[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

TW496834B - Remotely controlled, adjustable security alarm triggering system - Google Patents

Remotely controlled, adjustable security alarm triggering system Download PDF

Info

Publication number
TW496834B
TW496834B TW88101813A TW88101813A TW496834B TW 496834 B TW496834 B TW 496834B TW 88101813 A TW88101813 A TW 88101813A TW 88101813 A TW88101813 A TW 88101813A TW 496834 B TW496834 B TW 496834B
Authority
TW
Taiwan
Prior art keywords
user
patent application
scope
attack
response
Prior art date
Application number
TW88101813A
Other languages
Chinese (zh)
Inventor
Jeng-Yang Lai
Wen-Sheng Wu
John Arthur Macintosh
Original Assignee
Lite On Automotive Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lite On Automotive Corp filed Critical Lite On Automotive Corp
Priority to TW88101813A priority Critical patent/TW496834B/en
Application granted granted Critical
Publication of TW496834B publication Critical patent/TW496834B/en

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

This invention is related to a vehicle security system and method, wherein a common linearly responded sensor is used to provide timely signals. The response of the system controller may be remotely adjusted for adjusting the system sensitivity. The user may use a remote transmitter to adjust the wavelength threshold of the attack pulses, so as to instruct the security system controller to adjust the sensitivity. Based on the severity of attack, a common sensor may be used to provide timely pulse signals in proportion to the severity of attack. The alarm system is trigger by the wavelength of the pulses output by the sensor. This system may be provided with two triggering levels, one being the warning level, the other being a full alarm level. The user may use a transmitter to remotely adjust the control system, to adjust the warming level and the full alarm level. This invention also provides a method for system to validate the user by means of a known or a novel remote transmitter. The user may select a specialized software switch and enter the learning mode. Such a software switch can activate the adjustment procedures for the full alarm level. Once entering the learning mode, the user can simulate various attack level in real life to adjust the triggering level until the user is satisfied with the triggering levels of the warning level and the full alarm level.

Description

496834 A7 B7 五、發明説明(/ ) 發明背景 本發明係有關於一種具有侵入(intrusion)及攻擊感測 器之自動保全警示系統(automatic security alarm sys-tem).本發明亦有關於其它藉由實體攻擊觸發(physical attack triggering)之保全警示系統。 自動保全系統係利用各種感測器(sensor)來偵測待保全 之財產所遭受到的侵入及實體攻擊.在這些感測器中,有些 只是簡易之開關感測器(switch sensor),而有些則可以調 校以提供警示輸出.可調式感測器可以提供多種程級之反 應,例如,對於一個預警之事件,或是一個重大之警示事件 (full alarm event).在不同之事件中,警示器可發出警鈴 、號角聲\閃光,或是啓動呼叫器或電話傳輸方式來加以 警示。 經濟部中央標準局員工消費合作社印製 (請先閲讀背面之注意事項再填寫本頁) 現今之警示系統所遭遇到之問題爲警示敏感度之層級 係由安裝者在最後測試階段時加以調整,然後在將此系統 送至使用者攄.然而這樣會造成設定在使用時並不可靠,會 有許多錯誤之觸發(trigger)發生,因此許多人認爲保全警示 系統只會帶來噪音,而難以達成防盜或是防偷之功能.同樣 的,感測器亦有響應不足之問題。 使用者也許會想調整一或多個感測器之靈敏度 (sensitivity),以降低錯誤觸發之可能.然而保全系統之安裝 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 496834 A7 B7 五、發明説明(>) 者在安裝時,可能會儘可能將這些感測器或是電子控制模 組藏起來,以避免小偷輕易地將這些感測器或是模組破 壞β因此,使用者可能難以發現這些感測器或是模組的位 置,或是難以處理或是重新調整這些組件之靈敏度β 另一方面,在車輛之保全系統方面,已有人提出可調整 之警示選擇及特點之警示器。例如,Issa等人於美國專利 第5,534,845號提出具有多重警示信號之保全系統。在遠 處可利用一個發射器,來對各感應器進行測試,並且可使特 定之感測器停止作用.而Drod等人在美國專利第4,845,464 號提出一種可用使用者程式規劃(user-programmable)之保 全系統,其中感測器系統之靈敏度可由使用者設定(set)或 是重置(reset)。對於一個警示事件(alarm event)而言,可 依據事件之頻率元件(frequency component)得到之數個信 號參數(signal parameter)加以界定.數個預定之狀況同時 發生時,即可觸發一個警告。 經濟部中央標準局員工消費合作社印製 (請先閱讀背面之注意事項再填寫本頁) 大部份感測器之輸出會隨攻擊之程度而變化,如果攻擊 並不會很嚴重,則產生一個小振幅之脈波(pulse),隨著攻擊 之侵略程度增加,脈波之振幅也會增加.這樣用振幅之線性 表示來代表攻擊性,可重覆利用.而其它之製造者則使用這 些振幅來決定攻擊位準.然而,這種位準或偵測系統需要一 個參考値(reference),此參考値需要作實體上之改變,以調 整靈敏度。 在本發明之系統中,感測器係一般工業用之感測器,而 \ 攻擊之嚴重性係由輸出脈波之時閭長度決定.感測器之輸 ___2:_ . _ 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) 496834 A7 B7 五、發明説明(3 ) 出係轉換成一個時間基底脈波(time-based pulse),此脈波可 再細分成警示或是重大警告之臨界値(threshold l^el),這 些臨界値可獨立地設定或是調整.而此感測器亦可簡化成 三個引線(lead),其中兩個引線供應電源至感測器,而第三 個引線則供應攻擊位準信號至電子模組以作處理.此系統 之靈敏度係基於感測器信號之時間基底長度.因此本發明 使用較便宜之類比元件即可製造,而不用軟體控制。 此系統亦需要一個個人識別號碼(persona 1 identification number, PIN) 輸入 ,以存 取系統 ,這 樣可使 系統有 更加之 安全性·使用者可利用一個遠端之發射器來對保全系統控 制器下達指令,藉由調整對攻擊脈波(attack pulse)之響應, 即可調整系統之靈敏度.此系統可利用具有輸入開關及遠 端發射器按鈕之遠端調整,即可進行調整工作,而無需在實 體上處理系統之硬體,因此可降低調整工作之時間及成本. 發明總論 本發明係提供一種在車輛警示系統中,可在遠端調整觸 動靈敏度位準之系統及方法。 經消部中决標準局只,τ.消费合作社印繁 (¾先閲讀背面之注意事項再填寫本頁) 本發明說明一種可在遠端調整警示系統靈敏度之方法, 此系統可辨識使用者之身份。一個軟體開關(software switch)先告知感測器進行調整工作.在一個模擬攻擊 (simulated attack)後,系統可提供一個攻擊回應.接下來 送調整指示系統中,以調整回應之靈敏度。 模擬攻擊,提供回應\送出調整指示及調整靈敏度之步 驟可重覆進行,直到得到滿意之回應爲止,而且這些步驟可 ______________________3____ 本紙張尺度適中國囤家標缚((Ά ) Λ4規格(210Χ 297公漦) 496834 經湞部中夾棍準局ΰ〈工消贽合作社印絮 A7 B7 五、發明説明(命) 對多個感測器進行·而個別之回應設定可依據個別使用者 之偏好而加以設定。 本發明說明一種可在遠端調整之保全警示系統,其中複 數之感測器可產生電信號,並依據這些電信號之振幅來產 生表示攻擊嚴重程度之時間基底信號(time-based signal). 而輸出値表示警示回應業已產生,而使用者可以修正系統 之輸出靈敏度. 依據本發明之一観點,共用之感測器可提供一個時間基 底之脈波或多個脈波,來代表攻擊之嚴重性.警示系統可依 據感測器脈波之長度而被觸動.兩個觸動位準,即警告位準 及重大警示位準可以設定.使用者可在遠端使用此控制系 統,以調整警告及警示位準之驅動位準。 依據本發明之另一觀點,提供一種用已知或新的發射器, 而確定使用者身份之方法.使用者可選定一個特定之軟體 開關以進入一個學習模式(learn mode),此學習模式可對 於警示驅動位準提供調整步驟.在學習模式中,使用者可模 擬各種程度之攻擊,並調整觸發器(triggeii),直到使用者對 警告及#示位準滿意爲止。 本發明之目的及優點可配合附圖說明而更爲人瞭解,這 些附圖爲: 第1圖爲使用本發明系統之車輛; 第2圖爲本發明系統之方塊圖; 第3圖說明本發明方法之基本操作; 第4圖說明感測器靈敏度之範圍 ; 本纸張尺度適州中國K家標彳(rNS ) Λ4規格(210 X 297公釐) (請先閱讀背面之注意事項再填寫本頁) Φ496834 A7 B7 V. Description of the Invention (/) Background of the Invention The present invention relates to an automatic security alarm sys-tem with an intrusion and an attack sensor. The present invention also relates to other Security alert system for physical attack triggering. The automatic security system uses various sensors to detect intrusions and physical attacks on the property to be preserved. Among these sensors, some are simply switch sensors, while others It can be adjusted to provide an alarm output. The adjustable sensor can provide multiple process-level responses, for example, for an early warning event or a major alarm event. In different events, the alarm The device can sound an alarm, horn sound, flash, or activate the pager or telephone transmission mode to alert. Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs (please read the precautions on the back before filling out this page). The problem encountered by today's warning system is that the level of warning sensitivity is adjusted by the installer during the final test phase. Then send this system to the user 然而. However, this will cause the setting to be unreliable during use, and many false triggers will occur, so many people think that the security alert system will only bring noise, and it is difficult To achieve the anti-theft or anti-theft function. Similarly, the sensor also has a problem of insufficient response. The user may want to adjust the sensitivity of one or more sensors to reduce the possibility of false triggering. However, the installation of the security system is based on the Chinese National Standard (CNS) A4 specification (210X297 mm) 496834 A7 B7 V. Inventors (>) may install these sensors or electronic control modules as much as possible during installation to prevent thieves from easily destroying these sensors or modules β. Therefore, It may be difficult for users to find the location of these sensors or modules, or it is difficult to handle or readjust the sensitivity of these components. On the other hand, in terms of vehicle security systems, some people have proposed adjustable warning options and features. Alarm. For example, Issa et al., U.S. Patent No. 5,534,845, propose a security system with multiple warning signals. A transmitter can be used at a distance to test each sensor and stop certain sensors from functioning. Drod et al., In US Patent No. 4,845,464, propose a user-programmable The security system, in which the sensitivity of the sensor system can be set or reset by the user. For an alarm event, it can be defined according to several signal parameters obtained by the frequency component of the event. When several predetermined conditions occur at the same time, an alarm can be triggered. Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs (please read the precautions on the back before filling this page). The output of most sensors will vary with the degree of attack. If the attack is not serious, a Pulses of small amplitude (pulse), with the increase of the aggressiveness of the attack, the amplitude of the pulse will also increase. In this way, a linear representation of the amplitude is used to represent aggression, which can be reused. Other manufacturers use these amplitudes To determine the attack level. However, this level or detection system requires a reference, which needs to be physically changed to adjust the sensitivity. In the system of the present invention, the sensor is a general industrial sensor, and the severity of the attack is determined by the length of the time when the pulse wave is output. The input of the sensor ___2: _. _ This paper size Applicable to China National Standard (CNS) A4 specification (210X297 mm) 496834 A7 B7 V. Description of invention (3) The output is converted into a time-based pulse, which can be further subdivided into warning or Threshold thresholds for major warnings (threshold l ^ el). These thresholds can be set or adjusted independently. The sensor can also be simplified into three leads, two of which provide power to the sensor. The third lead supplies the attack level signal to the electronic module for processing. The sensitivity of this system is based on the time base length of the sensor signal. Therefore, the present invention can be manufactured using cheaper analog components instead of software control. This system also needs a personal identification number (PIN) input to access the system, which can make the system more secure. Users can use a remote transmitter to issue the security system controller. Command, by adjusting the response to the attack pulse, the sensitivity of the system can be adjusted. This system can use the remote adjustment with the input switch and remote transmitter button to perform the adjustment work without having to The hardware of the physical processing system can reduce the time and cost of adjusting work. Summary of the Invention The present invention provides a system and method for adjusting the sensitivity level of the touch at the remote end in a vehicle warning system. The Ministry of Economic Affairs and the Ministry of Justice Standards Bureau only, τ. Consumer cooperatives India Fan (¾ Read the precautions on the back before filling this page) The present invention describes a method for remotely adjusting the sensitivity of the warning system, which can identify the user's Identity. A software switch first tells the sensor to perform the adjustment work. After a simulated attack, the system can provide an attack response. Next, it sends an adjustment instruction system to adjust the response sensitivity. The steps of simulating an attack, providing a response \ sending adjustment instructions and adjusting sensitivity can be repeated until a satisfactory response is obtained, and these steps can be ______________________3____ This paper is suitable for Chinese storehouses ((() Λ4 size (210 × 297) (Public) 496834 In the Ministry of Economic Affairs, the club ’s quasi bureau (Industrial and Commercial Cooperative Cooperative Press A7 B7) V. Description of the Invention (Fate) For multiple sensors, and individual response settings can be made according to the preferences of individual users This invention describes a security warning system that can be adjusted remotely, in which a plurality of sensors can generate electrical signals, and based on the amplitude of these electrical signals, a time-based signal indicating the severity of the attack is generated. The output 値 indicates that the alert response has been generated, and the user can modify the output sensitivity of the system. According to one aspect of the present invention, the shared sensor can provide a time-based pulse or multiple pulses to represent the attack. The severity of the warning system can be triggered according to the length of the sensor pulse. Two trigger levels, the warning level and Major warning levels can be set. Users can use this control system remotely to adjust the driving levels of warning and warning levels. According to another aspect of the invention, a known or new transmitter is provided, and A method for determining the identity of the user. The user can select a specific software switch to enter a learning mode. This learning mode can provide adjustment steps for the alert-driven level. In the learning mode, the user can simulate various degrees Attack, and adjust the trigger (triggeii) until the user is satisfied with the warning and # indication level. The purpose and advantages of the present invention can be better understood with the description of the drawings, which are as follows: Figure 1 is Vehicles using the system of the present invention; Figure 2 is a block diagram of the system of the present invention; Figure 3 illustrates the basic operation of the method of the present invention; Figure 4 illustrates the range of sensor sensitivity;彳 (rNS) Λ4 size (210 X 297 mm) (Please read the precautions on the back before filling this page) Φ

