Beruflich Dokumente
Kultur Dokumente
System
User Guide
ESUG05022
Version 4.2
July 2015
Legal Notice
Usage of this document, and all information (including product information) provided within, are subject to the following terms and conditions, and all
applicable laws. If you do not agree with these terms, please do not access or use the remainder of this document.
This document contains highly confidential information, which is proprietary to Essence Security International (E.S.I.) Ltd. and/or its affiliates (hereafter,
"Essence"). No part of this document's contents may be used, copied, disclosed or conveyed to any third party in any manner whatsoever without prior written
permission from Essence.
The information included in this document is intended for your knowledge and for negotiation purposes only. Essence makes no implicit representations or
warranties with respect to such information.
The information included in this document is subject to change without notice. Any decision to rely on the information contained herein shall be at your sole
responsibility, and Essence will not accept any liability for your decision to use any information or for any damages resulting therefrom.
Certain laws do not allow limitations on implied warranties or the exclusion or limitation of certain damages. If these laws apply to you, some or all of the above
disclaimers, exclusions, or limitations may not apply to you.
By using the information contained herein, you agree that the laws of the State of Israel, without regard to principles of conflict of laws, will govern any dispute
of any sort that might arise between you and Essence regarding the information contained herein, and any such dispute shall be settled exclusively in the
competent courts of Tel Aviv-Jaffa, Israel.
All registered or unregistered trademarks, product names, logos and other service marks mentioned within this document are the property of Essence, or their
respective owners. Nothing contained herein shall be construed as conferring by implication, estoppels, or otherwise any license or right, either express or
implied, under any patent or trademark of Essence or any third party. No use of any trademark may be made without the prior written authorization of Essence.
This document and all of its contents are protected intellectual property of Essence. Any copying, reprinting, reuse, reproduction, adaptation, distribution or
translation without the prior written permission of Essence is prohibited.
Please check your End User License Agreement (EULA) for terms and conditions.
2015 All rights reserved to Essence Security International (E.S.I.) Ltd.
+972-73-2447777
Fax:
+972-9-7729962
Table of Contents
Table of Contents
1.
2.
3.
4.
5.
Introduction ..........................................................................................................................................12
1.1.
Purpose of the User Guide ........................................................................................................ 14
1.2.
User Guide Structure................................................................................................................. 14
1.3.
WeR@Home Kit Concept ........................................................................................................ 16
1.3.1
The Components ........................................................................................................ 17
1.3.2
Customized WeR@Home System Structure .............................................................. 18
1.4.
General Installation Guidelines ................................................................................................. 18
Deployment of the WeR@Home System ............................................................................................20
2.1.
The Installation Process ........................................................................................................... 20
2.1.1
Steps for Installation.................................................................................................... 21
2.2.
Prerequisites to the WeR@Home System Installation ............................................................. 22
The WeR@Home Hub ......................................................................................................................... 24
3.1.
The Hub Function .................................................................................................................... 24
3.2.
Installation Prerequisites ........................................................................................................... 25
3.2.1
Positioning Recommendations ................................................................................... 25
3.2.2
Installation Procedure .................................................................................................26
3.3.
Setup and Activate the Hub ......................................................................................................26
3.4. Registering the Hub ................................................................................................................. 30
Multiple Place Management ................................................................................................................. 36
4.1.
User Access ............................................................................................................................... 37
4.2. Fundamentals of Multi-Place Management .............................................................................. 38
The WeR@Home Web Application...................................................................................................... 39
5.1.
The Web Application Functionality ...........................................................................................39
5.2.
Accessing the Web Application................................................................................................ 40
5.2.1
Prerequisites............................................................................................................... 40
5.2.2
The Web Application Login ......................................................................................... 41
5.3.
Registering the Hub Using the Web Application...................................................................... 44
5.3.1
First Time Registration Procedure .............................................................................. 44
5.3.2
Password Validation Feature ....................................................................................... 51
5.4. The Web Application Home Page ............................................................................................ 54
5.4.1
The Tool Bar ............................................................................................................... 54
5.4.2
Settings Module ..........................................................................................................56
5.4.3
General Settings Tab ................................................................................................... 57
Table of Contents
6.
Table of Contents
7.
8.
Table of Contents
9.
Table of Contents
Table of Contents
15.
16.
17.
18.
Table of Contents
18.2.
Table of Contents
Table of Contents
Appendix D
Appendix E
Appendix F
Appendix G
Appendix H
Appendix I
Appendix J
11
Introduction
1. Introduction
The award winning WeR@Home product suite, recognized by both industry and consumer awards offers
a super simple and easy-to-use system, enabling people to independently manage their homes from
anywhere, anytime, and on any screen. The modular offering includes:
Home Security and Safety Module: The WeR@Home System can be used as a home security and
safety system allowing users to receive alerts about detected intrusions and safety warnings, such
as for fire or flooding.
Remote Home Management Module: The WeR@Home System includes a Mobile Application
that seamlessly allows users to monitor and control their connected home from anywhere. The
Mobile Application is super intuitive and beautifully designed to allow users to enjoy the full
connected living experience.
Home Automation and Energy-Saving Module: WeR@Home transforms the users experience,
allowing them to fully control their homes with automated Smart Rules. Homeowners can easily
create scenarios that trigger multiple actions at a single touch, such as automatically switching off
lights and electrical devices when no one is at home.
A fully integrated connected home experience can be achieved by setting automatic event driven
actions.
Figure 1 above shows the WeR@Home main components (peripheral devices) arranged in a
WeR@Home network.
12
Introduction
13
Introduction
14
Introduction
Following a detailed explanation of the Web Application, the Mobile Application, and the instructions to
register each component in these applications, there are instructions and use cases to explain the
implementation of the Smart Rules. The Smart Rules allow the End Users to utilize the capabilities of the
WeR@Home System to manage their home activities.
Following the installation instructions for all the components and the applications, there are detailed
chapters concerning system administration, maintenance instructions, and security considerations.
Additional technical specifications and instructions about the WeR@Home System components
(peripheral devices) and other equipment, needed for installation purposes, are provided in the
appendixes of the guide.
NOTE: The images of batteries included in the User Guide are for illustration
purposes only.
Only batteries thoroughly tested and approved by Essence should be used to meet
the devices specifications. A list of the approved batteries and their specifications is
provided in Table 36 on page 335.
