIG. 2, an automatic disarming module of the alarm system of FIG. 1, integrated with an intrusion detector of the alarm system; FIG. 3 is a flowchart of an initialization procedure of the automatic disarming module of FIG. 2; FIG. 4 is a flow diagram of an automatic disarming method of the alarm system of FIG. 1, implementing the automatic disarming module of FIG. 2. For clarity, identical or similar elements are identified by identical reference signs throughout the figures. DETAILED DESCRIPTION OF EMBODIMENTS In Figure 1 is illustrated an enclosure such as a building or a vehicle closed by exits comprising a movable opening, for example doors or windows, and constituting a monitored area, or area to be protected 10, monitored by an alarm system 12 comprising a central alarm 14 and intrusion detectors 16, 18, 20, which can include in a known manner motion detectors, temperature, vibration, noise and aperture detectors exits placed inside or on the periphery of the monitored area 10. The alarm system 12 may further comprise one or more sirens 22 arranged in the monitored area 10, one or more cameras 24 for capturing images from the monitored area 10, one or more microphones for receiving sounds from the monitored area 10. The alarm control unit 14 comprises an electronic control circuit 14.1 and a transmission electronic circuit 14.2 integrating an antenna, and is electrically powered by the sector 26 either directly or, as illustrated schematically in Figure 2, by the an uninterruptible power supply 14.3 integrating an inverter 14.4 and a backup battery 14.5. The electronic control circuit 14.1 is further connected to a telephone link 28 or the Internet enabling it, if necessary, to access a central monitoring station. The alarm system may assume an armed state, in which the control unit, in response to an intrusion detection, triggers an alarm, or a disarmed state, in which the control panel does not trigger the alarm even if the alarm is detected. 'intrusion. The system may be partially armed or disarmed The intrusion detectors 16, 18, 20 are preferably autonomous and independent detectors, each of which comprises at least one sensor 16.1, 18.1, 20.1 and at least one electronic transmission circuit. 16.2, 18.2, 20.2, powered by a power source independent of the mains, preferably a battery 16.3, 18.3, 20.3, possibly connected to an electric generator [not shown], for example of photovoltaic type, and preferably without Direct or indirect wired connection with the sector 26. The electronic transmission circuits 16.2, 18.2, 20.2 of the intrusion detectors 16, 18, 20 communicate with the electronic transmission circuit 14.2 of the alarm center 14 by a first communication protocol, which can be monodirectional [ intrusion detectors 16, 18, 20 to the central alarm 14] or bidirectional. For this purpose, the electronic transmission circuit 16.2, 18.2, 20.2 of each detector 16, 18, 20 is provided with a transmission transmitter using the first communication protocol, and if necessary with a receiver using the first communication protocol. communication. The first communication protocol is preferably non-wired, and the electronic transmission circuits 14.2, 16.2, 18.2, 20.2 of the alarm control unit 14 and the detectors 16, 18, 20 are for this purpose equipped with radio frequency antennas. The communication between the intrusion detectors 16, 18, 20 and the central alarm 14 according to the first communication protocol is known to those skilled in the art. Typically, the transmissions according to the first communication protocol between the intrusion detectors 16, 18, 20 and the alarm central 14 are intermittent, to limit the energy consumption of the intrusion detectors 16, 18, 20. It is possible to example consider that in the absence of intrusion, each detector 16,18, 20 sends a short status message to the alarm center 14 at regular intervals (for example every 5 minutes) and remains silent the rest of the The status message includes an identification header of the intrusion detector, and a body that can indicate the absence or existence of a fault, and if appropriate the type of fault encountered. intruder detector 16, 18, 20 sends an alarm message including an identification header of the intruder detector and a body indicating the detection of an intrusion. avoid a hacking to imitate the status or alarm message of the intrusion detector. For this purpose, the exchanges are preferably encrypted, and the identification of each detector 16, 18, 20 is secured. If the first communication protocol is bidirectional, the alarm can send a confirmation of reception message. In known manner, one of the issues of the monitored area 10, called dedicated issue 30, is more specifically dedicated to the inputs and outputs when the alarm system 12 is activated, and is for this purpose provided with a 32 man-machine interface for arming and disarming the alarm and may include for example a 32.1 hardware or virtual