、1T 經濟部中决摞準局萸工消贽含作社印f 496834 Α7 Β7 五、發明説明(s ) 第5-6-7及8圖說明進行本發明方法之步驟; 第9圖說明本發明系統之感測器組合; 第10圖更進一步說明第9圖中之感測器;及 第1 1圖說明第1 〇圖中子系統(subsystem)所產生之 波形. 鲛佳實施例說明 第1圖爲利用一個安全系統之汽車或其他車輛1 〇。 此圖中所示者爲切掉乘客座頂後之上視圖。此保全系統係 用來防止車輛被偷竊。此保全系統有不同程級之输出,例 如,由兒童或是球類造成之敲擊,可送出一個箸告訊號 (Warning signal),而在較嚴重之狀況時,例如敲破玻瑀時, 系統會送出警示信號(full alarm)。 車輛10包含一個主體12及多數之感測器14及1 6。一保全系統控制器4 0可在車上任何位置,但一般而 言是位在車內且不易作實體改變的地方。此控制器4 0可 由遠端發射器(remote transmitter) 4 2控制,亦可由其它 之輸入子系統控制,此在後詳述。 又如第1圖所示,控制器4 0連至所有輸入感測器及輸 出子系統◊如先前所述,輕度之攻擊,如兒童或球類造成之 敲擊,感測器只會啓動一個相當短之時間,例如數個毫秒 (mUlisecond)。更嚴重的攻擊時,感測器可能會啓動數百個 毫秒。此感測器可爲單一功能(single function)者,如震 動感測器(shock sensor),玻璃碎裂感測器(glass breakage sensor)·微波移動感測器(microwave motion 本紙張尺度適州中國K家標缚(CNS ) Λ4規格(2Κ)Χ297公釐) (請先閱讀背面之注意事項再填寫本頁) 訂 496834 A7 B7 五、發明説明(Z ) sensor),超音波移動感測器(ultrasonic motion, sensor), (請先閲讀背面之注意事項再填寫本頁) 紅外線移動感測器(infrared motion sensor)等。此外亦 可採用組合式(combination type)感測器,其結合兩種或 多種上述單一之功能者。感測器1 4可爲單一功能之震動 感測器,或是可回應直接實體受力之各種感測器。感測器 16可爲微波或其它移動感測器。感測器14及16亦可 爲組合型感測器\組合震動及微波感測器。 車輛1 0可更包含數個可產生指示輸出之子系統(subsystem),例如電子頭燈子系統 2 0,或是尾燈子系統 2 2 。 車輛之喇Π八2 4可提供指示輸出(output indication),此 外亦可用特別之發光二極體2 6或車內燈子系統(未圖 示)。 車輛1 0亦可包含輸入子系統,例如”Valet”,或是處理開 關2 8,在乘客門之開關3 0,或是點火裝置3 2。一個遠 端輸入子系統(未圖示)亦可提供輸入至警示控制子系統4 0 〇 經滴部中央標隼局β〈工消费合作社印繁 第2圖說明本發明之警示系統(如第1圖之保全系統) 之系統6 0之基本方塊圖,其中包含具有複數個輸入及輸 出之主處理器或控制單元。系統6 0包含一個嵌入微處理 器(embedded microprocessor)62 及記憶體 6 3,此記億體 6 3包含保全系統操作所須之所有軟體。記憶體6 3可爲 一個EEPROM,可儲存軟體開關設定及搖控感測器(remote sensor)所用之警示位準;亦可用處理機RAM記憶體,但是 在關掉電源後會損失先前之設定。處理機6 2可更改設定 ___(ύ___ 土紙張尺中國S家標冷((、NS ) Λ4規格(210 X 297公釐) 經濟部中次標牟局负_T消贽合作社印絜 496834 A7 B7 五、發明説明(7 ) 成爲學習模式,其中保全系統之可選擇特點可分別定址、 設定或是修正。 在典系統中,第一開關1之輸入6 4及一個第二開關 2之輸入6 6可用來提供使用者控制輸入。開關1之輸入 6 4例如可爲車輛1 0之點火開關3 2。開關2輸入可爲 另一輸入開關,例如保全系統之Valet開關。感測器1輸入 6 8及感測器2輸入7 0可提供代表車輛受到攻擊的嚴重 性指示,此點將在下面配合第9圖及第1 0圖說明 '一個 遠端接收器7 2及遠端發射器7 4可提供使用者受控之輸 入(controlled input)。此處理機系統包含輸出7 6及7 8,其可提供在調整規劃時,對於使用者允許之設定,並可以 在保全系統操作時,提供警示信號。輸出7 6及7 8可包 含一個警鈴(siren) \ LED、或是其它可警示使用者之指示 裝置,如車輛喇叭或是車燈。 第3圖說明本發明方法之基本操作,在步驟9 0,使用 者之身份會告知系統。使用者可使用一個遠端輸入裝置 (remote input device)或其它的輸入裝置,來確認使用者 之個人識別號碼(PIN)。在某些場合,步驟9 0可使系統確 認一個輸入裝置,或是學習一個遠端裝置(remote device)。 其中開關6 4及6 6可用來進行使用者識、別之工作。在使 用者界定之第二開關進行過預定次數之步驟後,可啓動第 1開關。接下來,進行第一開關之第二次步驟,及第二開關 之第二預定數目之短暫步驟。在決定第一組過程時,每一 按鍵由一短警示聲或是LED閃光認定,或由一個輸出子系 --------------------i_ 本紙張尺度適州中國S家標((、NS ) Λ4規格(210X 297公釐) -----^--:---L------IT------Ίφ] (請先閱讀背面之注意事項再填寫本頁) 496834 A7 B7 五、發明説明(ί)) 統指示。第二開關之第二組可由較長輸出信號來認定。依 此方式,使用者可指示PIN保全號碼之十位數及個位數。 使用者可進一步啓動一或多個開關以使特點選擇(feature selection)與個別使用者之遠端發射器碼相關連,其中所有 編碼(code)對每一發射器有獨特性。 在本發明中,只要使用者及發射器一旦被確認,系統之 每一待處理之功能可由類似啓動第一及第二開關之步驟來 選擇。步驟9 2在完成身份辨識工作之後,選擇系統之靈 敏度調整功能(sensitivity adjust feature)。使用者可進 一步選擇待調整之特定感測器,不同之感測器有不同之能 力β 在步驟9 4中,使用者模擬一種攻擊行爲,例如撞擊汽 車,進入汽車,或對警示系統之其它暴力行爲(由待修正之 感測器反應所決定)。系統可建立一個時程(time period), 以允許攻擊發生。如果使用者在第一次嘗試未能觸動警示 器,在此時程內,可作對於警示器更進一步之觸發。 經淆部中戎標準局兵Jr.消费合作#印緊 (請先閲讀背面之注意事項再填寫本頁) 在步驟9 6,系統提供對於攻擊之反應,其正比於攻擊 之嚴重性。一個保全系統可有至少兩個位準之反應。一個 較不主動(less active)之反應,或是”警告”(warn away)反 應,可產生低位準之反應。一個重大警示可由較大之攻擊 \; 產生。例如,撞擊輪胎,或是被球擊中,可產生較短時間之震 盪,使系統產生警告之較低位準信號。較大之撞擊或是進 入車輛可產生一較大\較長之攻擊信號,產生完全之警示 之鈴聲。 _________________%__ 本纸乐尺度適川t K ('NS ) Λ4規格(21 OX 297公釐) 496834 A7 B7 五、發明説明(1 ) 在步驟9 8,使用者可以依據自己的需求,修;E反應之 靈敏度。例如,如果對於感知之攻擊而言,警示反應太過強 烈,則使用者可以降低系統之靈敏度。同樣地,使用者在 反應位準過低之時,可增加系統之靈敏度/使用者可使用 系統之輸入開關,或是遠端輸入裝置,進行反應位準之調 整。 使用者可重覆進行攻擊模擬\反應及調整步驟9 4 \ 9 6及9 8任意次,直到系統反應位準達到所需爲止。 第4圖說明對於第3圖中不同警示反應位準之感測器 觸動臨限値(tlnreshold)之範圍。在第4圖中之圖形,係顯示 擾動(disturbance)之時間函數。其中W臨限値1〇〇代表 一個”警告”之靈敏値位準;而A臨限値1 0 2代表一個”重 1大警示”。在一個寊施例中,臨限値W之蓍告位準可設成 40毫秒,而位準A可設成3 0 0毫秒。這些値可用本發 |明之方法作調整。在第4a圖中,所產生之短脈波1 0 4低 於W臨限値1 〇 0。例如,這可能是由於球撞擊到車輛造 成。由於脈波之長度並不大於臨線値1 0 0,因此反應之 經滴部中次標準局匁JT-消费合作社印繁 (請先閲讀背面之注意事項再填寫本頁)1. 1T Ministry of Economic Affairs of the Ministry of Economic Affairs, Bureau of Labor, Consumption, Printing, Printing, etc. f 496834 Α7 Β7 V. Description of the Invention (s) Figures 5-6-7 and 8 illustrate the steps for carrying out the method of the present invention; Figure 9 illustrates this The sensor combination of the inventive system; FIG. 10 further illustrates the sensor in FIG. 9; and FIG. 11 illustrates the waveform generated by the subsystem (subsystem) in FIG. 10. 鲛 佳 实施 例 第 第Figure 1 shows a car or other vehicle using a safety system. The figure shows the top view with the passenger seat top cut out. This security system is used to prevent theft of vehicles. This security system has different levels of output. For example, a strike caused by a child or a ball can send a warning signal. In more severe conditions, such as when the glass is broken, the system A full alarm will be sent. The vehicle 10 includes a main body 12 and a plurality of sensors 14 and 16. A security system controller 40 can be anywhere in the car, but it is generally located in the car and is not easy to make physical changes. This controller 40 may be controlled by a remote transmitter 4 2 or by other input subsystems, which will be described in detail later. As shown in Figure 1, the controller 40 is connected to all input sensors and output subsystems. As mentioned earlier, a mild attack, such as a stroke caused by a child or a ball, will only activate the sensor. A fairly short time, such as several milliseconds (mUlisecond). For more severe attacks, the sensor may fire for hundreds of milliseconds. This sensor can be a single function, such as a shock sensor, a glass breakage sensor, a microwave motion sensor, and a microwave motion. K House Standard Binding (CNS) Λ4 Specification (2K) × 297 mm) (Please read the precautions on the back before filling this page) Order 496834 A7 B7 V. Description of the invention (Z) sensor), Ultrasonic mobile sensor ( ultrasonic motion, sensor), (Please read the precautions on the back before filling out this page) Infrared motion sensor. In addition, a combination type sensor may be used, which combines two or more of the aforementioned single functions. The sensors 14 can be single-function vibration sensors, or various sensors that can respond to direct physical forces. The sensor 16 may be a microwave or other mobile sensor. The sensors 14 and 16 can also be combined sensors, combined vibration and microwave sensors. The vehicle 10 may further include a plurality of subsystems capable of generating an indication output, such as an electronic headlight subsystem 20 or a taillight subsystem 2 2. The vehicle's driver can provide output indication. In addition, a special light-emitting diode 26 or a car light subsystem (not shown) can also be used. The vehicle 10 may also include an input subsystem, such as "Valet", or a processing switch 2 8, a switch 30 at the passenger door, or an ignition 32. A remote input subsystem (not shown) can also provide input to the alert control subsystem 400. Through the central department of the Ministry of Standards β <Industrial and Consumer Cooperatives Printing and Publication Figure 2 illustrates the alert system of the present invention (such as the first The basic block diagram of system 60, which includes a main processor or control unit with a plurality of inputs and outputs. The system 60 includes an embedded microprocessor 62 and a memory 6 3, and the memory device 63 includes all software required to maintain system operation. The memory 6 3 can be an EEPROM, which can store software switch settings and warning levels used by remote sensors; it can also use the processor's RAM memory, but the previous settings will be lost after the power is turned off. Processor 6 2 can change the setting ___ (ύ ___ soil paper rule Chinese S house standard cold ((, NS) Λ4 size (210 X 297 mm)) Ministry of Economic Affairs, the Ministry of Economic Affairs, the Ministry of Economic Affairs, the Ministry of Economic Affairs _T 消 贽 贽 社 社 絜 496834 A7 B7 V. Description of the invention (7) Become a learning mode, in which the optional features of the security system can be addressed, set or modified separately. In the classic system, the input 6 of the first switch 1 and the input 6 of the second switch 2 6 can be used to provide user control input. Input 1 of switch 1 4 can be, for example, ignition switch 3 of vehicle 10 2. Input of switch 2 can be another input switch, such as Valet switch of security system. Input 6 of sensor 1 8 and sensor 2 input 7 0 can provide an indication of the severity of the attack on the vehicle. This point will be described below in conjunction with Figure 9 and Figure 10 'a remote receiver 7 2 and remote transmitter 7 4 can Provide user controlled input. This processor system includes outputs 7 6 and 78, which can provide settings allowed by the user when adjusting the plan, and can provide a warning signal when the security system is operating Outputs 7 6 and 7 8 can include a warning (Siren) \ LED, or other indicating devices that can alert the user, such as a vehicle horn or lamp. Figure 3 illustrates the basic operation of the method of the present invention. At step 90, the user's identity will be notified to the system. Use The user can use a remote input device or other input device to confirm the user's personal identification number (PIN). In some cases, step 90 can make the system confirm an input device or learn A remote device. The switches 6 4 and 66 can be used for user identification and other tasks. After the user-defined second switch has performed a predetermined number of steps, the first switch can be activated. Next, perform the second step of the first switch and the second predetermined number of short steps of the second switch. When determining the first set of processes, each key is identified by a short warning sound or LED flash, or by a Output subsystem -------------------- i_ This paper size is suitable for China Standard S in China ((, NS) Λ4 specification (210X 297 mm) ---- -^-: --- L ------ IT ------ Ίφ] (Please read the notes on the back first (Fill in this page again) 496834 A7 B7 V. Description of the Invention (ί)) General instructions. The second group of the second switch can be identified by a longer output signal. In this way, the user can indicate the ten digits of the PIN security number and Single digits. The user can further activate one or more switches to associate the feature selection with the remote transmitter code of the individual user, where all codes are unique to each transmitter. In the present invention, as long as the user and the transmitter are confirmed, each pending function of the system can be selected by similar steps to activate the first and second switches. Step 9 2 After the identification is completed, select the system's sensitivity adjust feature. The user can further select the specific sensor to be adjusted. Different sensors have different capabilities. In step 94, the user simulates an attack behavior, such as hitting a car, entering a car, or other violence against a warning system. Behavior (determined by sensor response to be modified). The system can establish a time period to allow attacks to occur. If the user fails to activate the alarm in the first attempt, during this time, a further trigger can be made on the alarm. Jr. Consumption Cooperation # printed by the Ministry of Conflict Standards Department (please read the notes on the back before filling this page) At step 9 6, the system provides a response to the attack, which is proportional to the severity of the attack. A security system can respond to at least two levels. A less active response, or a "warn away" response, can produce a low-level response. A major alert can be generated by a larger attack \ ;. For example, hitting a tire, or being hit by a ball, can produce a short period of shock, causing the system to generate a lower level signal of a warning. Larger collisions or entering the vehicle can generate a larger \ longer attack signal, which can generate a complete warning bell. _________________% __ The scale of this paper is suitable for t K ('NS) Λ4 specification (21 OX 297 mm) 496834 A7 B7 V. Description of the invention (1) In step 9 8, the user can repair it according to his own needs; E Response sensitivity. For example, if the alert response is too strong for perceived attacks, the user can reduce the sensitivity of the system. Similarly, when the response level is too low, the user can increase the sensitivity of the system. The user can use the system's input switch or remote input device to adjust the response level. The user can repeat the attack simulation \ reaction and adjustment steps 9 4 \ 9 6 and 9 8 any number of times until the system reaction level reaches the required level. Figure 4 illustrates the range of tlnreshold of the sensor for different alert response levels in Figure 3. The graph in Figure 4 shows the time function of the disturbance. Among them, the W threshold (100) represents a sensitive level of “warning”; and the A threshold (102) represents a “repeated 1 warning”. In one embodiment, the threshold W threshold can be set to 40 milliseconds, and level A can be set to 300 milliseconds. These can be adjusted by the method of this invention. In Fig. 4a, the short pulse wave 104 generated is lower than the W threshold 値 100. For example, this could be caused by a ball hitting a vehicle. Since the length of the pulse wave is not greater than the front line 値 100, the response of the Ministry of Standards of the Ministry of Commerce, JT-Consumer Cooperatives, and India (please read the precautions on the back before filling this page)