15
Introduction
Camera
Detector (IPD)
Siren (SRN)
WeR@Home Hub (Hub)
Figure 3 above shows an example of a sample WeR@Home Kit. The kit also includes other required
equipment for the installation and the WeR@Home 4.1 Quick Setup Guide to instruct the End User how
to perform the installation of the WeR@Home System.
16
Introduction
The components (peripheral devices) included in the kit, except for the Remote Control, are preconfigured (paired) for the Hub included in the kit. The Remote Control, or Key Fob (KF), is not preconfigured because the device must be associated with a specific End User.
Each WeR@Home device goes through a pairing process which pre-configures the device with a
specific Hub. This pairing process enables the Hub to recognize its peripheral devices, assigning each
device a device name. In most kits, this process is done by Essence in production, so that the Hub in each
Kit recognizes the peripheral devices in the kit.
If the End User purchases additional components (peripheral devices), the additional peripheral devices
must be configured (paired) for the Hub.
1.3.1
The Components
17
Introduction
18
Introduction
The following are some general guidelines for the installation and daily usage of the WeR@Home System:
Batteries should not be inserted into any of the peripheral devices until a specific step in the
installation process is reached.
Proper order of the battery installation ensures that the various peripheral devices are configured
in the WeR@Home System in the correct sequence.
Temperature ranges for the batteries:
Devices with Alkaline batteries:
Storage Ambient Temperature range:
Operating Ambient Temperature range:
19
20
Step
Instructions
Chapter
/Section
Page
Optional?
Section 2.2
22
Chapter 3
24
Chapter 5
39
Power up and activate the Remote Control or Key Fob (KF) and add it to the
WeR@Home System.
Chapter 7
145
Install the Camera Detector (IPD) and add it to the WeR@Home System.
Chapter 9
176
Install the Motion Detector (PIR) and add it to the WeR@Home System.
Chapter 10
187
Install the Door/Window Sensor (MGL) and add it to the WeR@Home System.
Chapter 11
197
Chapter 12
205
Chapter 6
96
10
Chapter 7
145
Optional
11
Chapter 13
210
Optional
12
Install the Tag Reader (TR) and add it to the WeR@Home System.
Chapter 14
221
Optional
13
Install the Flood Detector (FL) and add it to the WeR@Home System
Chapter 15
232
Optional
14
Install the Smoke Detector (SK) and add it to the WeR@Home System.
Chapter 16
239
Optional
15
Install the Universal Transmitter (UT) and add it to the WeR@Home System.
Chapter 17
254
Optional
16
Chapter 18
262
Optional
NOTE: The installation instructions are written as if to the End User. Steps specific to
the Service Provider are worded accordingly.
21
NOTE: The battery images included in this User Guide are for illustration purposes
only.
Only batteries thoroughly tested and approved by Essence should be used to meet
the devices specifications. A list of the approved batteries and their specifications is
provided in Table 36 on page 335.
The number of batteries required depends on the number of devices included in the system structure.
2. A personal computer (PC) with internet access and up-to-date browser application software:
Microsoft Internet Explorer 8 or higher
Google Chrome
3. The Microsoft Silverlight web application framework installed on the PC:
It is available for free download from: http://silverlight.net/
4. The web server IP address or URL for the WeR@Home Web Application software: The IP address or
URL is provided either by the distributor or by the Service Provider.
5. A SIM-card is required if cellular communications is to be used. The SIM-card is provided either by
the distributor or purchased from the Service Provider.
NOTE: The SIM-card provider should also provide a 4-digit APN code for mobile
access. In special cases, more APN data might be required. See details on page 59.
22
Appendix H, on page 342, includes Table 43, a worksheet prepared for you to record the information you
need to remember during the registration and installation process. It is a useful tool to store vital
information for future reference.
For example, you may want to record the Hub serial number in this worksheet. Throughout the User
Guide, you are reminded to store information in this worksheet.
The chapters to follow provide all the instructions and information for the installation of each and every
device in the WeR@Home System.
23
Product
WeR@Home
Hub
Essence
ES8000CP
Description
The WeR@Home Hub is referred to as the Hub. The Hub
manages and communicates with the peripheral devices
(devices), the Cloud, and the Servers which provide the data to
the different user applications. The Hub issues notifications. It
features:
Remote access for control and management of the
system via a hybrid, HTML5-based Mobile Application and
the Web Application software.
The Mobile Application is available for Apples iOS and
Googles Android-based smartphones and tablets
Optional 3G modem
Automatic APN setting
Supports a large variety of devices and up to 32 Users
(including 2 Master Users).
Backup battery
Table 2: WeR@Home Hub
24
25
If your Service Provider supports GSM communications and your Hub has the SIM-card option, you
have a choice of external communication channels.
26
3. If a cellular channel is to be used as the external communications channel, insert the SIM-card, with
its contacts facing down, as illustrated in Figure 6 below.
NOTE: Follow the graphic representation of the SIM-card engraved onto the plastic
bottom of the compartment, leading to the cards designated location.
4. If the LAN is to be used as the external communications channel, plug the LAN cable into the RJ45
socket on the back panel of the Hub and its other end into a network socket, in the Internet router or
modem, as shown in Figure 7 below.
LED 1
LED 2
The Hub back panel LAN (RJ45) socket provides two (2) LED status indicators, in accordance with the
IEEE 802.3u standard, as a means of determining the mode of operation of the network:
27
NOTE: If both the SIM-card and the LAN cable are installed, the LAN cable is the
external communications channel and the cellular channel is used for backup.
5. Insert the backup battery into the battery compartment, above the SIM-card.
As in Figure 8 below, the battery label should be facing up. The battery contacts should be aiming
towards the base of the Hub.
28
NOTE: When the LED blinks Green, the battery level of the Hub is low.
If the LED does not switch to Green, the following are the possible causes:
The LED remains Red if the Hub is connected to the power supply. However, there is no LAN
connection.
The LED remains Orange if the Hub is connected to both the power supply and the LAN, however,
there is a problem connecting to the Server. In this situation, do the following:
For Ethernet units:
Verify that the Hub is connected to the networks switch or router via the provided network
cable.
29
Check that the Internet service is working by opening any webpage on your computer.
Verify that the connection to the Internet is a direct connection. It should not be a dialup
connection.
Verify that port 43001 is open for the homes router firewall. For instructions, see Appendix H
on page 342.
For Cellular units:
Verify that the SIM card is installed properly.
Verify that the SIM card has no data limitations, such as an expiration date or prepaid time
allotment.
Call the cellular service provider for possible network infrastructure issues.
NOTE: The initial registration of the Hub can only be performed in the WeR@Home
Web Application.
