Menu English Ukrainian russian Home

Free technical library for hobbyists and professionals Free technical library


ENCYCLOPEDIA OF RADIO ELECTRONICS AND ELECTRICAL ENGINEERING
Free library / Schemes of radio-electronic and electrical devices

Security device controlled by iBUTTON tablets. Encyclopedia of radio electronics and electrical engineering

Free technical library

Encyclopedia of radio electronics and electrical engineering / Security and alarm via mobile communication

Comments on the article Comments on the article

Below is a diagram of a security device using Touch Memory electronic keys of the DS1990A type. The device is assembled on the basis of the PIC16F628A microcontroller.

Security device controlled by iBUTTON tablets. Schematic diagram of the security device
(click to enlarge)

Device Features:

  • Follow the sensor (any optional, hereinafter referred to as the "loop")
  • Watch out for power outages (at the outlet)
  • Turn on the siren in case of alarm
  • Activate an additional output (if you want to connect something of your own)
  • When connecting a mobile phone by Usart, can dial numbers from the address book
  • Arming and disarming using the IButton tablet (hereinafter referred to as the "Pill" or "Key")

Device parameters

  • The device has parameters that are written to the EEPROM during the firmware of the controller and do not change in the future
  • Below is the parameter table with the address and brief description of the parameter
  • In the left column - the address of the EEPROM cell in which the parameter is located, in the right - description
Address ( HEX ) Description
70 h Siren sounding time ( 0-255 sec.)
71 h Number of loop check cycles in case of alarm (0-255 units)
72 h Loop delay ( 0-255 sec.)
73 h Power failure delay ( 0-255 sec.)
74 h Time of active state add. exit ( 0-255 sec.)
75 h Arming Delay ( 0-255 sec.)
76 h Number of numbers in a mobile phone (0-9 units)
77 h Time between redials (0-255 sec.)

By the address 7Dh there is a parameter with device configuration bits. Below is a bit table with a number and a brief description of the parameter. In the left column - the serial number of the bit, in the middle - the decimal value of the bit, in the right - description.

bit number DEC Description
№ 0 1 After a loop break, waiting for:
1 - setting the loop to its original position
0 - disarm
№ 1 2 Activate auxiliary output on alarm
1 - yes
0 - no
№ 2 4 Activate auxiliary output in case of power failure
1 - yes
0 - no
№ 3 8 Dial on alarm
1 - yes
0 - no
№ 4 16 Dial numbers in case of power failure
1 - yes
0 - no
№ 5 32 Beep when reading pills
1 - yes
0 - no
№ 6 64 Beep when arming
1 - yes
0 - no
№ 7 128 Additional output duplicates the security mode
1 - Yes (bits no. 1,2 reset)
0 - No

For example:

If you need to install 0th, 1st and 5th, but not the rest, then in bin it is 00100011 . We translate into DEC ( decimal value ) - this is 35. So we write at the address 7Dh the number 35 (in hex = 23h). If it is not clear, then do this: In the second column of the table, the decimal values ​​​​of each bit are written, if the bit needs to be set (1), then add the value corresponding to the bit, if it is not necessary to set (0), then do not add. Write the received amount to the address 7Dh.

Operation of the device

The operation of the device consists of 4 modes:

  • Key programming mode
  • Normal mode (out of guard)
  • Security mode
  • Alarm mode

Key programming mode

In the key programming mode, the LED lights up with short-term extinctions. The duration of the mode is 10 seconds. When the device is started, the controller checks if it has keys in its memory, and if not, it switches to programming mode. You can switch to the mode yourself. To do this, briefly press the "Prog" button. When reading a tablet in this mode, it is stored in the controller's memory and confirmed by a siren sound. After 10 seconds, the device switches to normal mode. You can record a maximum of 15 keys, further keys will not be recorded. Keys that already exist are not written.

Normal mode

The LED in this mode duplicates the loop, i.e. if the loop is closed, the LED is on and vice versa.

