Page
37 of 35
First the message Pre-alarm followed, followed by the alarm confirmation with 2
photos, followed by the escape route investigation and the sound recording. This is
then repeated every 3 minutes.
1. The tablet is protected against turning off or uninstalling programs. If the battery
runs out of power or the device is turned off by other means, the transmission of
further photos, voice recording and address data from the hiding place of the
offender starts again as soon as the tablet PC is switched on again.
If the SIM card is replaced, the SIM card number is also transferred to the secure
customer server account.
Of all the burglars noticed nothing, because the alarm program works completely
invisible in the background. Only the owner can end the monitoring program at the
control panel or remotely.
2.
Free replacement delivery
So that the owner is not defenseless after the theft of the tablet, a new central office
will be sent to him
free
of charge by the manufacturer via the dealer. A certificate
from the police about the intrusion is sufficient. Even if the owner gets the stolen
tablet back, he can keep the replacement center.
Jammer detector (background process)
Your control center has a jammer detection. This triggers an alarm when
someone tries to disturb the radio links between the sensors and your alarm
panel by a jammer. The fact that burglars use such a device, although extremely
rare, but can not be completely excluded.
Since a burglar does not know which frequencies to disturb to prevent an alarm,
a broadband jammer must be used. This must disturb the frequencies 433MHz
and 868MHZ, (common radio alarm systems), 900MHz and 1800 MHz (common
Содержание CT-Sensor
Страница 1: ...Page 1 of 35 ...