4. Tap Register on the Welcome Home screen. The Registration screen appears.
30
5. Enter the Hubs 8-digit serial number, and tap Next. You can locate the serial number on the base of
the HUB, as described in Figure 4 on page 23 or as you recorded in Table 43 on page 345.
6. Choose the type of user with whom to add the Hub, as shown in Figure 10 below.
Tap New User if your email is not currently registered on any other WeR@Home Hub. The New
User screen appears.
31
Field
Attributes
Required Default
/Optional Value
Character string in
standard email address
format: xxxx@yyyy.zzz
Required
Character
case sensitive
Required
Character
case sensitive
Required
Password
Confirm
Password
Your Name
Phone
Number
32
Tap Existing User if your email is already registered on another WeR@Home Hub. You should
use Existing User when adding a new Hub or Place to your existing WeR@Home network. For
information about Multiple Place (Multi-Place) management, see chapter 4 on page 36.
33
Field
Attributes
Required /
Optional
Hub
Character
Required
Country
Dropdown list
Required
Time Zone
Dropdown list
Required
Default
Value
Universal Time
zone (UTC)
time zone
34
9. Tap CONTINUE TO APP. The app assigns you a default PIN code (1234) and then opens the Home
Screen.
For more information about the PIN code, see 6.4.6 on page 122.
35
36
In the Mobile application, your WeR@Home systems are listed in the Places screen, as shown in Figure 16
below.
37
38
NOTE: The installation instructions are written as if to the End User. Steps specific to
the Service Provider are worded accordingly.
39
5.2.1 Prerequisites
Before you begin to use the WeR@Home Web Application, the following items need to be prepared:
A personal computer (PC) with internet access and up-to-date browser application software such
as:
Internet Explorer 7 or higher
Google Chrome
The Microsoft Silverlight web application framework should be installed on the PC. The run-time
environment for Silverlight is available as a plug-in for most web browsers based on the
Microsoft Windows OS (Operating System).
If not installed on your PC, the Web Application prompts you to install Microsoft Silverlight by
showing you the link below. Click the link to install.
http://www.microsoft.com/getsilverlight/Get-Started/Install/Default.aspx
The Service Providers web address (URL) for the WeR@Home Web Application software.
40
NOTE: Create a shortcut link for this address for future ease of access to the Web
Application.
The window for resetting your Password appears. Your Email Address is automatically loaded, as
shown in Figure 18 below.
41
ii.
Click
to send an email to your email address with the Reset Password link.
The Password Reset message window appears, as in Figure 19 below, confirming the email is sent.
iii.
Click on the Reset Password link in the email. The Enter New Password window, from the Web
Application, appears, as in Figure 20 below. Your Email address is automatically loaded in the
window.
There is an online
help icon beside the title Password. Click on the icon to display online help
instructions about the acceptable password format.
iv.
v.
Re-enter the password from the previous step, for confirmation purposes.
vi.
Click
42
For example, if the password entered is a password that was used before, the following message
may appear:
vii.
viii.
4. Recommended: Click
logins. This step is optional.
5. Click the
43
44
2. Familiarize yourself with the WeR@Home Web Application by reading chapter 5 on page 39.
3. Access the WeR@Home Web Application by entering the Service Providers server address, using
the web browser on your PC. You should create a shortcut to the link for this address for future
access to the Web Application.
The Login window appears, as in Figure 23 below.
5. Click the
button for the First Time Registration procedure. An extension appears at the
bottom of the Login window, as illustrated in Figure 24 below.
45
6. Click the _Go to first time registration page >>_ option. The First Time Registration Step 1 of 2
window appears, as in Figure 25 below.
7. Enter the Hubs 8-digit serial number, as illustrated in Figure 26 below. You can locate the serial
number as described in Figure 4 on page 23 or as you recorded it in Table 43 on page 345.
8. Click the
button to stop the First Time Registration procedure and return to the Login
window, as in Figure 23 on page 45.
46
9. Click the
button to continue First Time Registration. The Web Application software
validates the serial number entered.
i.
If the Hub was previously incompletely registered and the First Time Registration procedure
resumed before the front Hubs LED switched to Green; an error message appears as in Figure 27
below.
If the serial number is already registered in the system; an error message appears as in Figure 28
below.
If the serial number entered is invalid or the Hub is not activated (the HUB LED is not Green), an
error message appears as in Figure 29 below.
47
iv.
Click the
button in the error message window. The application returns to the Login
window, as in Figure 23 on page 45, so that you can restart the First Time Registration procedure.
v.
If the Serial number entered is valid, the First Time Registration Step 2 of 2 window appears, as
in Figure 32 below.
10. Choose the type of user with whom to add the Hub, as shown in Figure 30 below. The GUI for the
Step 2 of 2 window changes according to your choice.
A new user is an email for a user that has not yet been entered into the system.
An existing user is an email for a user that has already been entered into the system. You should use
an existing user when adding a new Hub or Place to your WeR@Home network. For information
about Multiple Place (Multi-Place) management, see chapter 4 on page 36.
If you mark the Radio Group for user type Existing User, the GUI appears as in Figure 31 below.
48
If you mark the Radio Group for user type New User, the GUI appears as in Figure 32 below.
11. Enter the user personal details, according to the GUI displayed, as registration information, as
instructed in Table 5 below.
Optionally, record the registration details in Table 43, on page 345, for future reference.
Required /
Optional
Field
Attributes
Character string
in standard
email address
format:
xxxx@yyyy.zzz
Required
Password
Character
case sensitive
6-20 A/N
characters
Required
Confirm
Password
Name
Character
case sensitive
6 characters
Required
Character and
case-sensitive
Default
Value
49
Required /
Optional
Field
Attributes
Mobile
Number #
Hub Name
Numeric
International
telephone
format.
Character
Required
Country
Dropdown list
Required
Time Zone
Dropdown list
Terms &
Conditions
Checkbox
Default
Value
Universal Time
zone (UTC)
time zone
Required
Push Button
Push Button
Push Button
i.
50
If no error is detected during the completion of the registration process, the WeR@Home Web
Application Home Page appears, as shown in Figure 33 below.
The process of connecting the Hub continues until completed. When the Hubs front LED turns
Green, the registration process is complete.
iii.
A Green flashing LED means the Hub is being updated by the Remote Software Upgrade (RSU)
mechanism.
iv.
If the LED flashes Green and Orange, there is something wrong with the pre-configured APN
information in the Hub. See section 5.4.4 on page 58 for how to resolve the APN problem.
