Dil ID: 1
Dil Adı: english
Dil Kodu: en3 Aerco Brand's Products
Dünyanın En Büyük
Elektronik Bilgi Kütüphanesi



1313131313
using portable devices.
1-2 The Scenarios
The scenarios are shown as following:
1. The families want to open the door to into the house.
The families first need enter the password via keypad, and then using the
RFID tag[3] (card) near to the RFID reader[4], if identifications are successes,
the door would then be opened.
2. The criminal attempt to make a mark on the door.
The camera can grab the images from the door outside for motion detection
function which then detects the variation of images. Therefore, if the criminal
uses the tags or wedding invitation to make a mark for invading reference or
able to invade the house, then the motion detection function would invoke the
alarm and record the images automatically.
3. The criminals attempt to break into the house.
If the criminals broke down the door, the door opening detection signal
would invoke the alarm, auto recording functions which records the images to a
remote server for protecting the crime records, in the same time, a SMS would
send to the main member of family.
4. The main member of family receives the warring SMS from the
ARM-based system.
The main member of family can use the PC or cell phone (which can view
the web page via GPRS) for viewing the images from door outside, if the crime
is occurring, he can then call the polices or neighborhoods. On the other hand, if
the images from door outside were looked like nothing happen, then the family
can use PC or cell phone to download the recorded videos (images stream) from
the recoding server and plays it by player on PC or cell phone to figure out what
thing was happen.
5. The validly tag was stolen by criminal or losing.
When the members of family lose the tag, which can be registered to invalid
by modifies the database in the ARM-based embedded system via internet.
Although the tag is valid between the tag has registered to invalid, the criminal
can’t entry the house either, cause of the criminal need to know the password to
12