結果並不會產生警訊。在第46圖中,脈波1 0 6大於W 臨限値1 0 0,但是不大於A臨限値1 0 2。在此狀況下, 系統會產生一個”警告”信號,以告誡可能之侵入者離去。 在第4c圖之中,脈波1 〇 8大於A臨限値1 0 2,代表爲 一個重大之警示事件。在此狀況下,一個重大警示之警鈴 可回應脈波1 0 8而產生。在本發明之方法中,使用者可 以獨立且調整W臨限値1 〇〇及A臨限値1 〇 2,但是W ________________ 1 本纸張尺度適ffl中國S家標冷(CNS ) Λ4規格(210 X 297公釐) 496834 A7 B7 五、發明説明(丨b ) 臨限値1 0 0必須小於A臨限値Γ 〇 2。調整之範圍要 等於或是大於任何感測器輸入之最大時程(maximum dur-ation)。每一感測器可有自己之輸入及個別之觸發位準,或 是多重之感測器可連至一個單一之輸入,而每一感測器具 有相同之觸發器位準(trigger level)。 第5至8圖說明進行本發明方法之步驟。在此具體實 例中,系統所使用之遙控發射器具有兩個實體開關(physi-calswitch),及多至三個按鍵(key)。開關1可爲一個車輛輸 入開關,由保全系統控制模組(security system control mo- duU)所監控。開關1 一般係用來設定或重置一個終止時 間(time out period)。開關2可爲一個連至系統控制單元(s-ystem control unit)之處理開關。開關2可用於多種機能, 包含在遠端調整系統之靈敏度。發射器之按鍵可啓動多達 i三個不同編碼通過之傳输。 經滴部中央標球局β&lt;,τ.消費告作社印f (請先閱讀背面之注意事項再填寫本頁) 第5圖說明輸入PIN號碼以確認使用者身份之步驟; 而第6圖說明確認或是學習辨識遠端發射器之步驟,係用 以說明第_ 3圖中之步驟9 0之辨識步驟。步驟1 2 0檢查 保全系統是否在流程開始前已解除警戒(disarmed)。如果 爲否,則在步驟1 2 1,要進行一個解除警戒之步驟。此解 \ 除警戒之步驟可用多種且爲已知之方式進行。 在系統業已解除警戒後,步驟1 2 2等待開關1之切 換〇Ν或OFF,或是多種之轉換,視實際狀況而定。在開關 開始切換之時,即開始一個停止時間之程序。在此具體實 本紙張尺度適州中國围家標彳((’NS ) Λ4規格(210 X 297公漦) 496834 經滴部中央標皁局兵工消费合作a印裝 A7 B7 五、發明説明(丨I ) 例中,用於PIN辨識之停止時間程序爲1 0秒。在步驟1 2 6,錯誤之計數會設爲零。 每一次使用者進行輸入之時,系統可以重置停止時間 之時程,因此使用者總是會有約10秒鐘左右的時間,自 一個輸入行動開始,到進行下一個輪入行動。 在步驟1 2 8,會產生一個回答(acknowledgement),表 示系統已經準備好接收PIN號碼之十位數。此時,可由燈 光的子系統(light subsystem),一個短嗶聲,或由輸出子系 統之其它反應產生信號。在步驟1 3 0,使用者可輸入十 位數之PIN號碼,可由啓動開關2,一或多次進行。使用者 可進一步指示十進位输入已完成,例如在完成後可切換開 關1。 如果錯誤之計數尙未超過,系統會回到步驟1 2 8,以 I產生一個回答信號,表示PIN號碼要重新輸入&amp;需注意在 ! i此之回答信號可與第1次之回答信號相同或是不同,並且 在後績之動作中輸入正確號碼。 如果十位數業已輸入,在步驟1 4 2系統會等待開關 2之按下&quot;。在步驟1 4 6,可產生一個輸入個位數之回答 信號,並且在步驟1 48,使用者輸入PIN號碼。輸入個位 數之方法,可與輸入十位數之方法相同。如果在步驟1 5 \ 0,使用者輸入一個不正確之PIN號碼,在步驟1 5 2時,錯 誤計數會增加一個計數。在步驟1 5 4,如果計數超過最 大之錯誤計次數,例如三次,則系統會被鎖住一段時間(60 秒),而且使用者無法使用此系統。此鎖住之程序係設計使 本纸張尺度適川中國囤家標蜱((、NS ) Λ4規格(210X 297公釐) (請先閱讀背面之注意事項再填寫本頁)As a result, there is no warning. In Figure 46, the pulse wave 106 is larger than the W threshold 値 1 0 0, but not larger than the A threshold 値 1 0 2. In this situation, the system will generate a "warning" signal to warn potential intruders to leave. In Figure 4c, the pulse wave 108 is greater than the A threshold 値 102, which represents a major warning event. In this situation, a major warning bell can be generated in response to the pulse wave 108. In the method of the present invention, the user can independently and adjust W-threshold 値 100 and A-threshold 値 2, but W ________________ 1 The paper size is suitable for the Chinese standard cold (CNS) Λ4 specification ( 210 X 297 mm) 496834 A7 B7 V. Description of the invention (丨 b) Threshold 値 1 0 0 must be less than A threshold 値 Γ 〇2. The adjustment range should be equal to or greater than the maximum dur-ation of any sensor input. Each sensor can have its own input and individual trigger level, or multiple sensors can be connected to a single input, and each sensor has the same trigger level. Figures 5 to 8 illustrate the steps for carrying out the method of the invention. In this specific example, the remote transmitter used in the system has two physical-calswitches and up to three keys. Switch 1 can be a vehicle input switch, which is monitored by a security system control module. Switch 1 is generally used to set or reset a time out period. The switch 2 may be a processing switch connected to a s-ystem control unit. Switch 2 can be used for a variety of functions, including remotely adjusting the sensitivity of the system. The transmitter's keys can initiate transmission through up to three different codes. Through the Central Tie-Ball Bureau of Dibei, β &lt;, τ. Consumption Report (Please read the notes on the back before filling out this page) Figure 5 illustrates the steps for entering the PIN number to confirm the identity of the user; and Figure 6 The steps to confirm or learn to identify the remote transmitter are used to explain the identification step of step 90 in Fig.3. Step 1 2 0 Check whether the security system is disarmed before the process starts. If not, then in step 1 2 1 a step of disarming is performed. This solution \ The steps to remove the alert can be performed in a variety of and known ways. After the system has been de-alerted, step 1 2 2 waits for the switch of ON or OFF, or a variety of switches, depending on the actual situation. When the switch starts to switch, a program of stop time is started. The paper size is specified here in Shizhou, China, and the standard of the Chinese house (('NS) Λ4 size (210 X 297 gong)) 496834 Warrior-consumption cooperation cooperation of the Central Standard Soap Bureau of the Ministry of Printing a printed A7 B7 V. Description of the invention (丨 I) In the example, the stop time program for PIN identification is 10 seconds. In step 1 2 6 the error count will be set to zero. Each time the user makes an input, the system can reset the stop time. Process, so the user will always have about 10 seconds or so, from the beginning of an input action to the next round of action. At step 1 28, an answer will be generated, indicating that the system is ready Receive the tens digit of the PIN number. At this time, the signal can be generated by the light subsystem, a short beep, or other reactions of the output subsystem. In step 1 30, the user can enter the tens digit The PIN number can be activated by the start switch 2, one or more times. The user can further indicate that the decimal input has been completed, for example, the switch 1 can be switched after completion. If the wrong count 错误 does not exceed, the system will return to step 1 2 8, with I generates an answer signal, indicating that the PIN number needs to be re-entered. Please note that! I The answer signal may be the same as or different from the first answer signal, and the correct number is entered in the subsequent action. If ten digits The number has been entered. In step 1 2 4 the system will wait for the pressing of switch 2. In step 1 4 6, a single-digit answer signal can be generated, and in step 1 48, the user enters the PIN number. Enter The method of single digits can be the same as the method of entering ten digits. If the user enters an incorrect PIN number in step 15 \ 0, the error count will increase by one in step 15 2. In step 1 5 4. If the count exceeds the maximum number of false counts, such as three times, the system will be locked for a period of time (60 seconds), and the user cannot use the system. The locked program is designed to make the paper size suitable Sichuan China Store House Ticks ((, NS) Λ4 Specification (210X 297mm) (Please read the precautions on the back before filling this page)