51
A password policy has been implemented to require the user to define a unique and personalized
password. The purpose of password uniqueness is to ensure a more secure application system.
The rules for the password policy are:
Length: The password must be between 6 and 20 characters.
Character set: The password can contain characters from the following groups:
Both uppercase and lowercase alphabetic characters
Numeric characters
Symbols
The password should not contain spaces (blank characters).
Passwords should be renewed periodically.
New passwords for a user cannot be similar to previous passwords unless the previous password
has been recycled.
Message prompts appear in both the Web application and the Mobile application, seven (7) days
prior to password expiration, requesting password revision.
System Parameters:
A parameter to manage the length of the renewal period
A parameter to define when a previous password can be recycled
A parameter to determine the number of months following a server upgrade that passwords
must be renewed
52
Both the first time registration window and the User module use password validation. When you place the
cursor on the
icon, the on-line help instructions are displayed, as shown in Figure 37 above.
The application displays Strong or Weak, depending on the results of the validation process.
When Weak appears, further instructions are displayed explaining the reason for the failure result.
A password value is not accepted until the password validation result is Strong.
53
54
The icons on the Home Page Tool Bar display the status of:
Hub Cellular Signal Status Provides information regarding the strength of the Hubs cellular
signal. The following are the icons that represent the status of the Hubs cellular signal:
No SIM-card is installed in the Hub.
Hub Backup Battery Status Provides information regarding the charge capacity of the Hub
backup battery. The following are the icons that represent the status of the Hub backup battery:
Battery dead
Battery critical
Battery low
Battery normal
Battery full
List of Places Button Click the Places button. The Places window appears to display the list of
Places where you have installed your WeR@Home systems. Use the Places window to switch to
another Place.
Click on the Place in the list to which you want to switch and then, click
55
Place Name This is the name of the place where the Hub, to which you are currently connected,
is located.
The buttons on the Tool Bar provide access to the following functionality:
The Settings module includes three (3) main settings functions. The settings functions are accessed via
the following tabs:
General Settings tab Allows you to configure the definitions for temperature and time.
For information about configuring these definitions, see section 5.4.3 below.
APN Settings tab - Allows you to manually perform Access Point Name (APN) data registration.
For information about manually updating APN information, see section 5.4.4 on page 58.
Z-Wave Settings tab - Allows you to configure general Z-Wave environment settings.
For information about manually updating Z-Wave information, see section 5.4.5 on page 62.
56
Field
Attributes
Required Default
/Optional Value
Temperature Units
Dropdown
List
Dropdown
List
Required
Celsius
Required
First sensor
device
registered
Dropdown
List
Dropdown
List
Required
Required
Universal
Time Zone
(UTC)
Dropdown
List
Required
None
Character
Required
Default Temperature
Device
Country
Time Zone
Delay (seconds)
Place Name
Push Button
Push Button
Push Button
Push Button
Push Button
57
button, as explained on
If the automatic process does not complete successfully, the LED on the front of the Hub does not turn
Green.
If a problem occurred during the First Time Registration procedure with the loading of the Access Point
Name (APN) information or the APN information requires revision after the Hub is registered, the APN
information must be entered manually into the Web Application.
The APN information is accessible for manual APN data registration on the APN settings tab.
You can access the APN settings tab in one of two ways:
1. Click the _APN Settings Registration >>_ option in the extension in the Login window, as shown in
Figure 24 on page 45.
2. Click the Settings Button on the WeR@Home Web Application Home page, as shown in Figure 42
below.
58
The APN Settings tab on the Settings window appears, as in Figure 43 below.
Table 7 below provides instructions for entering the information required for the APN settings.
Field
Attributes
Required/
Optional
Country
Dropdown
List
Dropdown
List
Character
Required
Required
Factory
Setting
APN User
Characters
Required
Factory
Setting
APN Password
Characters
Required
Factory
Setting
Numeric(20)
Required
N/A
Display Only
Operator
APN
Serial #
Default
Value
Required
59
Field
Attributes
Push Button
Required/
Optional
Default
Value
Push Button
When you choose a country from the dropdown list of the Country field, your choice determines the
contents of the dropdown list of the Operator field.
For example, if you choose Italy, as in Figure 44 below, the Operator list generated includes the four (4)
Italian Cellular Operators, as in Figure 45 on page 61 below.
60
Since most market available SIM-card APN data is pre-configured into the WeR@Home Hub, when
choosing an Operator, if the Operator APN information is in the Hub, that information is loaded into the
APN settings window.
For example, Figure 46 below shows the APN information loaded for the selected Operator:
APN
APN User
APN Password
61
Table 8 below provides the instructions for configuring the z-Wave parameters, shown in Figure 47 above.
Field
Attributes
Push Button
Push Button
Required /
Optional
Default
Value
Push Button
62
63
Table 9 below shows the image and color of the central icon that reflects the system status.
Icon
Color
Representation
Grey
System Disarmed
Red
Intrusion Alarm
Yellow
Safety Hazard
Green
Comment
Arm Away
64
Smart Home - This is the Z-Wave device management module that maintains each Z-Wave
device configuration and status. This module tab only appears if the Z-Wave Extender is installed,
as shown in Figure 50 below.
65
The purpose and fundamentals of the Multi-Place feature are described in chapter 4 on page 36. Figure 51
above shows the icons and labels, on the Web Application Home page, that identify the current Place to
which the user is connected.
On the Toolbar, the Places button displays the Places window, shown in Figure 52 below. The
Places window displays a list of the Places in which you have installed WeR@Home systems.
Use the Places window to switch between Places. Double-click on the Place in the list to which
you want to switch.
On the Toolbar, the Home label, is an example of the Place name of the Hub to which the user is
currently connected.
On the Devices pane on the Dashboard, the Home label of the Hub device, is the Place name of
the current Hub.
The WeR@Home Web Application tools, that allow you to manage the Multi-Place feature, are located on
the General tab of the Settings window, as shown in Figure 53 below.
66
- See section 5.5.2, on page 69, for the procedure to define the Default
Place for a user.
- See section 5.5.3, on page 70, for the Remove Place procedure.
67
1. Log in to the WeR@Home Web application with the Master user assigned to the existing Hub.
For the log in procedure, see section 5.2.2 on page 41.
2. Click the Settings button at the top right of the Home page, as shown in Figure 39 on page 54. The
Settings window appears, displaying the General tab, as in Figure 53 above on page 67.
