What is the GSM Communicator
Our GSM communicators are interactive communication/monitoring/automation devices offering simple and flexible solutions of transmitting critical data via the GSM network driven by one of the most commonly used commodity products of today, namely the mobile phone. They are a cost effective and secure alternative to traditional equipment using telephone lines.
Our GSM Communicators integrate with hardwired monitoring/automation technology using the GSM network which affords the ability to control any application via SMS text message (TXT) or call, a form of communication that is fast, encrypted and familiar. This system provides protection against accidental line cuts or deliberate tempering and provides communication from almost anywhere in the world. It offers a complete duplex solution offering interactive report status and activity as well as accepting inbound command enabling to switch virtually any appliance or equipment via output ports.
The units can be integrated to an existing hardwired alarm control panel with programmable outputs or used as a separate security alarm/monitoring system and/or many other applications that are entirely unrelated to security such as industries which have to monitor critical data from sensors i.e. temperature, fire and smoke detectors, level switches, flow switches, ventilation control, medical pendants, automotive switches, panic buttons, perimeter beams etc. Furthermore, with our range of wireless transmitters and receivers the capability of the GSM communicators can be further extended to monitor/control installations in remote areas.
The Audio Tapping facility provides the end-user with an audio surveillance option. This enables the facility to listen into the protected area by simply calling the unit at any time. The audio output can be used to join a hands-free kit or amplifier to establish two way communications to address an intruder, who would definitely be unpleasantly surprised, to hear the voice of the owner.
Each GSM communicator has a security PIN which can be personalized. This PIN is used when programming and communicating with the unit. An alert TXT will be send when an unauthorized mobile number (a number not stored in the GSM Communicator) is trying to excess the unit via call or TXT or if an authorized mobile number is trying to send commands with an incorrect security PIN. The alert TXT contains the unauthorized mobile number trying to gain excess and the time and date of the TXT or call attempt.
Each GSM communicator can be custom named to identify the location or application (i.e. house alarm, factory warehouse, car, batch, boat, container, machine etc. All inputs, outputs, and output switching commands can also be personalized in order to quickly identify what is going on.
A status report of critical system parameters can be obtained at any time by simple TXT command containing: Custom name of the unit, armed/disarmed status, input status on/off, output status on/off, GSM network provider, GSM signal strength, power supply voltage, processor temperature, date and time. The system will automatically send an alert TXT if the power supply voltage exceeds a preset min and max tolerance, the processor temperature exceeds 50 degrees C, and if an unauthorized mobile number is trying to gain excess thus protecting the system from any tempering.
One of the most popular application of these feature-rich products are their home security and home automation capabilities. Our GSM communicators comply with the European standards.
Externally connected devices (i.e. lights, heat pumps, garage doors, power gates etc.) can be remotely controlled via TXT or call through the mobile phone or automatically after any input has triggered (depending custom programming options). A corresponding TXT will be sent to confirm each activity.
Our GSM Communication systems are small in size and big in performance, rich in features with their advanced technology. They are designed and manufactured in Europe and adapt to virtually any application. They are very easy to use and be configured to almost any accessory allowing each system to be tailored for any specific need.