、1T 496834 經濟部中央標準局員工消費合作社印製 A7 ____ B7五、發明説明(lv) 未獲授權之使用者無法由系統認可。 一旦PIN號碼輸入,在步驟1 5 6,系統產生一個認可 信號,代表使用者以被辨識,並且會發出正確之指示,如長或 短的嗶聲,或是一系列LED閃光。 在一些狀況,使用者可能會需要啓動一個新的,且先前 並未爲系統知悉之發射器。例如,使用者可能會遺失原有 之發射器,並且希望規劃一個新的發射器及調整新的設定 。只要使用者用手動方式(manual input method),例如點 火及或車門開關來輸入PIN號碼,系統可以學習並確認新 的發射器。第6圖顯示一個已知之使用者,使用一個新的, 且未知的發射器時之程序。步驟1 5 6時,使用者輸入正 確之PIN號碼,系統在步驟1 5 8執行解除警戒之步驟,並 在步驟1 6 0決定發射器是否可被認出。如果系統無法認 出發射器,則在步驟1 6 2時,系統儲存新的鏈結資料 (link information),並且更新軟體開關設定。如果發射器可 被認出,可更新至軟體開關變更之鏈結。這可以用來辨識 使用一特宾發射器之使用者,或是用於多重車輛保全系統 之單一發射器。依此方式,軟體開關可依據不同之使用者 而有不同之設定。系統亦可在辨識到不同使用者之後,適 當的變化設定。 一旦使用者在輸入正確之PIN號碼,並被辨識及認可 之後,如第3圖之步驟9 2所說明,可用第7圖所示之步驟 來設定一軟體開關,以指示靈敏度位準之設定。步驟1 了 〇開始一個約一分鐘之計時步驟。在步驟1 7 2,如果計_;____;___ 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐) (請先閲讀背面之注意事項再填寫本頁) 496834 A7 _________B7 五、發明説明() 時超過,系統將會退出(exit),並且在第5圖之步驛中建立學 習模式(learn mode)。而在步驟1 7 6,使用者可以輸入 所需軟體開關號碼之十位數部份。此部份類似在第5圖中, 在步驟1 3 0中輸入PIN號碼之十位數的部份。再者,在 輸入完成後,使用者亦需作出指示。在步驟1 7 8之時,系 統會回答告知軟體開關之十進位數字業已輸入。如果在步 驟1 8 0並未輸入一個正確之軟體開關之十進位數字,則 系統會回到步驟1 7 6以進行新的輸入。如果軟體開關之 十進位數字業已被選定,則在步蘼1 8 2,使用者可輸入軟 體開關之個位數數字。在步驟1 8 4時,系統可回答個位 數字之輸入。同樣的&gt;在步驟1 8 6,如果使用者未輸入正 確之軟體開關個位數字,則系統會回到步驟1 8 2以開始 一個新的輸入。如果輸入的是正確的軟體開關號碼,則系 ’統會在步驟1 8 8時,產生一個對軟體開關之回答信號。 經滴部中决標準局只Η消於合作社印f --------- ·__ •衣 —I (請先閱讀背面之注意事項再填寫本頁) 第8圖說明本發明之方法,配合第3圖,說明進行步驟 9 4,9 6及9 8之程序,其中兩個攻擊靈敏度位準者爲” 警告”及”重大攻擊”。在步驟2 0 0之時,使用第7圖所示 之步驟來選定感測器調整函數開關。在步驟2 0 2,使用 者表示將要調整靈敏度(利用對於攻擊位準之檢查),或是 步驟2 6 0之時終止調整模式。使用者可由切換一個開關 或是由一個輸入子系統提供指示,來表示出想作調整之動 作,或是不需調整時,讓時間過完。 步驟2 0 4中可設定一個計時時間。在此例中,此計 時時間可長於先前之計時時間,例如約6 0秒,以使使用者 •----- ----- ---------- | Jy 496834 A7 B7 五、發明説明(沖) 有較充裕之時間來離開車輛,並模擬多重之攻擊。 .在步驟2 0 8,如果攻擊位準超過一個第一·靈敏度位 準,則在步驟2 1 0可以產生一個回應信號,以告知使用者 靈敏度位準業已被超過。如果在一個攻擊模擬之前,在步 驟2 1 2中計時已經超過,則在步驟2 6 0中,可終止調整 模式。否則,如果在步驟2 1 4之中,使用者決定之靈敏度 位準尙未滿足,則使用者可在步驟2 1.6指示靈敏度位準 太髙或是太低,這可由開關之組合來完成。如果位準太低, |則在步驟2 1 8時,使用者可作出指示,此指示可在步驟2 j :2 0之時重置計時,並在步驟2 2 2之時增加一個位準之 靈敏度。輸入指示器可以啓動超過一次,因此在步驟2 2 2之時,靈敏度位準之調整値可以超過一個位準。在作此 調整之時,使用者可在車輛之外,並且由有限之輸入開關處 理,模擬車受外界之攻擊。在此狀況下,使用者可用遠端之 發射器输入開關來提供使用者輸入指示,例如,可用按鍵,來 增加靈敏度,並用按鍵2來減少靈敏度。而第三個按鍵可 用來使”調整警告”位準變成”調整重大警告”位準。 同樣的,如果位準1之靈敏度位準過髙,則使用者可在 步驟2 2 4作出指示,並且在步驟2 2 6時會重置計時時 間。在步驟2 2 8之時,此靈敏潭位準會減少一個位準。 同樣的,在步驟2 2 4之時,輸入指示器可以啓動超過一次, 使得在步驟2 2 8之時,靈敏度位準可作超過一次之調 整。而系統可用數種方法來指示出現有之設定。例如,可 由外部警鈴,並變化指示之位準,作輸出之指示。另—種可 ______________ι4^ 本纸张人度遇州中國囤家標今(GNS ) /\4規格(210X 297公釐) (請先閲讀背面之注意事項再填寫本頁) 、11 f 496834 A7 B7 五、發明説明( 行之方式是利用^數個鈴聲來代表位準,例如可用1至5個 鈴聲來代表位準範圍,除此之外,如果靈敏度超過最後之設 定,則可以用一個較長之鈴聲來代表,或是在位準減少時,用 一個較短之鈴聲。 使用者可對於第1次警告之位準(warning level),重 褢攻擊模擬及調整步驟,或是在步驟2 1 4之時指示攻擊 位準符合需求,並在位準2 3 0之時,移至下一個靈敏度位 準。使用者可在步驟2 3 2設定下一個位準,並在步驟2 3 4時重設計時時間。使用者在步驟2 3 6進行另一攻擊 模擬,在此時係進行一個完全位準之攻擊。如果在步驟2 3 8之時,超過靈敏度位準2,則在步驟2 4 0之時可產生 一個反應訊號以告知使用者位準2業已被超過。此告知可 由使用者可辨知之輸出進行,例如,在超過重大蓍示位準後, 可用一個長鈴聲指示;在超過警告位準後,可用一個短笛聲 來指示。在步驟2 4 2,如超過計時時間,且在一個攻擊模 擬_記_綠之煎,_埋在#驟2 6 0之時終止調整模式。 在步驟'244,如果在計時時間結束前,使用者覺得靈 經满部中央標準局货二消费合作社印繁 (請先閱讀背面之注意事項再填寫本頁) 敏度位準並不令人滿意,並且在步驟246,使用者指示出 靈敏度太高,則在步驟248使用者可以提供一個輸入,此 輸入可以在步驟250時,將計時時間重置。而在步驟252 之時,靈敏度可以降低一個位準。如先前辦說明,在步驟 248之時,一個發射器之按鍵或其他輸入指示器可以啓動 超過一次。則在步騾252之時,靈敏度位準之調整可以超 過一個位準。 ___________—_[5_ 本纸^1度適)1]中國囚家標哼((^)以規格(210&gt;&lt; 297公釐) 496834 A7 B7___ 五、發明説明(^ ) 如果位準2之靈敏度位準太低,在步驟254之時,使 用者可以在遠端發射器按下一個按鍵,已在步驟250之 時,將計時時間重置。在步驟25 S之時·•位準2之靈敏度 增加一個位準w同樣的,在步驟2 54之時.,發射器按鍵可 以按下超過一次,因此位準2之靈敏度在步驟253之時’ 調整可以超過一個位準。 , 使用者可以重複進行攻擊模擬及檢查系統之靈敏度’ 直到使用者發出指示,表示對於靈敏度滿意爲止,或是到 計時時間結束爲止。在步驟260之時,調整模式會被終止。 第9圖說明一種包含兩種或更多機能感測器之組合, 此可用在本發明之具體實例中。在所說明之實例中,係結 合有微波感測器及一個震動感測器。除此之外,尙可以使 用其他種感測器,如玻璃破碎、微波移動感測器,紅外線 移動感測器或是超音波移動感測器。 如第9圖所示,一個雙重之微波天線300'可以發送及 接收由人體或是苒他在實1擾動在感測器範圍內所造成之 都卜勒(Doppler)頻舍信號:微波震盪器及都卜勒1貞測If 304可以提供一個輸出信號,其頻率特性與人類運動相 經Μ部屮决掠準局匁工消费合竹社印來 ---------l· — (請先閲讀背面之注意事項再填寫本頁) 同。在微波天線的圖形之內擺置一個三軸的選擇性共振慣 性反應物質(three-axis selective resonance inertial mass)302。微波震盪器及都卜勒偵測器304之兩個兩個不 同之輸出信號在位置點A 305產生,並且由帶通放大器306 及帶通放大器314來作區別。這兩個帶通放大器具有振幅 調整功能可參見第10圖得到更詳細之說明。帶通放大器 本紙張適州~中國丨S家標彳(rNS )[規格(210 X 297公釐) ~~ - 496834 A7 B7 五、發明説明((η) ----J_.._|ΦΙ — (讀先閲讀背面之注意事項再填寫本頁) 306及帶通放大器314之輸出信號分別送至低通偵測器308 及316,而低通偵測器3〇S及3 I6在提供信號至位準感測 比較器310及318。位準感測比較器310及31S產生輸出 312 及 320。 第10圖說明一個帶通放大器子系統,如第9圖所示之 帶通放大器306及帶通放大器314。此子系統提洪正比於 感測器輸入時程的振幅。在此圖中,只使用一個帶通放大 器來說明如何由信號的時程關係來產生振幅輸出。都卜勒 信號A 305在本質上爲對稱之正値及負値。 帶通放大器330可以藉由連到一個負輸入而偏壓到接 地。此偏壓點可以使都卜勒信號A 305之負値部份被截波 (clip ped)或是去除。如第11圖所示,這將會留下波形350, 並在帶通放大器330之輸出被放大。輸出信號350之最高 振幅將使低通偵測器電容332充電到適當量。電阻334提 供對於電容332電壓之放電路徑。因此此電壓將會如第11 圖之信號352所示。 信號3S2與在位準感測比較器336負輸入端之偏壓電 壓相比較·。偏壓電壓輸入338是如第11圖所示之最小偵 測位準356。在偵測器信號352大於偏壓電壓356之時, 比較器輸出34〇爲正,如第11圖所示之信號358。如果 ν 接收到一個較小振幅之都卜勒輸入,可以產生典型之感測 器信號36〇。信號36〇產生偵測器信號362及比較器輸出 信號364。一個較長或較短時程之比較器輸岀信號3.4.〇將 導通一個反钼電晶體輸出級342,產生在3 12之負値輸出。 ____________________________— 本紙張尺度诚用中國围家標冷((、NS )八4規格(210 X297公釐) 496834 經洎部中次摞準局工消合竹社〈 A7 B7 五、發明説明(“) 第12及13圖說明本發明其他之具體實例,·此具體實 例係在感測器之子系統上加上一個脈渡產生器。此脈波產 生器在系統被攻擊時產生脈波,此脈波再送至處理器’,此 處理器再量度由感測器輸入來之脈波數字,而不是來自感 測器之單一脈波之時間長度,以決定反應。 第1 2圖說明一個帶通放大器子系統,以說明在第9圖 中的帶通放大器306及314,並且其與第10圖之電路有 相似之操作。 帶通放大器可以藉由連到一個負輸入而偏壓到接 地。此偏壓點可以使都卜勒信號A 4〇5之負値部份被截波 導(clipped)或是去除。如第13圖所示,這將會留下波形 45〇,並在帶通放大器430之輸出被放大。輸出信號450 之最高振幅將使低通偵測器電容432充電到適當量。電阻 434提供對於電容432電壓之放電路徑。因此此電壓將會 如第13圖之信號452所示。 信號452與在位感測比較器436負輸入端之偏壓電 壓相比較。偏壓電壓輸入438是如第13圖所示之最小偵 測位準456。在偵測器信號4S2大於偏壓電壓456之時, 比較器輸出440爲正,如第i 3圖所示之信號4 5 8。 輸出ig·號4 4 〇在信號4 5 8之時程(d u r a i i ο η)中可以轉變 成脈波。由電路之輸出3 1 2可以類似信號406,其中脈波 可以用來量測處理器之時間單位。所產生脈波之數字可以 正比於擾動之大小。攻擊之位準可由攻擊時產生的脈波數 字來決定。而時間單位的量测可由單一計數來完或,即由 _________________ 本纸張尺度適州中國囤家標冷(〇^)/\4規袼(21〇、;&lt; 297公籍) (讀先閱讀背面之注意事項再填寫本頁) 訂 496834 A7 B7 五、發明説明(丨i) 軟體控制處理器完成。在某些狀況下,可由對脈波之檢測, 而非舞一個事件之時程量測完成。 按,以上所述,僅爲本發明之具體實施例,惟本發明 之構造並不侷限於此,任何熟悉此項技藝者在本發明之領 域內,所實施之變化或修飾皆被涵蓋在本案之專利範圍 內。 (請先閱讀背面之注意事項再填寫本頁) 结^•部中央#率局貝工消费合竹h \ 本紙張尺度適州中國囤家標綷((,奶)八4規格(210'/ 297公楚 496834 A 7 ______B7_ ___ 五、發明説明(户) 圖式説明: 第1圖爲使用本發明系统之車輛; 第2圖爲本發明系纹之方塊圖; 第3圖説明本發明方法之基本操作; 第4圖説明感測器靈敫度之絶園; 第及8圖説明進行本發明方法之步骤; 第9圖説明本發明系鲩之感測器組合; 第1〇圖更進一步説明第9圖中之感測器;及 第1 1圖説明第1 0圖中子系統(subsystem)所產生之 波形 第12圖爲本發明另一具體實例之電路圖; 第1 3圖説明第1 2圖系鲩所產生之波形; I.----- n*— ϋ ϋ — (請先閲讀背面之注意事項再填寫本頁) 訂· 經濟部中央標準局員工消費合作社印製 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公釐), 1T 496834 Printed by the Consumer Cooperatives of the Central Standards Bureau of the Ministry of Economic Affairs A7 ____ B7 V. Invention Description (lv) Unauthorized users cannot be recognized by the system. Once the PIN number is entered, the system generates an approval signal at step 15.6, which indicates that the user is recognized and will give correct instructions, such as long or short beeps, or a series of LED flashes. In some cases, the user may need to launch a new transmitter that was not previously known to the system. For example, the user may lose the original transmitter and want to plan a new transmitter and adjust the new settings. As long as the user enters the PIN number using a manual input method, such as ignition and / or door switch, the system can learn and confirm the new transmitter. Figure 6 shows the procedure for a known user using a new, unknown transmitter. When the user enters the correct PIN number in step 15-6, the system executes the step of disarming in step 15-8 and determines whether the transmitter can be recognized in step 160. If the system does not recognize the transmitter, in step 16 2 the system stores new link information and updates the software switch settings. If the transmitter is recognized, it can be updated to the link of the software switch change. This can be used to identify a user using a special guest launcher or a single launcher for multiple vehicle security systems. In this way, the software switch can have different settings according to different users. The system can also change the settings appropriately after identifying different users. Once the user enters the correct PIN number and is recognized and approved, as described in step 9 2 of Figure 3, a software switch can be set using the procedure shown in Figure 7 to