3. Click the
button. The message window appears, as shown in Figure 54
below, prompting confirmation of the Add Place request.
4. Click the
button to cancel the addition of the new Hub. The procedure ends here.
5. Click the
button to confirm the addition of the new Hub. The Step 1 of 2 window appears
for the First Time registration process for the new Hub, as shown in Figure 25 on page 46.
6. Follow the instructions for entering the Hub Serial number from page 46.
When completed, the Step 2 of 2 window appears for the First Time registration process for the new
Hub, as shown in Figure 32 on page 49.
7. Mark the radio group for the Existing User, if you are using an existing user to add the Hub.
Otherwise, mark the radio group for the New User, if you are using a new user to add the Hub.
The GUI changes in accordance with your choice of user type. For information about choosing the
user type and the changes in the GUI, see page 48.
8. Enter the registration information according to the change in the GUI. For instructions on entering
the registration information, see page 49.
Remember to mark the checkbox that you agree to the terms and conditions and the privacy policy.
9. Click the buttons, as instructed on page 50, to complete the registration process or return to redo
the process.
In the same example, Figure 56 below shows that the Default Place in the Places Window changes to
WeR@Home System User Guide
69
70
71
6. Click the
button to cancel the removal of the Place from the user Places list. The
procedure ends here.
7. Click the
button to confirm the removal of the Place from the user Places list. No
message window appears. The application displays the Login window.
72
The Dashboard, shown in Figure 59 above, displays the device icons by device name. Figure 36 below
shows the device icons displayed in order by the device type.
The devices are presented as icons with additional properties depending on the device status.
For the list of device icons including additional information, see Appendix F on page 337.
A double-click on any of the device icons in the Devices pane transfers you to the row for the device in the
main page of the Devices module.
If you double-click on a Z-Wave device icon, you are transferred to the row for the device in the main
page of the Smart Home module.
73
A double-click on any of the Camera device icons in the lower pane transfers you to the row for the
Camera Detector device in the main page of the Devices module.
74
75
Field Name
Device Type
Name/Location
Status
Signal Strength
Battery Level
Description
Characteristics
Default Value
N/A
Pre-defined values:
Active
Tampered
Inactive
Connection lost
N/A
N/A
N/A
NOTE: Only Master users are granted access to manage devices, which includes
adding and removing devices, and updating device details.
76
5.7.1.1
The procedure to add a new device depends on the type of device being added.
For the specific instructions to add a device, see the chapter relevant to the type of device you are adding
to the WeR@Home System.
The following is the general procedure for adding a device to the WeR@Home System.
1. Log in to the WeR@Home Web Application.
2. Click the
3. Click the
4. Select the option relevant to the device to be installed. The Add New Device window appears with
the 3-minute timer starting to run down, as shown in Figure 63 below.
The windows that appear may differ depending on the type of device selected.
5. Verify that the Device Type displayed in the window is the device type of the device to be installed.
77
The timer provides a 3-minute timeframe within which the batteries are to be installed in the device.
NOTE: If installation of the batteries could not be accomplished within the threeminute period, restart the process.
Battery insertion triggers a Pairing process in which the device communicates with the Hub to inform
the Hub of the devices presence.
NOTE: The device should be in close proximity to the Hub during the pairing
process. After the Hub recognizes the device, place the device in the predetermined location.
If the Hub detects the new device, the Hub adds the device to the inventory of the system peripheral
devices. In this situation, the timer freezes and a Device Properties window appears. Figure 64 below
shows a Device Properties window for a Motion Detector.
The newly added device appears in the device matrix in the left-side of the main page of the Devices
module.
78
If the Hub does not detect the new device within the given timeframe, an error message appears within
the Add New Device window, as illustrated in Figure 65 below.
6. Enter the devices system name and/or location, if the Hub recognizes the new device.
7. Click the
See page 82 for the configuration of the device operational details and completion of the Add Device
process.
79
8. Click the
9. Click the
5.7.1.2
Table 11 below provides a list of the chapters or sections where you can find the instructions for installing
and adding a new device according to the device type.
Device
Motion Detector (PIR)
Chapter/Section
Page
Chapter 10
187
Chapter 11
197
Chapter 9
176
HD Camera (HDC)
Chapter 7
210
Chapter 7
145
Siren (SRN)
Chapter 12
205
Chapter 14
221
Tag
Section 14.7
227
Chapter 15
232
Chapter 16
239
Chapter 17
254
Section 18.5.1
272
5.7.1.3
NOTE: If there are Smart Rules defined for a device that is to be removed, the
triggers and actions for the device are removed from the Smart Rules.
80
To remove a device registered in the WeR@Home System, perform the following procedure:
1. Log in to the WeR@Home Web Application.
2. Click the
3. Select the row for the device, in the Devices matrix, that you want to remove from the WeR@Home
System.
4. Click the
button. A message appears, as shown in Figure 66 below, asking you to
confirm the Remove Device request.
5. Click
to confirm the Remove Device request. The application returns to the Devices page.
The overview matrix does not include the removed device.
6. Click
to cancel the Remove Device request. The application returns to the Devices page.
The overview matrix includes the device that was not removed.
5.7.1.4
The purpose of the pane on the right-side of the Devices page is to provide you with the tools to manage
the operational details of the devices in the WeR@Home System.
The pane on the right-side of the Devices page displays the operational details of the device selected in
the left-side of the Devices page.
Figure 67 below shows the minimum device details of the device selected in the left-most pane.
81
2. Click the
The extended view of the Device Operational Details pane appears, as in Figure 68 below.
3. Click the
4. Enter the operational details as described in Table 12 below, which describes the operational details
of the devices for device configuration.
82
Field Name
Description
for the
Name/Location Enter the name and/or location
Characteristics
Default Value
Alphanumeric Text
N/A
Type
Alphanumeric Text
Display Only
Checkbox:
Day Arm
Night Arm
Checkbox:
Always trigger an alarm
Allow delayed entry/exit
(recommended)
Allow walking through device
Checkbox:
Chime
Blank
Arming
Scenarios
Detection
Actions
Chime
Always trigger an
alarm
Blank
5. Click the
button to save any changes made to the operational details of the device.
For use cases and application of these features, see section 19.5.1 on page 295.
83
The History module provides the tools to filter the events displayed in the events overview.
The filter toolbar, as shown in Figure 70 below, enables the definition of the criteria to filter the
information displayed in the Events overview.
Field Name
Date From
Date To
Device Name
Event Type
User Name
84
Description
Displays events whose event date is
later or equal to this date.
