The We.R™ system supports four (4) security arming modes for the system.
These arming modes are set individually for each system device participating in the security
arena (see details in paragraph 4.5. Managing Devices below).
Such a setup is done utilizing the We.R™ Web Application’s Devices Page as detailed in
paragraph 4.5. Managing Devices below.
The We.R™ Web Application’s Status/Activation Bar (see Figure 160 below) and the We.R™
Mobile Application’s Home Status (Main) screen (see Figure 161 below) as well as the Remote
Control Unit (Key Fob) and the Wireless Access Control Reader, provide the tool for triggering
the system arming commands as well as provide the visual status feedback for the User.
Figure 160: The We.R™ Web Application’s Status/Activation Bar
Administration of the We.R™ System
198
We.R™ System User Guide
Figure 161: The We.R™ Mobile Application’s Home Status Screen
4.1.1. Types of Security Arming Modes
The We.R™ system provides four (4) possible security arming modes of operation:
4.1.1.1. Full Arm
Simply referred to as – Arm.
Full arm is triggered by clicking over the _Full Arm_ button in the We.R™ Web Application’s
Status/Activation Bar, or by tapping over the button in the We.R™ Mobile Application’s
Home Status screen.
Administration of the We.R™ System
We.R™ System User Guide
199
Change of arming status is acknowledged by the status icon.
In this mode of operation, the We.R™ system protects ALL zones. This mode arms all of the
sensor devices on the premises and an alarm will be triggered by any of them upon detecting
an intrusion.
4.1.1.2. Day Arm
Day arm is triggered by clicking over the _Day Arm_ button in the We.R™ Web Application’s
Status/Activation Bar, or, tapping over the button in the We.R™ Mobile Application’s
Home Status screen.
Change of arming status is acknowledged by the status icon.
In this mode of operation, the We.R™ system protects and monitors designated hazardous
zones. This scenario is used mostly for childcare and safety applications, allowing the user to
monitor and protect zones like medicine cabinet, swimming pools, basements, etc.
4.1.1.3. Night Arm
Night arm is triggered by clicking over the _Night Arm_ button in the We.R™ Web
Application’s Status/Activation Bar, or, tapping over the button in the We.R™ Mobile
Application’s Home Status screen.
Change of arming status is acknowledged by the status icon.
In this mode of operation, the We.R™ system protects and monitors designated area on the
premises from intruders. This scenario can arm, for example, only the front door, back door
and balcony.
Administration of the We.R™ System
200
We.R™ System User Guide
4.1.1.4. Disarm
In addition to the above described status icon changing its face and color to acknowledge the
trigger of specific arming mode, the buttons used for the triggering also changes:
The left-most arming button in the We.R
™
Web Application’s Status/Activation Bar
will change its color to green and its title text will change into _Disarm_.
Once changed, clicking over this button again will disarm the system from the specific
arming mode it was triggered for.
Change to disarm mode of operation is acknowledged by the status icon as
well as the triggering buttons returning to the disarm indication (color and text).
When triggering the system into any of the three security arm modes via the We.R
Mobile Application, the three arming buttons at the bottom of the We.R™ Mobile
Application’s Home Status screen () will turn into the
button.
Disarming the system via the We.R™ Mobile Application is done by tapping over this
button.
™
4.1.1.5. Arming/Disarming with We.R
™
System Devices
The above detailed security arming modes of operation can also be triggered by the Remote
Control Unit (Key Fob) or the Wireless Access Control Tag Reader devices simply by attaching
the Tag to the Tag Reader (in case a TR5 is used in the system) and or pressing the relevant
keys as demonstrated in Figure 162 below:
Administration of the We.R™ System
We.R™ System User Guide
201
Day Arm
Full Arm
Night Arm
Disarm
Figure 162: Triggering Arm Modes with Devices
Disarming with the Wireless Access Control Tag Reader device is done by putting the Tag in
close proximity with the Tag Reader.
4.1.1.6. Force Arming
If attempt is made to arm the system (full arm, night arm and day arm), where one or more of
the sensor devices is opened (i.e. a window/door with a Magnetic Sensor is opened), a
notification about these devices will be given and the system will allow performing a forced
arm. In case of forced alarm, such an opened device will be bypassed by the system.