keyboard and 32.2 state LEDs and / or a speaker. The man-machine interface 32 may be located within the monitored area. At least one of the intrusion detectors 16, 18, 20 is associated with a module 34 for automatic disarming of the alarm system 12, and forms therewith an integrated structural and functional unit illustrated in FIG. 2. For the following description and to simplify it, it is considered that the intrusion detector associated with the automatic disarming module 34 of the alarm system 12 is the opening detector 20 of the exit dedicated to the inputs and outputs when the alarm is activated. The opening detector 20 comprises a bidirectional transmission module 36 which integrates the automatic disarming module 34 and which is able to communicate bidirectionally, according to a second communication protocol, with a bidirectional transmission module 38 of a nomadic terminal. 40 located nearby. The second communication protocol may for example be a low-power protocol, in particular a Bluetooth Low Power Protocol (BLE). The nomadic terminal 40 may be for example a ordiphone or a dedicated remote control, and is intended to be transported by a user authorized to enter the guarded area 10 and to disarm the alarm system 12. This user may be by example a person or a vehicle. The nomadic terminal 40 comprises a bidirectional transmission module 38 according to the second communication protocol. The nomadic terminal 40 also comprises, preferably, a geolocation module 42, which makes it possible to deduce the position of the nomadic terminal 40, for example by means of a satellite system of global positioning of the GPS type, or by the intermediate of a GSM cellular telephone network, or by a network of WiFi terminals, or by a combination of the above means and a human-machine interface 44, for example in the form of a touch screen. To implement the procedure of automatic disarming of the alarm system 12, it is necessary to first configure the alarm system 12 and the mobile terminal 40. The configuration procedure comprises in the first place a procedure of pairing between one or more nomadic terminals 40 and the intruder detector 20, preferably including an exchange of encryption keys between the authorized terminal (s) 40 and the automatic disarming module 34. This procedure may for example take place according to the flowchart of Figure 3. In Figure 3 is shown in the left part a flowchart 100 of actions performed by the automatic disarming module 34, and on the right side a flowchart 200 actions performed by the nomadic terminal 40, for the purpose of pairing two devices. The pairing 300 begins with a discovery phase 302 initiated manually on the intruder detector 20 by pressing an initialization button or push button 46 (step 102) and on the nomadic terminal 40 by selecting using the The human-machine interface 44 has a pairing initialization function (step 202). The nomadic terminal 40 goes into discovery mode by scanning all the frequencies used by the second communication protocol (step 204). The bidirectional transmission module 36 of the intrusion detector 20 for its part repeatedly sends a discovery message 103 (step 104). When this message is received by the mobile terminal 40, the mobile terminal 40 responds (step 206) by an acknowledgment 205 (containing identification information such as its unique serial number (address) and information on its clock, which completes the discovery phase, then initiates a synchronization phase 304. On receipt of the acknowledgment, the automatic disarming module 34 stores the nomad terminal address 40 in a memory containing a list of authorized terminals (step 106) and the bidirectional transmission module 36 of the intruder detector 20 sends a connection request message 109 containing the address of the mobile terminal 40 (step 108). On receipt of this connection request message, the mobile terminal 40 also stores in memory the address of the bidirectional transmission module 36 (step 208), which finalizes the synchronization process 304. Then follows a security phase 306, during which the mobile terminal 40 and the bidirectional transmission module 36 exchange encryption keys (steps 110, 210). Insofar as the intrusion detector 20 is deliberately very simple and does not have a sophisticated human-machine interface allowing, for example, a manual and secure transmission of a first encryption key, the exchange of the encryption keys is carried out clear. To prevent a third party intercepting the data exchange in this vulnerable phase of the procedure, the transmission power of the bidirectional transmission module 36 is voluntarily reduced, so that it can only be received in a reduced reception area, for example less than 5 meters. Once the public and private encryption keys have been exchanged and saved, the pairing procedure ends with the sleep of the bidirectional transmission module 36 and the automatic disarming module 34 (steps 112, 212). A second