Description
- Number of Inputs: 10
- Number of outputs: 4
- Alert type: Call/SMS
- Number of telephone numbers: 10
- Configuring a PC: +
- Manage your mobile phone: +
- Operating temperature range: -40 °C...+70 °C
- Storage temperature: -50 °C...+80 °C
- Supply voltage: 12 V
- Warranty period: 12 months
Company POSUA developed one of the best contemporary modern security GSM systems, which allows you to protect any kind of movable and immovable property. GSM alarm Defender Pro company POSUA, allows you to monitor and manage the various objects of protection. It is ideal for the protection of apartments, houses, offices, garages and cars, as well as through the work at any temperature alarm system Defender Pro allows you to protect the unfinished room.
Advantages of GSM alarm system Defender Pro:
- Protection of any object (apartment, office, home, garage, car, unfinished objects);
- Instantaneous sending alert anywhere in the world through mobile operators with voice and SMS (sending voice and SMS messages to 10 selected numbers of relatives or security units with configurable alarm events for each);
- Integrating security systems with other security systems (connecting highly intelligent controlled the fire and security systems and controls for household devices);
- Listening to the premises (Optional able to listen to the premises, which can be used as a control alarm).
The device contains a GSM module (900/1800/1900МГц), with which it is possible:
- control the device via an SMS message, confirming execution of commands;
- management via DTMF signals with voice confirmation of command execution;
- notification when an alarm event via SMS;
- signal voicemail - dial-up on those numbers when a disturbing event;
- sending test messages - for periodic testing of system performance;
- plays protected premises.
Features of the device:
- support a list of the 10 rooms, each of which can configure alarm events, which will be sent to voice and SMS messages;
- the ability to connect readers Touch Memory Key to change the "ARM / DISARM. Each of the 10 keys can be supported as a permanent or temporary. To work around this key, you must specify the date until which the key can be used in the system. Once the validity of the key expires, the module automatically removes the key. Also there is an opportunity to ask up to 5 different patterns of validity of a key during the day, each template contains up to 5 periods of time during which the permitted work is bound to the selected template key;
- function mode control device using key-rings containing KeeLoq encoder (possible to use up to 7 transmitters);
- the ability to add new keys Touch Memory without using a computer - a device is put memorize the new Touch key button on the key fob, and depending on the amount of touching a new key to the Touch platform, you can specify different settings for the validity of the new key (for one day, two days Five days or in continuous mode);
- setting the device to protect bound to the first sensor. In this mode, the module analyzes the state of the first sensor. If an attempt is made to arm the moment when the first sensor is active - the device is translated in a protection mode, or simply does the same as in the translation unit in the monitoring regime. This mode is useful if the device, for example, controls the electric door lock is connected to a second sensor. If the device is already in the monitoring regime and the door is closed, the touch Touch key only opens the door. Otherwise, if the door is open at the moment of contact will be made setting the device in a protection mode;
- notification when arming / disarming the object of protection is triggered when any of 10 inputs, power failure or battery discharge;
- simple and convenient to use, setup takes 10-15 minutes;
- to divide the protected object 10 connected areas;
- display the status of channels and modes of operation guarding device using 12 LEDs - 10 to display the status of input lines, Power and ARM LEDs;
- external LED "ARM" to display the status of the device;
- built-in charger for charging lead-acid and NiMH batteries. NiMH rechargeable battery (800mAh) is built into the module itself and extra batteries can be connected via the appropriate connector on the module;
For communication with a PC, use the connector DB9M. It is used for programming the device, set the parameters of his work, recording voice messages into the memory security module.
For connecting external devices (sensors and devices which are controlled by the module) in the module provides:
- 10 analog inputs for measuring voltages ranging from 0V to 15V
- 2 outputs "open collector"
- 2 outputs type "open drain"
- 2 relays with changeover contact
For input channels security module can be connected to standard active and passive motion detectors, gas leak sensors, humidity sensors, fire sensors, etc.
Frequently Asked Questions on GSM burglar alarm |
Answer: Transmission of information on means of wireless sensors, subject to failures and the conditions for transfer of information is not always feasible. Transmission failures may be transient, not regular, which complicates the identification of these failures.
Failures can be either in the transmission of data to the remote subscriber in GSM, and the relationship between wireless sensors and the central.
When using wireless sensors to regularly carry out technical inspections to check the quality of communication, time to replace batteries in wireless sensors.
Wired sensors are much more efficient, they are less susceptible to external factors affecting the appearance of failure. Wire sensors do not require frequent maintenance, they are much more practical.
Question: How reliable GSM alarm system?
Answer: Reliability GSM alarm depends on the reliability of mobile operators, as well as the quality of the installation of security systems. It should also be noted that the GSM signal did not provide a high degree of safety due to the fact that GSM channel can be muted by experienced hackers. Not recommended to use the product on sites that require a high degree of safety.
Files and programms
Gallery
Specification
Dimensions | ||
Width: | 194 мм | |
Height: | 97 мм | |
Depth: | 32 мм | |
Specifications: | |
Supply voltage: | 12V |
Storage temperature: | 80 mA - standby 170 mA - in a mode of connection |
Type of interface to PC: | RS232, connector DB9M |
Data transfer rate: | 38400 |
The maximum allowable current through the sensor power supply (total): | 300mA |
The maximum allowable current for each of the outputs "open collector": | 500mA |
The maximum allowable current for each of the outputs of the type "open drain": | 300mA |
Maximum load, switching relays: | 6A/250VAC 28VDC |
Features: | |
• autonomous operation on internal battery; | |
• convenient connectors for sensors; | |
• convenient and intuitive software with a simple but at the same time flexible customization; | |
• plays protected premises; | |
• the ability to connect readers Touch Memory Key; | |
• mode control device using key-rings; | |
• management system by using DTMF signals, and SMS messages; | |
• notification with the loss / appearance of power or low battery; | |
• correct operation at very low and high temperatures; | |
• the ability to connect a capacitive fingerprint scanner; | |
• the possibility to check the balance on the account (via SMS messages). |
Fingerprint Reader | ||
Sensor type | Capacitive | |
The size of the active field | 18 x 12.8 mm | |
Scanner Resolution | 256x360 or 208х288 points | |
Comparison algorithm | PerfectMatch® (UPEK) | |
Database Templates | Storage patterns in fingerprints scanner | |
Scan Time | 1.5 seconds |
Support fingerprint reader is implemented in GSM burglar alarm Defender Pro |
By the GSM signaling Defender Pro can connect scanners TCEBB type with built-in 32-bit ARM-processor for implementing algorithms compare fingerprint with the template directly within the scanner and with integrated memory for storing fingerprint templates. Reading the fingerprint and compare it with the pattern occurs by means of the built-in scanner ARM-processor. Via RS232 interface in the GSM-controller sends a result of the comparison: "yes"or "no." The disadvantages of this type of scanners include: limited (no more than 20) number stored in the memory of the scanner templates for comparison, as well as a high degree of mechanical vulnerability of the matrix surface scanner. This imposes some restrictions on the installation of fingerprint outdoors in available to the general public places.
Supplied | |||
GSM alarm system controller unit | Shipping Box | CD c software | |
User Guide | Power unit | RS232 cable | |