4.2. Handling Alarms
The We.R™ system may alarm the User with three (3) different types of alarms:
Security Alarms
Safety Alarms
Administration of the We.R™ System
202
We.R™ System User Guide
Panic Alarms
4.2.1. Security Alarms
Once the system is armed (full arm or night arm or day arm), an alarm will be triggered in the
following security events:
A Magnetic Sensor (MGL) monitored window/door was opened.
A Motion Detector (PIR) or a Motion Indoor Photo Detector (IPD) detected some motion
within its detection range, or, if any device is tampered while the system is armed.
If a Security Alarm was triggered, the User will receive an Alarm Notification on his We.R™ Web
Application (assuming the User is logged in) and on his smartphone (where the We.R™ Mobile
Application software was installed).
On the We.R™ Web Application’s Status/Activation Bar:
Figure 163: Security Alarm Notification on the We.R™ Web Application
The status icon will blink in red, and
Two buttons will lit in red allowing the User to:
Stop the Siren sound,
Disarm the system.
On the We.R™ Mobile Application, the following notification message window will pop-up to
draw the User’s attention:
Administration of the We.R™ System
We.R™ System User Guide
203
Figure 164: Security Alarm Notification on the We.R™ Mobile Application
The Home Status screen will display:
Where:
A Burglary Alarm title will be presented along with the triggering device identification
The status icon will blink in red, and
Figure 165: Security Alarm Screen on the We.R™ Mobile Application
and a time stamp.
Administration of the We.R™ System
204
We.R™ System User Guide
Three (3) new buttons will be presented at the bottom of the screen to allow:
– monitor the premises by watching video-like images taken if the
triggering device was a Motion Indoor Photo Detector (Camera).
Alarms triggered by a Camera allow monitoring of the premises by the image
presentation screen which, upon tapping this button, opens to display the area in
front of the Camera.
The button at the bottom of the screen switches the display between video-like
and freeze modes of display.
The button sends the captured images to the User email address.
Tapping over this button will pop-up the acknowledgement window:
Administration of the We.R™ System
We.R™ System User Guide
205
Figure 167: Sending Images to Email Acknowledgement Window
Tapping over the button will terminate the email operation.
Tapping over the button will send the images via email to the User.
Upon completion, the following confirmation message window will pop-up:
Figure 168: Email Confirmation Message Window
Tapping over the button will conclude the send images by mail
operation and return the screen to the Security Alarm Image Presentation Screen
(see above Figure 166).
In the Security Alarm Image Presentation Screen, tapping over the button
will terminate the Camera captured image presentation session and return the
screen to the Security Alarm Screen (see above Figure 165).
– making emergency phone calls from the smartphone,
Administration of the We.R™ System
206
We.R™ System User Guide
– disarming the system.
4.2.2. Safety Alarms
Beside security, the We.R™ system also provides for safety features, utilizing devices like the:
Smoke Detector (SK2)
Flood Detector (FL), and
Universal Transmitter interfacing between the We.R
party manufacturers.
Setup, scenarios of operation and alarm notifications of these safety devices are incorporated
into the system by means similar to the security devices. See details in paragraph 4.5.
Managing Devices below.
™
system and safety device from 3rd
If a Safety Alarm was triggered, the User will receive an Alarm Notification on his We.R™ Web
Application (assuming the User is logged in) and on his smartphone (where the We.R™ Mobile
Application software was installed).
On the We.R™ Web Application’s Status/Activation Bar:
Figure 169: Safety Alarm Notification on the We.R™ Web Application
The status icon will blink in orange, and
Two buttons will lit in orange allowing the User to:
Stop the Siren sound,
Dismiss the alarm and, if the system was armed – disarm it.
Administration of the We.R™ System
We.R™ System User Guide
207
On the We.R™ Mobile Application, the following notification message window will pop-up to
draw the User’s attention:
Figure 170: Safety Alarm Notification on the We.R™ Mobile Application
The Home Status screen will display:
Where:
A Flood (or Smoke) Alarm title will be presented along with the triggering device
Figure 171: Safety Alarm Screen on the We.R™ Mobile Application
identification and a time stamp.
Administration of the We.R™ System
208
We.R™ System User Guide
The status icon will blink in orange, and
Two (2) new buttons will be presented at the bottom of the screen to allow:
– making emergency phone calls from the smartphone,
– dismissing the alarm and, if the system was armed – disarm it.
4.2.3. Panic Alarms
The We.R™ system also supports panic alarming for personal emergency cases.