Displays events whose event date is
earlier or equal to this date.
Displays events related only to this
device.
Displays events of the same event type
selected.
Displays events for the devices owned
by the user selected.
Click the button to perform the
selection according to the defined
selection criteria.
The Event overview displays the events
Characteristics
Default Value
Blank
Current date
All
Dropdown list.
All
Dropdown list.
All
N/A
N/A
Field Name
Description
that satisfy the selection criteria.
Click the button to reset to the default
selection criteria.
The Event overview displays the events
that satisfy the default selection
criteria.
Characteristics
Default Value
N/A
N/A
For example, the filter toolbar allows you to select the type of events to present in the Event overview,
from the Event Type dropdown list as shown in Figure 71 below.
85
Field Name
Description
Default
Value
Event <Device>
Left-most column in
left pane
Middle of left pane
Device Icon
Display only
Alphanumeric
free text
Display only
Right-most column in
left pane
Display only
Right Pane
Date:
MM/DD/YYYY
Time:
hh24:mm:ss
Alphanumeric
free text
Alphanumeric
free text
Display only
<Event
Description>
Time
<Device Name>
Type
Right Pane
Display only
86
87
The Users module main page divides into two (2) panes:
The left pane of the main page displays the User name and User type.
The right pane of the main page displays the personal information of the End User, highlighted in
the left pane.
Figure 72 above shows the main page of the Users module with two (2) Master users and four (4) Standard
users.
88
Figure 73 above shows the New User is added to the Users list along with the New User - Properties
pane.
4. Enter the new users personal information in the New User - Properties pane.
Table 15 below describes the personal information required to add a user to the WeR@Home System.
Field Name
<New or
Existing User>
User name
Email
Password
Confirm
Password
Profile
Notification
Language
Mobile#
User can view
Description
Characteristics
Radio button
Default Value
Character
Character string in standard
email address format:
xxxx@yyyy.zzz
Enter A/N string of 6-20
characters in length.
Enter A/N string of 6-20
characters in length.
New User
Dropdown list:
Master
Standard
Dropdown list
Standard
English
Numeric value
Checkbox
Unmarked - Not
89
comfort video
comfort videos.
Custom
Notifications
Profiles:
Allowed
No default
configuration
N/A
When you assign a new user the profile of a Master User, if there are already two (2) master users
defined in the WeR@Home System, the error message window, as shown in Figure 74 below, appears:
5. Click the
90
3. Select the user, in the Users list, for whom you want to revise their personal information. Figure 76
below shows a user selected for editing in the Users module page. The selected users Properties
pane is displayed on the right. In the example, the user logged on is a Master user. The Master user
has limited access to the personal user information.
91
4. Revise the users information as required according to the instructions in Table 16 below. The
instructions in Table 16 are written as if the logged-on user has unlimited access to personal user
information.
Field Name
User name
Description
Attributes
Character
Profile
Character string in
standard email address
format: xxxx@yyyy.zzz
Dropdown list:
Master
Standard
Notification Language
Mobile#
User can view comfort
video
Custom Notifications
Profiles
92
Default
Dropdown list
Numeric value
Checkbox
Unmarked: Not Allowed
Marked: Allowed
Checkbox
Unmarked: No
Marked: Yes
Field Name
Description
Attributes
Default
Change Password
Password
Checkbox
Unmarked: No
Marked: Yes
A/N string of 6-20
characters in length
Confirm Password
N/A
N/A
The user type determines access to the data when editing a user profile. Table 17 below defines the access
the logged-on user has, if the user is a Master user or if the logged-on user is the owner of the information
being edited.
If the user is a Standard user and not the owner of the information being edited, the Standard user has no
R/W access to any of the information.
Field Name
Master User
User Access
Logged-on User
User name
Display Only
R/W Access
Email
Profile
Notification Language
Display Only
R/W Access
R/W Access
Display Only
Mobile#
Display Only
R/W Access
R/W Access
Display Only
R/W Access
Display Only
Change Password
Display Only
R/W Access
Password
Display Only
R/W Access
Confirm Password
Display Only
R/W Access
93
5. Click the
3. Select the user, in the Users list, who you want to remove from the WeR@Home System.
4. Click the
button. A message window appears, as in Figure 77 below, requesting
confirmation of the Remove User request.
5. Click
The application returns to the Users page. The Users list does not include the removed user.
6. Click
The application returns to the Users page. The Users list remains unchanged.
94
The WeR@Home Web Application shows this tab, if you have Z-Wave devices installed in your
WeR@Home System.
The Smart Home tab, as shown in Figure 78 above, activates the module that manages the Z-Wave
Extender device and the Z-Wave devices.
Chapter 18, on page 262, provides information about the Z-Wave module, the extender, and the
peripheral devices.
95
The purpose of the WeR@Home Mobile Application is to allow for the remote management of the
WeR@Home System from mobile devices such as mobile phones, smartphones, and tablet computers.
After using the WeR@Home Web Application to setup and configure your WeR@Home System, you can
use your mobile devices to manage the WeR@Home System.
Using the WeR@Home Web Application, you can define the users who should have access to your
WeR@Home System. These users can access your WeR@Home System using the WeR@Home Mobile
Application.
The WeR@Home Mobile Application features the following home management functions:
Push notifications
System status
System arming activation
Live imaging view
Events history reporting
GSM signal strength monitoring for a Hub model using a SIM-card
Device status reports
96
NOTE: Contact your Service Provider for the name of your Service Providers
customized WeR@Home Mobile Application.
Use the keyword "WeR@Home" to search for the Mobile Application in either the Apple App Store or the
Google Play Store.
NOTE: The images presented in this User Guide for the WeR@Home Mobile
Application are from an Android SmartPhone. There may be differences in screen
resolution between these images and either your Apple iPhone and iPad or your
Android tablet displays.
97
98
If you are required to change your DNS, perform the "Change DNS" procedure before Login. For the
instructions for the "Change DNS" procedure, see section 6.2.3 on page 100.
For first time registration, see section Error! Reference source not found. on page Error! Bookmark not
defined..
To login to the WeR@Home Mobile Application, perform the following procedure which is similar to the
login procedure for the Web Application:
1. Tap the WeR@Home icon
2. Enter the Email Address you entered during First Time Registration.
3. Enter the Password you entered during First Time Registration.
NOTE: You can reset your password from the Login page of the WeR@Home Web
Application.
If there is a problem accessing your WeR@Home Hub, the Home screen displays a message that the
WeR@Home Hub is unavailable, as in Figure 83 below, explaining the possible causes.