В normal mode the device is waiting to be armed. When reading an existing tablet in the memory, the device gives a short sound signal (if bit No. 5 of the parameter is set 7Dh ). After that, the delay begins, the value in seconds, which is the parameter 75h After this delay, the device switches to security mode accompanied by a sound signal (if bit No. 6 of the parameter is set 7Dh ).

Security mode

In this mode, the device monitors the cable and the voltage after the power supply. The LED in this mode blinks once per second with short flashes. When reading an existing tablet in the memory, the device gives a short sound signal (if bit No. 5 of the parameter is set 7Dh ) and goes to normal mode.

When the loop is opened, a delay begins, the value in seconds, which is the parameter 72h If bit #0 of the parameter is set 7Dh, then the device, during this delay, waits for the loop to be set to its original position (closed) and if the loop is not closed, then it turns on alarm mode. If bit No. 0 is not set, then during this delay it is necessary to disarm the device, otherwise the alarm mode.

In the event of a power failure, a delay begins, the value in seconds, which is the parameter 73 h.If power is supplied during the delay, the delay is terminated. If bit #2 of the parameter is set 7Dh, then after this delay, an additional output is activated (a logical unit is set) for a time, value in seconds, which is the parameter 74hIf bit #4 of the parameter is set 7Dh, then after this delay, dialing starts (see below).

Alarm mode

In this mode, the siren starts to sound. The playing time is set in the parameter 70 h. After this time, the device checks the loop, and if it is not closed, the cycle starts again. And so as many times as specified in the parameter 71h

If bit #1 of the parameter is set 7Dh, then the additional output is activated (a logical unit is set) for a time, value in seconds, which is the parameter 74h If bit #3 of the parameter is set 7Dh, dialing starts (see below).

If an existing tablet is read in this mode, the siren stops sounding and dialing stops (see below).

Number set

Numbers are dialed by sending a command to the mobile phone.

The device starts calling the numbers recorded in the phone book. The number of dial-in numbers is determined by the parameter 76 h. The time between calls is defined in the parameter 77 h. Those. after this time, the device starts calling the next entry in the phone book. The maximum number of rooms is 9, the minimum is 0.

Reset

Resetting the keys from the memory is done by pressing the "Reset" button. Reset occurs from any mode of the device. After the reset, the device goes into key programming mode.

Firmware can be downloaded here

The author accepts orders for the development of devices based on MK

Author: Alexey Klyushnikov, Ivanovo, al.kl [dog] mail.ru; Publication: cxem.net

See other articles Section Security and alarm via mobile communication.

Read and write useful comments on this article.

<< Back

Latest news of science and technology, new electronics:

Artificial leather for touch emulation 15.04.2024

In a modern technology world where distance is becoming increasingly commonplace, maintaining connection and a sense of closeness is important. Recent developments in artificial skin by German scientists from Saarland University represent a new era in virtual interactions. German researchers from Saarland University have developed ultra-thin films that can transmit the sensation of touch over a distance. This cutting-edge technology provides new opportunities for virtual communication, especially for those who find themselves far from their loved ones. The ultra-thin films developed by the researchers, just 50 micrometers thick, can be integrated into textiles and worn like a second skin. These films act as sensors that recognize tactile signals from mom or dad, and as actuators that transmit these movements to the baby. Parents' touch to the fabric activates sensors that react to pressure and deform the ultra-thin film. This ... >>

Petgugu Global cat litter 15.04.2024

Taking care of pets can often be a challenge, especially when it comes to keeping your home clean. A new interesting solution from the Petgugu Global startup has been presented, which will make life easier for cat owners and help them keep their home perfectly clean and tidy. Startup Petgugu Global has unveiled a unique cat toilet that can automatically flush feces, keeping your home clean and fresh. This innovative device is equipped with various smart sensors that monitor your pet's toilet activity and activate to automatically clean after use. The device connects to the sewer system and ensures efficient waste removal without the need for intervention from the owner. Additionally, the toilet has a large flushable storage capacity, making it ideal for multi-cat households. The Petgugu cat litter bowl is designed for use with water-soluble litters and offers a range of additional ... >>