Triggering of panic alarm is done manually by the User either by simultaneously pressing the
Remote Control Unit (Key Fob) two buttons marked with red or by pressing the Wireless
Access Control Tag Reader’s button marked with SOS.
Figure 172: Panic Alarm Triggering Devices and Buttons
No setup or scenarios of operation need to be established for this type of alarms.
Administration of the We.R™ System
We.R™ System User Guide
209
If a Panic Alarm was triggered, the User will receive an Alarm Notification on his We.R™ Web
Application (assuming the User is logged in) and on his smartphone (where the We.R™ Mobile
Application software was installed).
On the We.R™ Web Application’s Status/Activation Bar:
Figure 173: Panic Alarm Status Display on the We.R™ Web Application
The status icon will blink in red, and
Two buttons will lit in red allowing the User to:
Stop the Siren sound,
Disarm the triggering device and the system.
On the We.R™ Mobile Application, the following notification message window will pop-up to
draw the User’s attention:
Figure 174: Panic Alarm Notification in the We.R™ Mobile Application
The Home Status screen will display:
Administration of the We.R™ System
210
We.R™ System User Guide
Figure 175: Panic Alarm Home Status Screen
Where:
A Panic Alarm title will be presented along with the triggering device identification and a
time stamp.
The status icon will blink in red, and
Three (3) new buttons will be presented at the bottom of the screen to allow:
– monitoring the premises by watching video-like images taken by the
Motion Indoor Photo Detectors (Cameras).
Panic Alarms allow monitoring of the premises by a process similar to the
Monitoring the Premises process (comfort video, see paragraph 4.3. below).
Tapping over this button will open the Last Security Videos selection screen:
Administration of the We.R™ System
We.R™ System User Guide
211
Figure 176: Last Security Videos Selection Screen
Where:
Tapping over the button refreshes the displayed list of available videos
and their related data (triggering device, time stamp, etc.).
Tapping over the button terminate this Watch Video procedure and
switches the display back to the Home Status Panic Alarm Screen (see
Figure 175 above).
Tapping over the arrow () to the right of the selected last taken video will
open the Camera Display screen (see Figure 177 below) and present the
selected images/video:
Administration of the We.R™ System
212
We.R™ System User Guide
Figure 177: Camera Display Screen
The button at the bottom of the screen switches the display between video-like
and freeze modes of display.
The button sends the captured images to the User email address.
Tapping over this button will pop-up the acknowledgement window:
Figure 178: Sending Images to Email Acknowledgement Window
Tapping over the button will terminate the email operation.
Administration of the We.R™ System
We.R™ System User Guide
213
Tapping over the button will send the images via email to the User.
Upon completion, the following confirmation message window will pop-up:
Figure 179: Email Confirmation Message Window
Tapping over the button will conclude the send images by mail
operation and return the screen to the Camera Display screen (see above Figure
177).
In the Camera Display screen, tapping over the button will terminate the
Camera captured image presentation session and return the screen to the Panic
Alarm Screen (see above Figure 175).
– making emergency phone calls from the smartphone,
– disarming the system.
4.3. Monitoring the Premises
Utilizing the system’s installed camera(s), the We.R™ also allows its users to willfully monitor
(non-alarm triggered, initiated by the User) the premises, using the We.R™ Web Application or
the We.R™ Mobile Application.
Administration of the We.R™ System
214
We.R™ System User Guide
This type of system usage is usually referred to as “Comfort Video”.
4.3.1. Monitoring with the We.R
™
Web Application
The center pan of the main screen (the Dashboard) data zone provides the means for comfort
video:
Figure 180: The Dashboard’s Camera Presentation
The bottom half of the center pane presents all system available cameras, out of which the
desired camera need to be selected by clicking once over its icon.
Upon selection, the system activates this camera and sends the images captured for viewing
within the frame at the top half of this pane (see Figure 181 below).
Administration of the We.R™ System
We.R™ System User Guide
215
To see these images in video-like mode, click over the button. It will run the images for
about 40 seconds, in sequential mode, providing realistic monitoring of the premises.
Figure 181: Camera’s Captured Images Presentation
Once clicked upon, the button turns into a button allowing the User to halt the
presentation.
4.3.2. Monitoring with the We.R
™
Mobile Application
Similar to the We.R™ Web Application, the Video Tab/screen of the We.R™ Mobile Application
allows comfort view of the environment where the camera is installed.