indicate the setting of the sensitivity level. Step 1 〇 Start a timing step of about one minute. In step 1 7 2, if the calculation _; ____; ___ This paper size applies the Chinese National Standard (CNS) A4 specification (210X297 mm) (Please read the precautions on the back before filling this page) 496834 A7 _________B7 V. Description of the invention () Is exceeded, the system will exit (exit), and the learning mode (learn mode) in the step in Figure 5. In step 176, the user can enter the ten-digit part of the desired software switch number. This part is similar to the part in Figure 5 where you entered the ten-digit number of the PIN number in step 130. Furthermore, after the input is completed, the user also needs to give instructions. At step 178, the system will answer to inform the software switch that the decimal number has been entered. If a correct decimal number of the software switch has not been entered in step 180, the system will return to step 176 for a new entry. If the decimal number of the software switch has been selected, the user can enter the single digit number of the software switch in step 182. At steps 1 8 4 the system can answer the input of single digits. The same &gt; at step 1 8 6, if the user does not input the correct software switch unit digits, the system will return to step 1 8 2 to start a new entry. If the correct software switch number is entered, the system will generate a response signal to the software switch at step 188. The Bureau of Standards and Standards of the Ministry of Economics and Economics has only eliminated the print of the cooperative f --------- · __ • clothing -I (Please read the precautions on the back before filling this page) Figure 8 illustrates the method of the present invention In conjunction with Figure 3, the procedures for performing steps 9, 4, 9, 6 and 98 are described. Among them, the two attack sensitivity levels are "warning" and "major attack". At step 2000, use the procedure shown in Figure 7 to select the sensor adjustment function switch. At step 202, the user indicates that the sensitivity will be adjusted (using the check on the attack level), or the adjustment mode is terminated at step 260. The user can switch between a switch or an input subsystem to provide instructions to indicate that he wants to make adjustments, or to allow time to pass when no adjustment is required. Step 2 0 4 can set a timing time. In this example, the timing time can be longer than the previous timing time, such as about 60 seconds, so that the user • ----- ----- ---------- | Jy 496834 A7 B7 V. Description of the Invention (Rush) There is more time to leave the vehicle and simulate multiple attacks. In step 208, if the attack level exceeds a first sensitivity level, a response signal may be generated in step 208 to inform the user that the sensitivity level has been exceeded. If the timing has been exceeded in step 2 12 before an attack simulation, then in step 2 60, the adjustment mode may be terminated. Otherwise, if the sensitivity level determined by the user in step 2 1 4 is not satisfied, the user may indicate that the sensitivity level is too high or too low in step 2 1.6, which can be accomplished by a combination of switches. If the level is too low, the user can give an instruction at step 2 1 8. This instruction resets the time at step 2 j: 2 0 and adds a level at step 2 2 2 Sensitivity. The input indicator can be activated more than once, so when step 2 2 2, the sensitivity level adjustment can be more than one level. When making this adjustment, the user can be outside the vehicle and processed by limited input switches to simulate the vehicle being attacked by the outside world. In this case, the user can use the remote transmitter input switch to provide user input instructions. For example, a button can be used to increase the sensitivity, and a button 2 can be used to reduce the sensitivity. The third button can be used to change the “adjust warning” level to the “adjust major warning” level. Similarly, if the sensitivity level of level 1 is too high, the user can give instructions in step 2 2 4 and reset the time in step 2 2 6. At step 2 2 8 this sensitivity level will be reduced by one level. Similarly, the input indicator can be activated more than once at step 2 2 4 so that the sensitivity level can be adjusted more than once at step 2 2 8. There are several ways the system can indicate which settings are present. For example, an external alarm bell can be used to change the level of the indication as an output indication. Another — a kind of ______________ ι4 ^ This paper is produced by Yuzhou China Storehouse (GNS) / \ 4 size (210X 297 mm) (Please read the precautions on the back before filling out this page), 11 f 496834 A7 B7 V. Description of the invention (The way is to use ^ several ringtones to represent the level. For example, 1 to 5 ringtones can be used to represent the level range. In addition, if the sensitivity exceeds the last setting, a longer one can be used. The ringtone is used to represent, or a shorter ringtone is used when the level is reduced. The user can repeat the attack simulation and adjustment steps for the first warning level (warning level), or in step 2 1 At 4 it indicates that the attack level meets the requirements and moves to the next sensitivity level at level 2 3 0. The user can set the next level at step 2 3 2 and repeat at step 2 3 4 Design time. The user performs another attack simulation in step 2 3 6 and at this time performs a full level attack. If the sensitivity level 2 is exceeded in step 2 38, then step 2 4 0 A response signal can be generated to inform the user of the level 2 Overridden. This notification can be performed by the user's identifiable output. For example, after the major indication level is exceeded, it can be indicated by a long bell; after the warning level is exceeded, it can be indicated by a piccolo sound. At step 2 4 2 If the timeout is exceeded, and the adjustment mode is terminated at the time of an attack simulation _ 记 _ 绿 之 炸, _Buried in ## 2 6 0. At step '244, if the user feels that the spiritual experience is full before the timeout period ends Department of Central Standards Bureau, Goods 2 Consumer Cooperative, India Fan (please read the notes on the back before filling this page) The sensitivity level is not satisfactory, and at step 246, the user indicates that the sensitivity is too high, then at step 248 The user can provide an input. This input can reset the timing time at step 250. At step 252, the sensitivity can be reduced by one level. As explained earlier, at step 248, a transmitter Keys or other input indicators can be activated more than once. Then at step 252, the sensitivity level can be adjusted more than one level. ___________—_ [5_ Original paper ^ 1 degree appropriate) 1] Chinese prisoner Hum ((^) with specifications (210 &gt; &lt; 297 mm) 496834 A7 B7___ V. Description of the invention (^) If the sensitivity level of level 2 is too low, at step 254, the user can transmit at the far end Pressing a button on the transmitter resets the timing time at step 250. At step 25 S, the sensitivity of level 2 is increased by one level w, and at step 2 54. The transmitter The key can be pressed more than once, so the sensitivity of level 2 at step 253 can be adjusted more than one level. The user can repeat the simulation of the attack and check the sensitivity of the system 'until the user issues an instruction indicating that he is satisfied with the sensitivity, or until the end of the time period. At step 260, the adjustment mode is terminated. FIG. 9 illustrates a combination including two or more functional