part of the configuration procedure of the alarm system 12 is to define at least one proximity zone 50 around the area to be protected 10, using the nomadic terminal 40. This proximity zone may for example example be defined by the coordinates of the position of the alarm center 14 or the position of the intruder detector 20, and a radius of action around this position (for example from 100 to 500 meters). The proximity zone 50 preferably includes the area to be protected 10. Once the configuration of the alarm system 12 performed, the alarm system 12 operates as shown in Figure 4. An initial state is assumed in which the user carrying the nomadic terminal 40 is outside the proximity zone 50 defined during the configuration procedure and outside the zone 10 monitored by the control system. alarm 12, the latter being activated. It is also assumed that the geolocation module 42 of the nomadic terminal 40 is active and detects that the position of the nomadic terminal 40 outside the proximity zone 50 (state 220). In this state, the nomadic terminal 40 does not attempt to connect to the bidirectional transmission module 36 of the intrusion detector 20. Moreover, the bidirectional transmission module 36 of the intrusion detector 20 is in deep sleep and does not send preferably no signal according to the second protocol (state 120). When, from this initial state, the user enters the proximity zone 50, the geolocation module of the nomadic terminal 40 detects an entry in the proximity zone 50 (step 222), which corresponds to the passage of time. a location by the geolocation module 42 outside the proximity zone 50 to a location within the proximity zone 50. When it detects this entry, the nomadic terminal 40 goes into a signaling mode at the bidirectional transmission module 36 of the intrusion detector 20, wherein it broadcasts connection requests (step 224). For its part, the bidirectional transmission module 36 of the intrusion detector 20 remains in deep sleep and no connection takes place at this stage. When the user opens the dedicated issue 30, the opening detector 20 detects the opening (step 122) and sends a first detection message to the central alarm 14 by the first communication protocol (step 124). Furthermore, the intrusion detector 20 wakes up the bidirectional transmission module 36 (step 126) which listens to the devices using the second protocol (step 128). He then discovers the connection request of the nomadic terminal 40 and initiates a mutual recognition procedure during which the bidirectional transmission module 36 of the intrusion detector 20 and the mobile terminal 40 exchange their encryption keys, their identifiers, and verify their presence. in their list of authorized interlocutors (step 130, 230). If this procedure concludes favorably (step 132), the intruder detector 20 sends to the alarm central 14 a second message, comprising a disarming command, via the transmission transmitter according to the first protocol of communication (step 134). This action being completed, the bidirectional transmission module 36 of the intrusion detector 20 sends a disconnection request to the mobile terminal 40 by the second communication protocol (step 136) and puts the bidirectional transmission module 36 again in deep sleep ( step 138). The nomadic terminal 40 ceases its connection requests upon receipt of the disconnection request (step 236), and at the latest after a predetermined time (step 238). It can be provided that the man-machine interface 32 for arming and disarming the alarm, or the central alarm 14 itself, emits a sound or a warning light as soon as the alarm is detected. opening of the dedicated issue 30, and that this warning signal ceases to attest disarming the alarm. The alarm system 12 has a triggering delay, for example ten seconds, so that in case of malfunction of the automatic disarming procedure, for example if the mobile terminal 40 of the user is unloaded or has made a geolocation error, or if the user simply does not carry the nomadic terminal 40 to him, the user, warned by the warning signal, can still enter the disarming code of the alarm system 12 before his trigger. Indeed, in the case where the alarm center 14 does not receive the second message of the automatic disarming module 34, either because it did not send it, or because the exchanges were disrupted, it triggers automatically the alarm procedure. The arming of the alarm is performed in the usual way, before leaving the area to be protected 10 by the dedicated issue 30, using the 32.1 keyboard 32 man-machine interface and disarming the alarm system. A delay, for example ten seconds, allows the user to close the dedicated issue 30 before arming the alarm system 12. If the user carries the nomadic terminal 40 leaving the monitored area 10, the geolocation module 42 of the nomadic terminal 40 monitors and notes the output of the proximity zone 50, which will identify the next entrance in the proximity zone 