Tapping over the Video Tab will switch the display to the Take Video screen (see Figure 182
below). This screen displays all cameras included in the system and the desired camera should
be selected out of this list.
Administration of the We.R™ System
216
We.R™ System User Guide
Figure 182: The Take Video Screen
To refresh the Available Cameras list – tap over the button.
Tapping over one of the cameras in the list selects the camera and switches the screen into a
camera display screen presenting the view in front of the camera:
Figure 183: Comfort View of Camera
Administration of the We.R™ System
We.R™ System User Guide
217
The button at the bottom of this screen is the Play/Pause switch.
Tapping over the button will terminate the comfort video session.
The images presented by the comfort view may be sent to the email address provided during
the We.R™ Mobile Application Registration procedure by clicking over the button.
Confirmation window will pop-up:
Figure 184: Confirmation of Image Transfer
Confirmation for sending the images via email is done by tapping over the button or
canceled by tapping over the button.
Success of the image transfer is acknowledged by the following message window:
Figure 185: Acknowledgement of Image Transfer
Administration of the We.R™ System
218
We.R™ System User Guide
Note: Managing Users is possible only through the We.R™ Web Application
and by Master User only.
Tapping over the button will terminate the email process and return the
We.R™ Mobile Application to the Comfort View of Camera screen (see above Figure 183)
where tapping over the button will terminate the comfort video session and return the
display to the Home Status (Main) screen.
4.4. Managing Users
The We.R™ system requires definition of the Users allowed to control and use its operation.
For this purpose, Users need to be profiled and their data and types of control devices need to
be carefully defined in the system.
4.4.1. Profiling Users
Prior to adding a new User (or editing its setup) into the We.R™ system, an analysis of the
User’s requirements must be done to determine the reasons of its participation in the system
control and usage.
This process is called – Profiling Users.
1. The User need to be defined as either Master User (indicated by the system with icon) or
standard User (indicated by the system with icon).
The following considerations need to be applied:
a) Unlike a Standard User, a Master User may modify the system configuration
data, system Users’ data, delete/add Device/User, etc.
b) Up to two (2) Master Users may be defined in a single system.
Administration of the We.R™ System
We.R™ System User Guide
219
c) Maximum total of 32 Users are supported by a single system (the two Masters
included).
2. Is the User going to use a Remote Control Unit (Key Fob) or a Tag to activate the system?
3. Does this User has a smartphone and is he going to use the We.R
™
Mobile Application?
4. What language does this User need for his notifications and push-messages?
Also, there is a need to prepare password and User Code for this User.
4.4.2. Adding Users
There are two panes in the Users page:
The left (overview) pane provides the User name and type (Master/Standard).
The right (details) pane provides all required data of the highlighted User line-item in the
left pane.
Figure 186: The We.R™ Web Application Users Page
Administration of the We.R™ System
220
We.R™ System User Guide
To add a new User, click over the button.
A new empty row will open in the left pane while its empty data fields – in the right pane.
Type-in the User’s data as follows:
The User name.
The User Email address (for notifications).
Figure 187: The Users Page Data Pane
The User Password (minimum of six alpha-numeric characters, case sensitive).
This password needs to be re-typed in the next row for confirmation.
The User Profile – select Standard or Master.
The Notification Language – select from the list of supported languages.
The User cellular phone number (international format, digits only).
The User Code (four digits) – for the Mobile Application.
Administration of the We.R™ System
We.R™ System User Guide
221
Note: Assigning Remote Control Unit (Key Fob) or a Tag to this User is
done via the Devices page (see paragraph 4.5. below).
Once all the above data fields have been filled; click over the button to store the new
data into the system configuration files. The new empty row opened on the left pane will
display the User name and type once the new User data is accepted by the system.
4.4.3. Removing Users
Users may be removed from the system (by Master User only) by highlighting the specific User
line-item (row) in the left pane of the Users page (clicking over it), and then clicking over the
button.
Once the change is accepted by the system, the User’s row on the left pane will be deleted.
4.4.4. Editing Users
Standard Users may partially edit their data (right pane fields).
Such editing may be done on the following fields only:
User name
User’s email address
User’s mobile number
User’s Code
Standard Users may also change their password by marking the check-box and typing-in the
new password (twice).
Other fields are restricted for editing by Master Users only.
Once any of the data fields have been changed; click over the button to store the
new data into the system configuration files.
Administration of the We.R™ System
222
We.R™ System User Guide
Note: Managing Devices is possible only with the We.R™ Web Application.
