|
The Alarm Triggering Process with
Conventional Alarm Services
Step 1 – Alarm Triggered
After a building has been armed by the
customer, the sensors are also armed. A break-in occurs.
Once armed, a break in the circuit (i.e. door contact opening)
or motion detected triggers the alarm (ie. notifies the panel).
Step 2 – The Panel Calls the Monitoring Center
After the entry delay time, the panel
calls the center’s monitoring computer which will sound an alarm
and a human operator will acknowledge the trigger and take
responsibility.
Step 3 – Contact Customer’s Call List
The monitor will look up from the call
list or contact information and attempt to contact the user
through a telephone voice call.
Police may be dispatched at the customer’s request, but possibly
to a
false alarm.
Step 4 – Attend Location
Once the customer contact is located,
the customer or responder must actually physically attend the
location to verify if the break-in is real.
Step 5 – Verification
Once at the location, the customer can
visually determine if the alarm was Verified or False.
Step 6 - If Verified - Too Late!
By the time verification has occurred,
the thieves are gone with your property.
|
|
|
Monitored Location Equipment
The conventional alarm monitoring service is
comprised of an alarm panel, a keypad, and sensors located at
the customer’s location.
The heart of the conventional alarm system is
the panel. The panel contains a logic board that monitors the
system components. It is also the point where the system
connects to the alarm monitoring centre through a dial-up
telephone connection.
The alarm keypad is the human interface point
of the system. The keypad is used to program the panel and also
to Arm/Disarm the system by entering a user-defined code.
Sensors are located throughout the building
and connected back to the panel. There are two primary types of
sensors: Contact Switches and Motion Sensors. Contacts are
normally used to monitor doors and widows. When the two contacts
are separated (i.e. a door or window opening) a signal is sent
to the panel. Motion Detectors monitor a room for movement. When
motion is detected in view, a signal is sent to the panel.
The panel will dial-up the monitoring station and announce that
a sensor has been triggered and the Customer Identifier of the
location the sensor was detected.
The Problem with Verification
Verification of an alarm is the only way to
truly get an appropriate response to a real emergency. Up until
recently, verification was only possible by physical attendance
either by the owner or a private guard response service. The
single biggest issue with this is the time delay. If it takes
1/2 hour to verify, the probability of stopping a break-in is
virtually nil.
The Bottom Line
Conventional alarm systems are slow,
ineffective and often lead to
false alarms! Conventional alarms systems charge a
high cost for only a false sense of security.
The SecurityLine system provides a faster and
more reliable method.
Click here to see how it
works.
|