50. It should be noted that as long as the nomadic terminal 40 has not left the proximity zone 50, the signaling mode is not activated. This implies that if the user carrying the mobile terminal 40 activates the alarm system 12 and leaves the monitored area 10, but remains in the proximity zone 50, then wishes to enter the monitored area 10 again, the signaling of the nomadic terminal 40 will remain inactive and the user will have to manually deactivate the alarm system 12 in a conventional manner using the keyboard 32.1 of the man-machine interface 32. It will therefore be advantageous for the border of the proximity zone 50 is close to the dedicated exit 30 when the alarm system 12 is activated. This limitation of the functionality of the automation makes it possible to manage another hypothesis, namely the assumption that the user arms the alarm system 12 leaving the monitored area 10 without its nomadic terminal 40 which remains at the same time. 10, within reach of the automatic disarming module 34. In this case, a person entering the zone 10 monitored by the dedicated exit 30 is detected by the opening detector 20 (step 122). which triggers the bidirectional transmission module 36 of the opening detector 20 (step 126), which listens to the peripherals using the second protocol (step 128), however, the nomadic terminal 40 remains silent because it has not left the proximity zone 50 (state 238), and the bidirectional transmission module 36 of the opening detector 20, after having noted that a predetermined time has elapsed since the opening detection without the automatic disarming module 34 has identified an authorized terminal from its list (step 132), goes to sleep. The alarm system 12 which has received an intrusion detection message (step 124) from the aperture detector 20 and which has not been disarmed by the automatic disarm module 34, activates a procedure of alarm at the end of the delay time, unless of course the person manually disables the alarm system 12 on the keyboard. The alarm procedure itself, performed by the alarm center 14, is in accordance with what is known in the state of the art and may include for example one or more of the following actions: triggering a siren 22 and / or a warning light in the area monitored by the alarm system 12 and / or around it; sending one or more recipients of a voice alert message over a wired or cellular telephone network; sending to a central monitoring station a trigger signal of an alert processing procedure; local or remote recording of images and / or sounds picked up in the area monitored by the alarm system 12. Naturally, the examples shown in the figures and discussed above are given for illustrative and not limiting. Many variations are possible. It can be provided that the opening detector 20 is timed, in the sense that it sends an intrusion detection message to the alarm center 14 only after the lapse of a predetermined time. This time can be used to try to establish a connection with a mobile terminal 40 and allow the automatic disarming module 34 to determine if the nomadic terminal belongs to the list of authorized terminals, so that, according to the result of this detection, the message finally transmitted by the electronic transmission circuit 20.2 contains an intrusion detection information, an activation order of an alarm procedure (accompanied by information on the nature of the intrusion) , or an order to disarm the alarm (accompanied if necessary information on the identity of the nomadic terminal 40 recognized). One can predict a different behavior of the alarm center, according to the automatic disarming module has identified a nomadic terminal not belonging to the list of authorized terminals or that the intruder detector 20 has not at all set up communication with a nomadic terminal. In both cases, the central alarm 14 is supposed to trigger the alarm, but one can choose to delay the triggering of the alarm in case of absence of nomadic terminal (to leave the user the time if necessary) authorized to identify itself by code or any other means at the level of the man-machine interface 32, and on the contrary to trigger the alarm without delay if an unauthorized mobile terminal has been identified by the automatic disarming module. The initial pairing procedure between the bidirectional transmission module 36 of the automatic disarming module 34 and the nomadic terminal 40 may differ from that described. In particular, it can be provided that the master element (initially requesting connection) and the slave element (initially listening for a connection request) in this procedure are reversed. The same is true in the subsequent recognition procedure. Steps 108 and 208 are optional because it is sufficient for one of the two elements to recognize the other. The automatic disarming module 34 is not necessarily integrated with a specific intrusion detector 16, 18, 20. It can thus be envisaged that the automatic disarming