Note: Adding Devices is possible only by a Master User utilizing the We.R™
Web Application.
4.5. Managing Devices
The We.R™ system requires detailed definition of the Devices included in the system.
4.5.1. Adding New Devices
New Devices may be added (up to the system’s limitation, see Table 5 on page 194), to the
system at any time following its initial installation.
The process of adding a new Device is detailed, for each Device type, in paragraph 3.
Installation of the We.R™ System above, but, could be generally described as follows:
1. Clicking over the button opens a roll-down selection menu:
Figure 188: The Devices Selection Roll-down Menu
Administration of the We.R™ System
We.R™ System User Guide
223
Note: In case the installation of the batteries could not be accomplished
within the three (3) minutes period, it is possible to restart the process.
2. The Device to be installed should be selected out of the menu list.
3. Once selected, the Add New Device window will pop-up and its timer will start running.
4. Use this window’s title to verify that the Device Type is the type selected from the roll-down
menu.
Figure 189: Add New Device Timer Window
5. The down-counter provides a time-frame of three (3) minutes within which the batteries
should be installed to power-up the Device.
6. The batteries insertion triggers a pairing process in which the Device communicates with
the CCU to inform it of its presence and the CCU add it to its peripherals’ inventory.
7. If the CCU did not detect the new Device within this time-frame, the following error ( )
message will appear within the Add New Device window:
Administration of the We.R™ System
224
We.R™ System User Guide
Note: Removing Devices is possible only by a Master User and with the
We.R™ Web Application.
Figure 190: Add New Device Timeout Error Message
Click over the button to re-initiate the Add New Device process.
Clicking over the button will terminate the Add New Device process.
8. If the new Device was properly detected by the CCU, the counter will freeze and a Device
Properties sub-window will appear where the Device’s system name/location needs to be
typed-in as well as other features’ data (see paragraph 4.5.3 below) upon clicking over the
button.
9. Clicking over the button will end the Add New Device process.
The new device is added with its default operational details (i.e. Name/Location, arming
scenarios, etc.). These details might be edited, during the Add Device procedure or later on, as
described in paragraph 4.5.3 below.
4.5.2. Removing Devices
Administration of the We.R™ System
We.R™ System User Guide
225
Note: Editing Devices’ properties is possible only by a Master User and with
the We.R™ Web Application.
A Device may be removed by selecting its row in the left pane of the Devices page and clicking
over the button.
4.5.3. Editing Devices’ Properties
The We.R™ Web Application also enables editing of Devices already installed.
The editable data include the Device’s Name/Location as well as the Devices’ operational data
(Arming/Disarming Scenarios and special features).
Fields for such operational data are revealed/covered upon clicking over the /
button.
These fields might include:
Arming scenarios – to define if the Device will be included in the Day and/or Night
arming scenarios.
Arming Scenarios – what would the Device trigger (detection response) in case armed.
Non-armed Scenarios – some devices might also be functional even if not armed (i.e.
the Door/Window Magnetic Sensor may chime upon detection even if not armed to
inform the User of entries to the premises) and this data fields define such
functionalities.
Special features – if the Device has other data to be considered for proper system
operation (i.e. the Wireless Access Control Tag Reader can be installed indoor or
outdoor where indoor it is used for system arming like the Remote Control Unit and
outdoor – as a door bell), the operation data (scenarios) need to be defined.
A right pane demonstrating all the above is the Door/Window Magnetic Sensor installation
pane:
Administration of the We.R™ System
226
We.R™ System User Guide
Note: This configuration may be enabled, per device, for the security
devices (PIR/IPD/MGL).
Name/Location
Arm Scenarios
Disarm Scenarios
Special Features
Figure 191: Right Pane of Door/Window Magnetic Sensor
Once all Device definitions are provided, the button needs to be clicked upon to
store the data in the system.
4.5.4. Advanced Configurations of the We.R
™
Devices
4.5.4.1. Entry/Exit
This feature provides the owner with time gap to arm (or disarm) the system while entering (or
exiting) the premises without triggering an alarm.
Once the Entry/Exit feature is enabled:
A premises entry delay of 30 seconds will be triggered upon detection event, allowing
the User to disarm the system prior to triggering an alarm.
In case a Siren is installed in the system, the delay will be accompanied by short beeps
to notify the User about the delay.
Loading...
+ 76 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.