The attractiveness of caring men 14.04.2024

The stereotype that women prefer "bad boys" has long been widespread. However, recent research conducted by British scientists from Monash University offers a new perspective on this issue. They looked at how women responded to men's emotional responsibility and willingness to help others. The study's findings could change our understanding of what makes men attractive to women. A study conducted by scientists from Monash University leads to new findings about men's attractiveness to women. In the experiment, women were shown photographs of men with brief stories about their behavior in various situations, including their reaction to an encounter with a homeless person. Some of the men ignored the homeless man, while others helped him, such as buying him food. A study found that men who showed empathy and kindness were more attractive to women compared to men who showed empathy and kindness. ... >>

Random news from the Archive

Neanderthals were doomed 01.03.2012

A group of Swedish and Spanish researchers from Uppsalla, Stockholm and Madrid reported in the journal Molecular Biology and Evolution the news that "whitewashed" our African ancestors - according to scientists, Neanderthals themselves began to rapidly die out long before the first foot of a modern man set foot on their territory. .

Until now, it was believed that Neanderthals lived steadily in Europe for hundreds of thousands of years until our ancestors got tired of Africa. Now it turns out that it wasn't quite like that. According to scientists, Neanderthals began to die out sharply somewhere around 50 thousand years ago. After most of them died out, a small group of surviving Neanderthals populated the central and western parts of Europe, where they managed to live for another ten thousand years, until the Cro-Magnons, modern people, appeared on the scene.

This assumption was made by the Swedish-Spanish group on the basis of data obtained during the study of the DNA of Neanderthals. According to them, European Neanderthals, who lived during the last ten thousand years before the advent of modern man, have very small genetic differences. Their genomes differed even less than the genomes of the inhabitants of today's Iceland differ. This means that the DNA almost did not mutate, that is, the Neanderthals themselves did not adapt in any way to the sharp climatic changes of that time and therefore were already doomed from the very beginning.

Older fossils of European Neanderthals show much greater genomic variation - about the same level as that recorded in Asian Neanderthals and representatives of today's humanity. It is still completely unclear why the DNA of European Neanderthals 50 thousand years ago was suddenly attacked by such literally murderous conservatism.

Paleogenetics is a very difficult task. Researchers are dealing with very time-destroyed DNA, from which it is extremely difficult to extract at least some information. Scientists had to resort to the help of a wide variety of experts - statisticians, experts in modern DNA sequencing, paleoanthropologists, IT specialists, etc. from Denmark, Spain and the USA. To get to the genetic information about Neanderthals, they needed special laboratory equipment, special computational methods. From such interdisciplinary cooperation, they expect no less amazing discoveries about the life of our great-ancestors.

Other interesting news:

▪ Protect computer protection system based on user trust index

▪ Found the oldest artificial cosmetics

▪ Soil houses

▪ Inexpensive dense 3D memory

▪ Nanosilicon in the fight against infections

News feed of science and technology, new electronics

 

Interesting materials of the Free Technical Library:

▪ section of the site Electrician in the house. Article selection

▪ article Carrying and transportation of the victim. Occupational Safety and Health

▪ article What is the difference between newborn crying in different countries? Detailed answer

▪ article by André-Marie Ampère. Biography of a scientist

▪ article EPS indicator of oxide capacitors. Encyclopedia of radio electronics and electrical engineering

▪ article A man passes through glass. Focus secret

Leave your comment on this article:

Name:


Email (optional):


A comment:




Comments on the article:

a guest
Thanks Alexey for this us-in and most importantly, for the free firmware! Installed in a country house. There are disadvantages, such as one AL input, there is no remote control of its performance ... I eliminated these disadvantages by a simple change in the circuit for myself. Works for 3 years without a hitch. Thanks again!


All languages ​​of this page

Home page | Library | Articles | Website map | Site Reviews

www.diagram.com.ua

www.diagram.com.ua
2000-2024