sensors, which can be used in a specific example of the present invention. In the illustrated example, a microwave sensor and a vibration sensor are combined. In addition, 尙 can use other types of sensors, such as glass break, microwave motion sensors, infrared motion sensors or ultrasonic motion sensors. As shown in Fig. 9, a dual microwave antenna 300 'can send and receive Doppler frequency-shedding signals caused by the human body or the real 1 disturbance in the range of the sensor: microwave oscillator And Doppler 1 Chase If 304 can provide an output signal, the frequency characteristics of which are comparable to human movements, M Department of the Ministry of Justice, quasi bureau, labor, and consumption, printed by Hezhu Society --------- l · — (Please read the notes on the back before filling this page) Same. A three-axis selective resonance inertial mass 302 is placed within the pattern of the microwave antenna. Two different output signals of the microwave oscillator and the Doppler detector 304 are generated at the position point A 305, and are distinguished by the band-pass amplifier 306 and the band-pass amplifier 314. These two band-pass amplifiers have amplitude adjustment capabilities, which are described in more detail in Figure 10. Bandpass amplifier paper Shizhou ~ China 丨 S house standard 彳 (rNS) [Specifications (210 X 297 mm) ~~-496834 A7 B7 V. Description of the invention ((η) ---- J _.._ | ΦΙ — (Read the precautions on the back before filling this page) The output signals of 306 and bandpass amplifier 314 are sent to low-pass detectors 308 and 316, respectively, and low-pass detectors 30S and 3 I6 are providing signals Level sensing comparators 310 and 318. Level sensing comparators 310 and 31S produce outputs 312 and 320. Figure 10 illustrates a bandpass amplifier subsystem, such as bandpass amplifier 306 and band shown in Figure 9. Pass amplifier 314. This subsystem provides a boost that is proportional to the amplitude of the sensor input time history. In this figure, only one bandpass amplifier is used to illustrate how to generate the amplitude output from the time history relationship of the signal. Doppler signal A 305 is essentially a symmetrical positive and negative chirp. The bandpass amplifier 330 can be biased to ground by connecting to a negative input. This bias point can cause the negative chirp part of the Doppler signal A 305 to be intercepted Clip (ped ped) or removed. As shown in Figure 11, this will leave the waveform 350, and the bandpass amplifier 330 The output is amplified. The highest amplitude of the output signal 350 will charge the low-pass detector capacitor 332 to an appropriate amount. The resistor 334 provides a discharge path for the voltage of the capacitor 332. Therefore, this voltage will be shown as signal 352 in FIG. 11 The signal 3S2 is compared with the bias voltage at the negative input terminal of the level sensing comparator 336. The bias voltage input 338 is the minimum detection level 356 as shown in Figure 11. At the detector signal 352 is greater than At the bias voltage of 356, the comparator output 34 is positive, as shown by the signal 358 shown in Figure 11. If ν receives a smaller amplitude Capital input, it can generate a typical sensor signal 36. The signal 36 〇 generates a detector signal 362 and a comparator output signal 364. A longer or shorter duration comparator input signal 3.4.0 will turn on an anti-molybdenum transistor output stage 342, which will produce a negative of 3 12値 Output. ____________________________— This paper is scaled with the Chinese standard ((, NS), 8 (4) (210 X297 mm) 496834, the Ministry of Economic Affairs, Ministry of Standards and Industry, and Consumer Bureau, Hezhu Bamboo Society <A7 B7 V. Description of the invention (") Figures 12 and 13 Other specific examples of the invention, This specific example is a pulse generator on the subsystem of the sensor. This pulse generator generates a pulse wave when the system is attacked, and this pulse wave is sent to the processor. The processor then measures the pulse wave number from the sensor input, rather than the length of a single pulse wave from the sensor, to determine the response. Figure 12 illustrates a bandpass amplifier subsystem, illustrated at 9 The band-pass amplifiers 306 and 314 in the figure are similar in operation to the circuit of FIG. 10. The band-pass amplifier can be biased to ground by connecting to a negative input. This bias point allows the negative part of the Doppler signal A405 to be clipped or removed. As shown in Figure 13, this will leave a waveform of 45 ° and the output of the bandpass amplifier 430 will be amplified. The highest amplitude of the output signal 450 will charge the low-pass detector capacitor 432 to an appropriate amount. Resistor 434 provides a discharge path to the voltage of capacitor 432. Therefore, this voltage will be shown as signal 452 in FIG. Signal 452 is compared to the bias voltage at the negative input of the in-position sensing comparator 436. The bias voltage input 438 is the minimum detection level 456 as shown in FIG. When the detector signal 4S2 is greater than the bias voltage 456, the comparator output 440 is positive, as shown by the signal 4 5 8 in FIG. I 3. The output ig · number 4 4 〇 can be converted into a pulse wave in the time course (d u r a i i ο η) of the signal 4 5 8. The output 3 1 2 of the circuit can be similar to the signal 406, in which the pulse wave can be used to measure the time unit of the processor. The number of pulses generated can be proportional to the size of the disturbance. The level of the attack can be determined by the number of pulse waves generated during the attack. The measurement of the time unit can be completed by a single count or, that is, _________________ This paper size Shizhou Chinese storehouse standard cold (〇 ^) / \ 4 regulations (21〇 ,; &lt; 297 citizenship) (read (Please read the notes on the back before filling this page) Order 496834 A7 B7 V. Description of the invention (丨 i) The software control processor is completed. In some cases, pulse wave detection can be performed instead of measuring the time course of an event. According to the above, it is only a specific embodiment of the present invention, but the structure of the present invention is not limited to this. Any person skilled in the art in the field of the invention, the changes or modifications implemented are covered in this case. Within the scope of patents. (Please read the precautions on the back before filling this page) Conclusion ^ • 部 中心 ## 局 局 贝 工 工 合 合 竹 h \ This paper size Shizhou China storehouse standard 綷 ((, milk) 8 4 specifications (210 '/ 297 公 楚 496834 A 7 ______B7_ ___ 5. Description of the invention (household) Schematic illustration: Figure 1 is a vehicle using the system of the invention; Figure 2 is a block diagram of the moire of the invention; Figure 3 illustrates the method of the invention Basic operation; Figure 4 illustrates the perfect garden of sensor sensitivity; Figures 8 and 8 illustrate the steps of the method of the present invention; Figure 9 illustrates the sensor combination of the present invention; Figure 10 further illustrates The sensor in Fig. 9; and Fig. 11 illustrates the waveform generated by the subsystem in Fig. 10; Fig. 12 is a circuit diagram of another specific example of the present invention; The figure is the waveform generated by 鲩; I .----- n * — ϋ ϋ — (Please read the precautions on the back before filling out this page) Customs · Printed on the paper by the Central Consumers Bureau of the Ministry of Economic Affairs China National Standard (CNS) A4 specification (210X297 mm)