module 34 is materially independent of the intrusion detectors 16, 18, 20, and has a connection with one or more of them, as well as a module for sending to the central alarm 14 messages by the first communication protocol. It can also be envisaged that the automatic disarming module is functionally and structurally integrated with the alarm center 14, so that the storage of the authorized terminals and the identification procedure of the mobile terminal in the list of authorized terminals are made by the alarm center 14 itself. In this case, the bidirectional transmission module 36 of the opening detector 20 merely establishes the communication with the mobile terminal 40 by the second communication protocol, to collect (preferably during the establishment of the call) primary identification data sent by the mobile terminal 40, and to transfer these primary identification data, or identification data derived from these primary identification data, to the automatic disarming module 34 integrated with the central station; alarm 14, via the electronic transmission circuit 20.2. The automatic disarming module 34 determines whether the identification data makes it possible to identify the mobile terminal 40 in the list of authorized terminals. If so, the alarm center 14 disarms the alarm system 10. In the opposite case, the alarm central 14 activates the alarm procedure, with or without delay. In this case, the preliminary pairing procedure for constituting the list of authorized terminals is adapted accordingly, so that this list is recorded by the automatic disarming module 34 located in the alarm center 14. In the latter variants, it is also possible that the intrusion detector 20 incorporating the bidirectional transmission module 36 is timed, in the sense that it sends an intrusion detection message to the central alarm 14 only after the lapse of a predetermined time. This time can be used to try to establish a connection with a mobile terminal 40 so that, depending on the result of this detection, the message finally transmitted by the electronic transmission circuit 20.2 contains either an intrusion detection information. and establishing a communication with a nomadic terminal 40, ie an intrusion detection information without establishing a communication with a nomadic terminal. If necessary, the same message of the transmission circuit 20.2 of the intruder detector 20 may contain the identification data of the mobile terminal and the data relating to the intrusion detection by the intrusion detector 20. The number of nomadic authorized terminals 40 may be arbitrary, so as to allow several users to access the monitored area 10 by automatically disarming the alarm system 12 by their own nomadic terminal 40. Also, the number intrusion detectors 20 integrating a bidirectional transmission module 36 may be arbitrary, in particular to adapt to a monitored area 10 having several issues dedicated to the inputs and outputs when the alarm system 12 is activated. The alarm system 12 may also include detectors which are wiredly connected to the alarm center 14 and do not necessarily use the first communication protocol, and in particular sensors integrated directly into the central station. alarm 14 to detect attempts at hardware hijacking of the alarm center 14. The intrusion detectors 16, 18, 20 may comprise more than one sensor, and further include in particular a vibration sensor or contact to detect any attempt to undermine their material integrity. There may be more than one proximity zone 50, for example depending on whether it is an area that must leave the nomadic terminal [exit zone] or an area in which between the terminal nomadic [entry zone]. The exit zone may for example be defined by a radius of 100 to 500 meters around the area to be protected 10, while the entry zone may be defined by a lower radius, for example from 50 to 200 meters. Thus, it is avoided that a mobile terminal forgotten in or near the home, in a vehicle for example, is able to disarm the alarm system and minimizes the power consumption of the terminal by reducing the area of the car. entry, into which it switches to the reporting mode. If the area to be protected 10 is poorly covered by satellite or cellular public geolocation services, and especially if the coverage is random or the accuracy is insufficient, it is also conceivable to define the proximity zone or zones 50 from one or more dedicated private beacons, operating for example in WiFi or Bluetooth, and without interaction with the alarm system 12. These beacons only communicate with the nomadic terminal 40 to indicate the entry into the proximity zone 50 and the exit from this area. For beacons that must remain permanently active, it is better to plan their power supply by the sector or by an autonomous energy generator. Preferably, the coverage area of the private beacons, which corresponds to the proximity zone 50, must include the area to be protected 10.
