Call Sales Free: 0800 9882434
Home » Products » Monitoring » Intruder Alarm Monitoring » Types of Alarm Signalling » Chiron Iris IP

Chiron Iris IP Digital Communicator

Key Features:
  1. Cost effective linking all major panels with analogue dialling
  2. Can carry alerts across traditional or I.P. routes
  3. Secure Encrypted Links
  4. Can offer remote uploads and configuration of Panel
  5. Cost effective Host Software for ARC’s
 

Benefits to the Alarm Industry

  1. Reduces communications costs for transmission and monitoring
  2. Compatibility with new standards (EN50136)
  3. Platform for new services (e.g. video verification)
  4. Needs no investment in new alarm panels

Polling Procedure

  1. IRIS 800 sets up TCP/IP connection to IRIS Polling Engine and sends its identification (account number)
  2. IRIS Polling Engine issues a random ‘challenge’ to authenticate the caller
  3. IRIS 800 encrypts the challenge using its preloaded security key, and sends result back to Polling Engine. Status of all local comms lines also reported to Polling Engine
  4. Polling Engine checks result matches what it gets when it encrypts the challenge with its local copy of the keyIf OK, Polling Engine downloads any new parameters (e.g. poll period) to remote unit and reports any comms status changes to ARC. Overdue polls reported to ARC
Alarm Transmission Procedure
  1. Alarm dialler goes off hook, receives local dial-tone from the IRIS 800 and dials IP address of IRIS Receiver
  2. IRIS 800 makes TCP/IP connection to IRIS Receiver and is authenticated, as with Polling
  3. IRIS 800 issues ‘Handshake’ tone to alarm dialler and collects alarm signal. Alarm protocol (FF, CID or SIA) is auto-detected
  4. Alarm signal is encrypted and sent to IRIS Receiver where it is forwarded to the ARC
  5. IRIS Receiver confirms receipt to IRIS 800 which sends ‘Kiss-off’ to the alarm dialler
Benefits of IRIS Approach
  1. IRIS Polling Engine does not need to know IP address of IRIS 800 – system can operate through Fire Walls, NAT Servers, Public/Private Gateways and over GPRS
  2. High level of security – authentication and encryption using MD5 and RC4 algorithms - Security key itself is not transmitted
  3. Each transaction has a random element so will appear different to interceptors
  4. Every IRIS 800 has its own security key of up to 256 bits
  5. Alarm signals passed transparently from dialler to ARC
  6. Any interruption of transmission causes dialler to retry