Claims (1)

六、申請專利範圍 —^ 1 · 一種在遠端調整警示系統靈敏度之方法,包含下列 步驟: 確認使用者之身分,包含學習確認一個未知發射 器之步驟; 選擇一軟體開關來指示靈敏度之調整; 模擬一攻擊動作; 提供對於攻擊之回應; 送一調整指示到警示系統;及 調整警示系統回應之回應靈敏度。 2·如申請專利範圍第1項之方法,更包含_個指示對攻 擊回應滿意之步驟,其中所述模擬一攻擊動作、提供對於 攻擊之回應、送一調整指示到警示系統、及調整警示系統 回應之回應靈敏度之步驟可以重複進行,直到指示對攻擊 回應滿意之步驟進行為止。 3 ·如申请專利範圍第1項之方法’其中所述選擇一軟體 開關、模擬一攻擊動作、提供對於攻擊之回應、送一調整 指示到警示系統、及調整警示系統回應之回應靈敏度之步 驟可以對多數之感測器進行。 4.如申請專利範圍第1項之方法,更包含一個對於多數 之攻搫回應選擇所需之攻擊回應位準之步驟,其中針對所 述之多數攻擊回應而言,設定不同之回應靈敏度。 5·如申請專利範圍第1項之方法,其中所述確認使用者 之身分之步驟包含下列步驟: 輸入個人識別號碼,及 由所述之個人識別號碼確認身分。 6·如申請專利範圍第5項之方法,其中對所述之由個人 本紙張足^適用中國國家標準(CNS ) A4規格(&quot;ΙΓ^297公釐)〜 -—- \\SERVER\撰寫中'說明書初稿\Ρ0卜002-TW申請專利d〇c〇2/〇4/]7丨丨a (請先閲讀背面之注意事項再填寫本頁〕 、-&quot; 經濟部智慧財產局員工消費合作社印製 4968346. Scope of Patent Application— ^ 1 · A method for remotely adjusting the sensitivity of the warning system, including the following steps: Confirming the identity of the user, including the step of learning to confirm an unknown transmitter; Selecting a software switch to instruct the sensitivity adjustment; Simulate an attack action; provide a response to the attack; send an adjustment instruction to the alert system; and adjust the response sensitivity of the alert system response. 2. The method of item 1 of the scope of patent application, further comprising _ steps indicating satisfaction with the attack response, wherein said simulates an attack action, provides a response to the attack, sends an adjustment instruction to the warning system, and adjusts the warning system The steps of response sensitivity of the response may be repeated until the steps indicating that they are satisfied with the attack response are performed. 3 The method of item 1 of the scope of patent application, where the steps of selecting a software switch, simulating an attack action, providing a response to the attack, sending an adjustment instruction to the warning system, and adjusting the response sensitivity of the warning system response can be This is done for most sensors. 4. The method of item 1 of the patent application scope further includes a step of selecting the attack response level required for the majority of attack responses, in which different response sensitivities are set for the majority of the attack responses described. 5. The method according to item 1 of the scope of patent application, wherein said step of confirming the identity of the user includes the following steps: entering a personal identification number, and confirming the identity by said personal identification number. 6. The method according to item 5 of the scope of patent application, in which the personal paper is sufficient ^ Applicable to the Chinese National Standard (CNS) A4 specification (&quot; ΙΓ ^ 297 mm) ~---\\ SERVER \ The first draft of the manual \ P0 002-TW application for patent 〇〇〇〇 / 〇4 /] 7 丨 丨 a (Please read the precautions on the back before filling this page] 、-&quot; Consumption by Employees of Intellectual Property Bureau Printed by the cooperative 496834 經濟部智慧財產局員工消費合作社印製 六、申請專利範圍 ^ i-f 識別號碼確認身分之步驟,更包含一個在確認無法進 時,對於使用者告知之步驟。 7 ·如申請專利範圍第6項之方法,其中對於所述之由僻 人識別號碼確認身分之步驟,如無法確認使用者身分時 可重複進行數次,並且如果在預定次數無法完成辨識所述 個人識別號碼後,可包含另一步驟,以在一段時間闪拉絕 使用者進行後續之調整警示系統靈敏度步驟。 8 ·如申請專利範圍第1項之方法,更包含一個依據所述 被確認的使用者而儲存回應靈敏度設定步驟。 9 ·如申請專利範圍第8項之方法,其中所述多數之回應 靈敏度设疋可依據多數被確認之使用者而被儲存。 I 0 · —種在运端調整警示糸統靈敏度之系統,包含·· 多數之感測器,可對於擾動回應,每一感測器具有特別 之感測能力,其中每一感測器產生一電信號,此電信號之 振幅可以表示所述之擾動; 一個處理子系統,可對於所電信號之所述振幅處理,以 產生一個時間相關(time-based)的感測器指示信號,以指示 所述擾動之特性; 一控制器,可回應所述感測器指示信號,並且提供擎示 位準信號,以指示所述擾動之特性; 一個輸出子系統’可提供輸出信號以指示對於馨示位準 信號之回應;及 一個使用者輸入子系統’與所述控制器距離一個遠距 離,包含多數之輸入,以利使用者指示控制器,修正對於 所述擾動之輸出信號。 II ·如申請專利範圍第1 0項之保全警示系統,其中所、求 广请先閲讀背面之ίί-意事項存填寫本貢) ^Jr、:. 02/04/171 1 : 496834 A8 B8 C8 D8 經濟部智慧財產局員工消費合作社印製 「、申請專利範圍 使用者輸入子系統更進一步包含處理開關及遠端發射 元件開關。 1 2.如申請專利範圍第11項之保全警示系統,其中所 處理子系統包含感測器信號以指示所述擾動之時程。 1 3.如申請專利範圍第1 2項之保全警示系統,其中所 指示所述擾動之時程之感測器信號包含一脈波’其時程 比於擾動之振幅。 1 4.如申請專利範圍第1 2項之保全警示系統’其中所 指示所述擾動之時程之感測器信號包含多數脈波’脈波 次數正比於擾動之振幅。 1 5.如申請專利範圍第1 2項之保全警示系統,其中所 控制器可以依據所述擾動之時程而提供不同警示位準 號。 1 6.如申請專利範圍第1 2項之保全警示系統,其中所 控制器可以依據所述擾動之時程特性而提供多數警示 準信號之一。 1 7.如申請專利範圍第1 2項之保全警示系統,其中所述 使用者輸入子系統提供遠端輸入至所述控制器,以依據所 述擾動之時間過程來修正警示位準信號。 1 8.如申請專利範圍第1 2項之保全警示系統,其中所述 多數之感測器包含多種型式之感測器,每一所述感測器可 以被線性控制。 1 9.如申請專利範圍第1 2項之保全警示系統,其中所述 輸出子系統包含一個LED或其他視覺指示裝置。 2 0.如申請專利範圍第1 2項之保全警示系統,其中所述 輸出子系統包含一喇σ八或其他聲音裝置。 器 述 述 正 述 之 述 信 述 位Printed by the Consumer Cooperatives of the Intellectual Property Bureau of the Ministry of Economic Affairs 6. Scope of patent application ^ The i-f identification number confirms the identity, and it also includes a step to inform the user when the confirmation is not available. 7 · The method according to item 6 of the scope of patent application, wherein the step of confirming the identity by the identification number of the lonely person can be repeated several times if the identity of the user cannot be confirmed, and if the identification cannot be completed a predetermined number of times, After the personal identification number, another step may be included to prevent the user from performing a subsequent step of adjusting the sensitivity of the warning system for a period of time. 8 · The method according to item 1 of the scope of patent application, further including a step of storing response sensitivity setting according to the identified user. 9 · The method according to item 8 of the scope of patent application, wherein the majority of the response sensitivity settings can be stored according to the majority of identified users. I 0 · — a system for adjusting the sensitivity of the warning system at the transport end, including most sensors, which can respond to disturbances, each sensor has a special sensing capability, each of which generates a An electrical signal whose amplitude can represent the disturbance; a processing subsystem can process the amplitude of the electrical signal to generate a time-based sensor indication signal to indicate The characteristics of the disturbance; a controller that can respond to the sensor indication signal and provide an indication level signal to indicate the characteristics of the disturbance; an output subsystem 'can provide an output signal to indicate the Response to the level signal; and a user input subsystem 'is a long distance from the controller, including a majority of inputs, so that the user can instruct the controller to correct the output signal for the disturbance. II · If you apply for the security alert system in the 10th scope of the patent application, please read the "Identifications on the back" and fill in the tribute) ^ Jr 、:. 02/04/171 1: 496834 A8 B8 C8 D8 Printed by the Consumer Cooperative of the Intellectual Property Bureau of the Ministry of Economic Affairs, “The user input subsystem of the patent application scope further includes a processing switch and a remote transmitting element switch. 1 2. The security alert system of item 11 in the patent application scope, where The processing subsystem includes a sensor signal to indicate the time course of the disturbance. 1 3. The security alert system according to item 12 of the patent application scope, wherein the sensor signal indicating the time course of the disturbance includes a pulse The time course of the wave is proportional to the amplitude of the disturbance. 1 4. The security alert system according to item 12 of the scope of the patent application, where the sensor signal indicating the time course of the disturbance contains the majority of the pulse waves, and the number of pulse waves is proportional The amplitude of the disturbance. 1 5. If the security alert system of item 12 of the scope of patent application, the controller can provide different warning level numbers according to the time course of the disturbance. 1 6. If the scope of patent application is the first 2 According to the security alert system of item 1, the controller can provide one of the most warning quasi-signals according to the time-history characteristics of the disturbance. 1 7. The security alert system of item 12 in the scope of patent application, wherein the user inputs The subsystem provides remote input to the controller to modify the warning level signal according to the time course of the disturbance. 1 8. The security warning system according to item 12 of the patent application scope, wherein the majority of the sensing The device includes a plurality of types of sensors, each of which can be controlled linearly. 9. The security warning system according to item 12 of the patent application scope, wherein the output subsystem includes an LED or other visual indication 2 0. The security warning system according to item 12 of the scope of the patent application, wherein the output subsystem includes a sigma or other sound device. (請先閲讀背面之注意事項再填寫本頁) 本紙張尺度適用中國國家標準(CNS ) Α4規格(210Χ 297公釐) \\SERVER\撰寫中\說明書初稿\P〇l-〇〇2-TW申請專利 doc 02/04/1 7 1 1:53 AM 經濟部智惡財產局員工消骨合作社印製 496S34 as C8 D8 ^__________----—-^ 六、申請專利範圍 • t 21 · —種,在遠端調整警示系統靈敏度之系統,包含: 多數之感測器,可對於擾動回應,.每一感測器具有特別 之感測能力,其中每一感測器產生一電信號,此電信號之 振幅可以表示所述之擾動; &quot; /個轉換子系統’可對於所述電信號之所述振幅處理, 以產生一個與振幅成正比之時間相關(time-based)的感測 器指示信號,以指示所述擾動之特性; · 一個處理器子系統,可以對所述時間相關的感測器指示 信號處理,以產生用以指示所述擾動之多數脈波信號。 /控制器,可依據所述脈波信號的數量,提供馨卞位$ 信號,以指示所述擾動之特性; 一個輸出子系統,可提供輸出信號以指示對於罄示位.$ 信號之回應;及 ,個使用者輸入子系統,與所述控·制器距離一個遠足 離,包含多數之輸入,以利使用者指示控制器,修正對、 所述擾動之輪出信號。 ' (请先¾讀背ώ之注意事項再填寫本頁}(Please read the precautions on the back before filling this page) This paper size is applicable to the Chinese National Standard (CNS) Α4 specification (210 × 297 mm) \\ SERVER \ Writing \ Draft Manual \ P〇l-〇〇2-TW Apply for a patent doc 02/04/1 7 1 1:53 AM Printed 496S34 as C8 D8 by the Anti-Bone Cooperative of the Intellectual Property Office of the Ministry of Economic Affairs ^ __________----——- ^ VI. Patent Application Scope • t 21 · —Species The system for remotely adjusting the sensitivity of the warning system includes: most sensors can respond to disturbances. Each sensor has a special sensing capability, each of which generates an electrical signal. The amplitude of the signal may represent the perturbation; &quot; A conversion subsystem may process the amplitude of the electrical signal to produce a time-based sensor indication that is proportional to the amplitude Signal to indicate the characteristics of the disturbance; a processor subsystem that can process the time-dependent sensor indication signal to generate a majority of the pulse wave signals used to indicate the disturbance. / The controller can provide a Xin bit $ signal to indicate the characteristics of the disturbance according to the number of the pulse wave signals; an output subsystem can provide an output signal to indicate a response to the full $ bit signal; And, a user input subsystem, a distance away from the controller, includes a large number of inputs, so that the user can instruct the controller to correct the signal of the disturbance and the wheel. '(Please read the precautions before completing this page before filling in this page} 張 纸 本Sheet of paper \\SERVER\撰寫中\說明書初稿\P〇1_〇〇2_tw申猜專利^4vd〇c02/04/l7丨丨:53 am\\ SERVER \ Writing \ Draft Manual \ P〇1_〇〇2_twApplying for a patent ^ 4vd〇c02 / 04 / l7 丨 丨: 53 am
TW88101813A 1999-01-20 1999-01-20 Remotely controlled, adjustable security alarm triggering system TW496834B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW88101813A TW496834B (en) 1999-01-20 1999-01-20 Remotely controlled, adjustable security alarm triggering system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW88101813A TW496834B (en) 1999-01-20 1999-01-20 Remotely controlled, adjustable security alarm triggering system