权利要求:
Claims (23) [1" id="c-fr-0001] 1. A method for automatically disarming an anti-intrusion alarm system (12) comprising an alarm center (14), at least one intrusion detector (20) comprising at least one sensor and a transmission circuit communicating with the central alarm unit (14), and at least one automatic disarming module (34), characterized in that: - following an intrusion detection by the intruder detector (20), the intruder detector (20) ) attempts to establish a communication with a nomadic terminal (40), - if the call is established and if the automatic disarming module (34) recognizes the nomadic terminal (40) as belonging to a list of one or more authorized terminals, the automatic disarming module (34) disarms the alarm system (12). [2" id="c-fr-0002] 2. Method of automatic disarming of an intruder alarm system according to claim 1, characterized in that the intrusion detector (20) establishes communication with the nomadic terminal (40) by a bidirectional communication protocol. [3" id="c-fr-0003] Method for automatic disarming of an intruder alarm system according to one of the preceding claims, characterized in that the transmission circuit of the intruder detector (20) communicates with the alarm control unit (14). ) by a first communication protocol, and the intrusion detector (20) establishes communication with the mobile terminal (40) by a second communication protocol which differs from the first communication protocol. [4" id="c-fr-0004] 4. A method of automatically disarming an intruder alarm system according to any one of the preceding claims, characterized in that the establishment of the communication between the nomadic terminal (40) and the intruder detector [20]. ] comprises the sending by the nomadic terminal [40] and the reception by the intruder detector [20] of at least one identification data of the nomadic terminal [40]. [5" id="c-fr-0005] 5. A method of automatic disarming of an intruder alarm system according to any one of the preceding claims, characterized in that the automatic disarming module [34] communicates with the alarm control unit [14] by the intermediate of the transmission circuit of the intrusion detector [20]. [6" id="c-fr-0006] 6. A method of automatically disarming an intruder alarm system according to any one of the preceding claims, characterized in that the intrusion detector [20] communicates with the automatic disarming module [34] by the intermediate of the transmission circuit of the intrusion detector [20]. [7" id="c-fr-0007] A method of automatically disarming an intruder alarm system according to any one of the preceding claims, characterized in that the intrusion detector (20) includes a bidirectional transmission module (36) for communicating with the nomadic terminal (40), and in that prior to intrusion detection by the intruder detector (20), the bidirectional transmission module (36) is in a state of sleep, and that following the detection of intrusion by the intrusion detector (20), the intrusion detector (20) puts the bidirectional transmission module (36) in a waking state. [8" id="c-fr-0008] A method of automatically disarming an intruder alarm system according to claim 7, characterized in that the intrusion detector (20) places the bidirectional transmission module (36) in the sleep state when the bidirectional transmission module (36) has been in waking state more than a predetermined time, and wakes up the bidirectional transmission module (36) only after a new intrusion detection by the intrusion detector (20) . [9" id="c-fr-0009] A method of automatically disarming an intruder alarm system according to claim 7, characterized in that the intrusion detector (20) places the bidirectional transmission module (36) in a state of sleep after the communication with the nomadic terminal (40) has been established, and only wakes up the bidirectional transmission module (36) following a new intrusion detection by the intrusion detector (20). [10" id="c-fr-0010] 10. A method for automatically disarming an intruder alarm system according to any one of the preceding claims, characterized in that the nomadic terminal (40) starts a signaling procedure to discover the intrusion detector (20). when the nomadic terminal (40) enters a proximity zone (50) of the alarm system (12). [11" id="c-fr-0011] 11. A method of automatic disarming of an intruder alarm system according to claim 10, characterized in that the nomadic terminal (40) terminates the discovery procedure after the communication has been established or the nomadic terminal (40) has been recognized. [12" id="c-fr-0012] 12. A method of automatically disarming an intruder alarm system according to claim 10 or claim 11, characterized in that the nomadic terminal (40) terminates the reporting procedure at the latest after a predetermined