99
100
To change the DNS to connect to your WeR@Home System, perform the following procedure:
1. Tap the WeR@Home icon
2. Tap the Change DNS prompt on the upper left-hand corner of the Login screen. The Change DNS or
Next screen appears, as in Figure 84 above.
The functionality of the Change DNS or Next screen is as follows:
The Change DNS button allows you to choose a DNS service other than the DNS that you usually
use.
The NEXT button allows you to continue and connect to your WeR@Home System through the
current DNS.
3. Tap the Change DNS button at the bottom of the screen. The Change DNS screen appears, as in
Figure 85 below.
The default DNS path appears in the entry field along with the virtual keyboard at the bottom half of
the screen. You are prompted to enter the DNS of your Service Provider.
101
102
System Messages
System Security Status
Place name
System Security Status
Room Temperature
Hub Backup Battery Status
103
The Battery image to the left of the icon displays the status of the Hub backup battery.
For information about the Arming status icons, see section 6.3.2.1 on page 107.
The Next Smart Rule scheduled to be triggered:
This notification appears only if you have defined a Schedule Rule for a future date and time.
When you tap the Next Smart Rule caption, located under the top right of the Home screen, you
are transferred to the Smart Rules module.
For information about the Smart Rules module, see chapter 7 on page 145.
The temperature of the room where the default temperature device is located:
The temperature is displayed in either Celsius or Fahrenheit, according to the default temperature
configuration.
When you tap the temperature reading, located on right side of the Home screen, you are
transferred to the Temperature screen.
For information about the Temperature screen, see section 6.3.1.2 on page 105.
6.3.1.1
104
Figure 87 above shows the System Information screen displaying the system message list.
The System Information screen displays a list of all existing messages, issued by your WeR@Home
System, to describe system status alerts, exceptions, errors, and warnings. The list of messages is updated
as part of every new relevant system update. There is no archiving function.
All messages reported are for critical events, such as:
Tampered devices
Low and critical battery statuses
SIM-card related events
Connection lost and other critical communication issues
A message is removed from the list when the issue is resolved by the user.
When there are no system information messages, a Green
appears on top right corner. In this
situation, tapping on the
does not transfer you to the System Information screen.
6.3.1.2
105
Figure 88 above shows the Temperature screen which displays the temperature readings for all the
devices in your WeR@Home System equipped to measure room temperature.
The center temperature reading is the same as the reading that appears on the Home screen. It is the
temperature reading made by the default temperature device.
You can define the default temperature configuration for:
The default device is used to measure the representative temperature on the premises
The default temperature units (Celsius or Fahrenheit)
in the Smart Home tab of the Settings Configuration module of the WeR@Home Web Application.
For more information about defining the default temperature configuration, see page 57.
Figure 89 above shows the three (3) arming buttons located towards the bottom of the Home screen.
Each button allows you to activate the arming mode, represented by the button, for your WeR@Home
System.
106
6.3.2.1
The center icon on the Home screen of the WeR@Home Mobile Application is an Arming Status icon.
Table 18 below lists the Arming Status icons that represent the various security arming situations detected
by your WeR@Home System.
Icon
Caption
Representation
Disarmed
System Disarmed
Arm Away
Day Arm
Night Arm
Detection
Intrusion Alarm
Panic SOS
Comment
107
Icon
Caption
Representation
Fire
Smoke Alert
Flood
Comment
The Arming buttons are displayed when the status of the system is Disarmed. When the system is
Armed, the Disarm
icon replaces the Arming buttons. When the system detects an event, the
Arming buttons are replaced with the following action buttons to help you resolve the situation:
6.3.3 Shortcuts
The WeR@Home Mobile Application provides you with the capability of defining a Shortcut to
immediately initiate a specific functionality. For example, you can create a Shortcut to give you immediate
access to a camera device in your home.
Figure 90 above shows an example of the Shortcut buttons. The Shortcut buttons appear on the Home
screen of the WeR@Home Mobile Application, as shown in Figure 82, on page 99.
108
Figure 91 above shows the Quick Access buttons located at the bottom of the Home screen. The Home
button is highlighted because the screen is currently displayed on the mobile device.
The Quick Access buttons are:
HOME The Home screen is the main module that directs you to all the other modules.
For information about the Home module, see section 6.3 on page 102.
HISTORY This is the module that reports the history of all the events that have occurred in your
WeR@Home System.
For information about the History module, see section 6.5 on page 130.
CONTROL This is the module that allows you to manage the Z-Wave devices.
For information about the Control module, see section 6.6 on page 137.
VIDEO This module reports all the videos that are captured by the Camera Detectors installed in
your WeR@Home System. The Video module allows you to view the live view video using both
the Camera Detectors and the HD cameras*.
For information about the Video module, see section 6.7 on page 139.
* - The availability of the HD Camera option is based on your specific customer engagement model.
109
6.4.1 Places
The Multiple Place (Multi-Place) feature can be managed within the WeR@Home Mobile Application.
110
The WeR@Home Web Application provides you with the tools to register and name the WeR@Home
Hubs that you installed at your various locations.
During each Hub registration, you assign the Hub a Place name. You can refer to the locations by using
the Hub Place name, in both the Web and the Mobile applications.
For information on registering the Hubs, see section 5.5 on page 65.
6.4.1.1
Place Switching
The Places screen, shown in Figure 93 below, lists all the Places (locations) where you have installed a
WeR@Home system. The Places module allows you switch to another Place that appears in the list.
Perform the following procedure to switch Places:
1. Tap on the Main menu
icon, on the upper left of any screen in the WeR@Home Mobile
application. The Main menu appears, as in Figure 92 on page 110.
2. Tap the on the Places option in the main menu . The Places screen appears, as in Figure 93 on
page 111. The Changed Monitored Place section is the tool for switching Places.
For example, in Figure 93 below, the current Place Home is labelled the monitored Place.
111
3. Tap the row of the Place to which you want to switch. A checkmark appears to confirm your
choice. The application automatically switches control to the Hub at the chosen Place. The Home
screen of the chosen Place appears. The chosen Place is labelled the (monitored) Place on the
Places screen.
For example, when the Home Place is switched to the Summer Home Place, the Places screen
displays the Summer Home as (monitored)with a checkmark , as in Figure 94 below.
6.4.1.2
You can change the Default Place for the user who is currently logged on, using the Places screen.
112
6.4.2 Devices
When you tap the on the DEVICES menu option, the menu transfers you to the DEVICES screen.