Publications (1)

Publication Number Publication Date
TW496834B true TW496834B (en) 2002-08-01

Family

ID=21639639

Family Applications (1)

Application Number Title Priority Date Filing Date
TW88101813A TW496834B (en) 1999-01-20 1999-01-20 Remotely controlled, adjustable security alarm triggering system

Country Status (1)

Country Link
TW (1) TW496834B (en)

Similar Documents

Publication Publication Date Title
US7944369B2 (en) Wireless sensing device, system and method
US5309144A (en) Proximity sensing security system
US6184780B1 (en) Vehicle security system having enhanced valet feature and related methods
AU616074B2 (en) Programmable alarm system having proximity detection with vocal alarm and reporting features
US7061378B2 (en) Personal property alarm system
US5739747A (en) Vehicle security system including a remote unit that emulates security system condition local indications and related methods
US11605276B2 (en) Anti-theft device with remote alarm feature
US6107914A (en) Vehicle anti-theft and anti-vandalism alarm
US6184779B1 (en) Vehicle security system having wireless function-programming capability
US20140055264A1 (en) Theft Detection System
US20070279226A1 (en) Security Monitoring System
AU2002251177A1 (en) Personal property alarm system
US5973592A (en) Vehicle security system including a remote unit that emulates security system condition local indications and related method
US5479148A (en) Remote controller for security system
TW496834B (en) Remotely controlled, adjustable security alarm triggering system
SE0950730A1 (en) Vehicles with an alarm system
US6255936B1 (en) Beeper security system
JP3197263U (en) Anti-theft tag and anti-theft system
US20130049953A1 (en) Alarm system
EP2033860A1 (en) Calling-help warning device with a third brake light of an automobile
JP3201620U (en) Antenna device and anti-theft system
TW593025B (en) Vehicle security system with tire monitoring device
AU615798B2 (en) Alarm control system
JP2008030670A (en) Vehicular security device
JP2005149354A (en) Intruder repulsion system

Legal Events

Date Code Title Description
GD4A Issue of patent certificate for granted invention patent
MM4A Annulment or lapse of patent due to non-payment of fees