time. [13" id="c-fr-0013] 13. A method for automatic disarming of an intruder alarm system according to any one of claims 10 to 12, characterized in that the nomadic terminal (40) determines the entry into the proximity zone (50) of the alarm system (12) using a positioning module (42) in a global positioning system or in relation to one or more local beacons. [14" id="c-fr-0014] 14. A method of automatic disarming of an intruder alarm system according to any one of the preceding claims, characterized in that the communication between the intrusion detector (20) and the nomadic terminal (40) is interrupted after that the nomadic terminal (40) has been recognized. [15" id="c-fr-0015] 15. A method of automatic disarming of an intruder alarm system according to any one of the preceding claims, characterized in that the communication between the intrusion detector (20) and the nomadic terminal (40) is interrupted at later after a predetermined time. [16" id="c-fr-0016] 16. A method of automatically disarming an intruder alarm system according to any one of the preceding claims, characterized in that if, within a predetermined time following an intrusion detection by the intruder detector (20). ), no communication is established between the intruder detector (20) and a nomadic terminal (40) or the nomadic terminal (40) is not recognized in a list of one or more authorized terminals; alarm (12) activates an alarm triggering procedure preferably comprising at least one of the following steps: triggering a siren (22) and / or a warning light in and / or around the surveillance protected by the alarm system (12); sending one or more recipients of a voice alert message over a wired or cellular telephone network; sending to a central monitoring station a trigger signal of an alert processing procedure; recording images and / or sounds picked up in a protection zone protected by the alarm system (12). [17" id="c-fr-0017] 17. A method of using an alarm system (12) anti-intrusion comprising an alarm center (14), at least one intrusion detector (20) communicating with the alarm center (14), and at least one automatic disarming module (34), characterized in that it comprises an automatic disarming method of the intruder alarm system (12) according to any one of claims 10 to 13, and a preliminary procedure configuration of a nomadic terminal [40), comprising the storage by the nomadic terminal [40] of at least one coordinate of the proximity zone [50] of the alarm system [12]. [18" id="c-fr-0018] 18. A method of using an intruder alarm system [12] comprising an alarm central [14], at least one intrusion detector [20) communicating with the alarm central [14], and at least one automatic disarming module [34], characterized in that it comprises an automatic disarming method of the burglar alarm system (12) according to any one of claims 1 to 16, and a preliminary procedure installation of the alarm system [12) in an area to be protected, comprising the installation of the intrusion detector (20) near a dedicated exit (30) of the area to be protected and the installation of the alarm central (14) at a location of the area to be protected farther from the dedicated exit (30) than the intrusion detector (20). [19" id="c-fr-0019] 19. Anti-intrusion alarm system (12) comprising an alarm central (14), at least one intrusion detector (20) comprising at least one sensor and a transmission circuit (20.2) for communicating with the central unit alarm system (14) by a first communication protocol, characterized in that the intrusion detector (20) comprises a bidirectional transmission module (36) for communicating with a mobile terminal (40) according to a second communication protocol, the alarm system (12) having an automatic disarming module (34) and configured to perform the method of any of the preceding claims. [20" id="c-fr-0020] 20. An intruder alarm system (12) according to claim 19, characterized in that the second communication protocol differs from the first communication protocol, the first communication protocol can be monodirectional. [21" id="c-fr-0021] Burglar alarm system [12] according to claim 19 or claim 20, characterized in that the automatic disarming module (34) is integrated with the intrusion detector (20) and forms with the detector. intrusion (20) a structural and functional unit. [22" id="c-fr-0022] Burglar alarm system (12) according to one of Claims 19 to 21, characterized in that the automatic disarming module (34) and the intrusion detector (20) share the transmission circuit ( 20.2). [23" id="c-fr-0023] Burglar alarm system (12) according to Claim 19 or Claim 20, characterized in that the automatic disarming module (34) is integrated with the alarm control unit (14) and forms with the control unit (14). alarm (14) a structural and functional unit.
类似技术:
公开号 | 公开日 | 专利标题 US9332390B1|2016-05-03|Mobile device utilizing time of flight for personal security and localization EP3016078B1|2017-08-16|Method for detecting, identifying and automatically disarming an alarm unit, and alarm system suitable for carrying out said method EP2287812B1|2019-02-27|Device for entrance detection and recognition of transponder tags, surveillance system including same and surveillance method implemented by said system EP1180301B1|2005-04-27|Local combined telephone and alarm system FR3040817A1|2017-03-10|METHODS OF AUTOMATIC DISARMING AND USE OF AN INTRUSION ALARM SYSTEM AND ALARM SYSTEM THEREFOR JP2020520581A|2020-07-09|Sticker location determining device and related methods US20200342746A1|2020-10-29|Portable alarm system FR3052902B1|2019-07-05|ALARM SENSOR, SYSTEM COMPRISING SUCH SENSOR, AND METHOD OF USING SAID ALARM SYSTEM FR2932302A1|2009-12-11|Generalized monitoring method for e.g. object, in e.g. building, involves providing transmitter module with radio-frequency wave receivers and processor to object in place, where module receives infrared signal in manual operation mode WO2002023498A1|2002-03-21|Surveillance method and device for triggering a warning during an intrusion in the monitored zone US20170024987A1|2017-01-26|Device and system for security monitoring FR3066214A1|2018-11-16|METHOD FOR MANAGING A MEANS FOR ENERGY STORING AN ELECTRONIC AUTONOMOUS LOCK EP3475931B1|2021-03-24|Method for operating an alarm system comprising a remote device WO2002011096A1|2002-02-07|Method and device for continuous protection against intrusion in possibly inhabited premises OA19530A|2020-11-13|"MAXI SECURITY" remote security and warning system. EP3862987A1|2021-08-11|Method for managing an operating mode of an alarm unit and associated device EP3621045B1|2021-05-19|Alarm system and method of operation WO2008043854A1|2008-04-17|Protection device to be concealed or associated with an object and for emitting an alarm upon the loss of theft of said object EP3686858A1|2020-07-29|System for monitoring daily activities for one or more persons in a living space, and analysis method EP3816957A1|2021-05-05|Security and monitoring system and method for operating same EP3314592B1|2019-12-18|Home automation device, method for controlling a home automation device and computer program FR3085241A1|2020-02-28|SECURITY MONITORING SYSTEM AND NODE FOR SUCH A SYSTEM Chavan et al.2015|A Review on Surveillance and Protection System for Malls WO2020043877A1|2020-03-05|Method for locating data, control system, transmitter device EP2202942B1|2018-02-07|Group monitoring method
同族专利:
公开号 | 公开日 FR3040817B1|2021-04-30|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 EP2287812A1|2009-08-20|2011-02-23|Radio Systèmes Ingenierie Video Technologies |Device for entrance detection and recognition of transponder tags, surveillance system including same and surveillance method implemented by said system| US20140313032A1|2013-04-23|2014-10-23|Canary Connect, Inc.|System and methods for notifying a community of security events| US20150221209A1|2014-02-05|2015-08-06|Honeywell International Inc.|System and method of alerting cms and registered users about a potential duress situation using a mobile application|WO2018211490A1|2017-05-16|2018-11-22|Tyco Fire & Security Gmbh|System and method for automatically disarming an intrusion detection system| WO2018220615A1|2017-05-30|2018-12-06|Tyco Fire & Security Gmbh|System and method for automatically disarming an intrusion detection system| WO2021064029A1|2019-09-30|2021-04-08|Verisure Sàrl|A security monitoring system|
法律状态:
2016-08-25| PLFP| Fee payment|Year of fee payment: 2 | 2017-03-10| PLSC| Search report ready|Effective date: 20170310 | 2017-08-25| PLFP| Fee payment|Year of fee payment: 3 | 2018-08-28| PLFP| Fee payment|Year of fee payment: 4 | 2019-08-21| PLFP| Fee payment|Year of fee payment: 5 | 2020-08-25| PLFP| Fee payment|Year of fee payment: 6 | 2021-08-25| PLFP| Fee payment|Year of fee payment: 7 |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 FR1558215A|FR3040817B1|2015-09-04|2015-09-04|METHODS OF AUTOMATIC DISARMING AND OF USE OF AN ANTI-INTRUSION ALARM SYSTEM, AND ASSOCIATED ALARM SYSTEM|FR1558215A| FR3040817B1|2015-09-04|2015-09-04|METHODS OF AUTOMATIC DISARMING AND OF USE OF AN ANTI-INTRUSION ALARM SYSTEM, AND ASSOCIATED ALARM SYSTEM| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|