113
The Devices screen displays a list of all the devices installed in your WeR@Home System, as shown in
Figure 97 below.
The Devices screen reports the status of the devices, in icon form, such as:
The status of the battery strength for each battery-powered device
The signal strength for communications with the WeR@Home Hub only for each non-Z-Wave
device.
The status of the Remote Control device and the Z-Wave devices is not reported on the Devices screen.
To understand the information represented by the icons, see page 55.
For example, examine how the Door/Window Sensor (MGL) is reported in the list in Figure 97 above.
The Door/Window Sensor (MGL) is displayed as Green. This means the device is closed. The
device icon is Red when the device is open.
Alongside the device icon is the Green-filled battery icon. This means that the devices batteries
are fully charged.
The Signal Strength icon for the device is full. This means that the devices communications with
the HUB is excellent.
114
When you tap the on the Smart Rules menu option, the menu transfers you to the Smart Rules module.
Figure 98 above shows the main page of the Smart Rules module which lists all the rules that you have
defined in your WeR@Home System.
For information about the Smart Rules module, see chapter 7 on page 145.
6.4.4 Shortcuts
The Shortcuts feature, available in the WeR@Home Mobile application, gives you more control of your
Smart Home. The Shortcuts are available on the Mobile Home Screen, as shown on Figure 99 below.
You can define up to nine (9) Shortcuts. The Shortcut buttons on the Home screen slide horizontally to
the right, to display all the Shortcuts.
115
For example, there are six (6) Shortcuts defined in Figure 100 below.
116
As illustrated in Figure 101 below, you can add three (3) more Shortcuts on Home screen 3 of the Shortcut
buttons horizontal slide.
Home screen 2
Home screen 1
Home screen 3
You can access Shortcuts in the Mobile application in either of two (2) ways:
In the Home screen
In the Shortcuts module
The Shortcuts module is accessed through the main menu
117
The Add New Shortcut button at the top of the Shortcuts module main screen. Access the
Shortcuts module via the main menu
screen.
118
3. Tap on the button for the type of Shortcut you want to add. The Shortcut types are shown in Figure
103 below.
5. Tap the Save button to add the choice for a new Shortcut. The application returns to the Home
screen, displaying the new Shortcut.
6. Tap the Cancel button to dismiss the choice for a new Shortcut. An Action Failed message appears, as
shown in Figure 104 below.
Tap the Continue button to confirm the Cancel action. The application returns to the Home
screen.
Tap the Close button to return to the Shortcut screen to choose to either Save or Cancel the new
Shortcut.
119
4. Tap Edit at the right-most top of the Shortcuts screen. The Shortcuts screen enters the Shortcut
removal mode, as illustrated in Figure 105 below.
5. Tap the
icon for the Shortcut you want to remove. The
line for each Shortcut you tapped.
6. Tap the
7. Tap OK at the right-most top of the Shortcuts screen to exit the Shortcut removal mode.
120
6.4.5 Settings
6.4.5.1
Push Notifications
(Enabled).
To block your WeR@Home System from sending Push Notifications to your mobile devices, tap the
Disable icon for Enable Notifications.
121
(Enabled).
To block your WeR@Home System from triggering an Alarm to sound through your mobile devices, tap
the
122
6.4.6.1
If you choose the Disarm option, when you attempt to disarm your WeR@Home System using the
WeR@Home Mobile Application, you are prompted to enter your PIN Code.
However, when your WeR@Home Mobile Application is closed (not logged out), you can resume activity
in the WeR@Home Mobile Application without having to pass through any security check.
123
124
ii.
Your password is the same as your password to the WeR@Home Web Application.
4. Tap the SEND button to allow the application to verify your credentials. If you credentials are verified,
a message appears, as in Figure 110 above, informing you that your PIN Code has been reset to the
default code.
5. Enter the default PIN Code in the keypad screen that appears and continue.
125
Tap OK to enter your PIN Code on the keypad that appears, as in Figure 108 on page 124.
Tap CHANGE to transfer to the PIN Code utility on the Settings screen.
To configure the usage of the PIN Code in your WeR@Home Mobile Application, perform the following
procedure:
1. Tap the on the Settings option in the main menu
on page 121.
2. Tap the on the PIN code Protection Level option. The Protection Level screen appears, as in Figure
107 on page 123.
3. Tap the row of the protection level option you prefer. A checkmark
choice.
4. Tap ACCEPT to save your protection level selection. The Settings screen appears, as in Figure 106 on
page 121.
5. Tap CANCEL to leave the current protection level unchanged. The Settings screen appears, as in
Figure 106 on page 121.
126
4. Enter your personalized 4-digit PIN Code. Following the entry of a valid PIN Code, another keypad
screen appears to confirm the code entered, as in Figure 114 below.
127
6.4.8 About
When you tap the on the ABOUT menu option, the menu transfers you to the ABOUT screen.
The ABOUT screen displays the information about the WeR@Home Mobile Application, such as the
version number of the software installed on your mobile device.
128
In Figure 115 below, the version of the WeR@Home Mobile Application appears in the center of the
screen under the
icon.
6.4.9 Logout
The LOGOUT menu option allows you to log out of the WeR@Home Mobile Application.
129
To log out of the WeR@Home Mobile Application, perform the following procedure:
1. In the WeR@Home Mobile Application, either tap the main menu icon
on the top left of any
screen or swipe to the right in any screen. The main menu screen appears as in Figure 92 on page 110.
2. Tap the on the LOGOUT option row. The LOGOUT window appears, as in Figure 116 above.
3. Tap the Cancel button to dismiss the Logout request. The applications returns you to the last screen
before you transferred to the main menu screen.
4. Tap the Accept button to confirm the Logout request. The application terminates and you are
returned to the Home screen of the mobile device.
All the events are shown to a user, regardless of the users profile (Master or Standard). You define how
each device is to report detection events when the device is armed. These messages are reported
according to these definitions.
For information on managing user access to the WeR@Home System, see section 5.9.2 on page 91.
130
Table 19 below describes the information reported for each event message.
Data
Message Status
Icon
Description
Attributes
Comments
Image
Optional
Image
The colored
icons represent
the status of
the device such
as open, close,
armed, alert ,
etc.
Security Video
Device Icon
Reset
Tamper Alert
This icon represents the device from which the event was
reported, such as:
Smart Rules
Device Name
Notification
message
Timestamp
The name you gave the device when adding the device to the
WeR@Home System
The description of the event relating to the action or actions that
were detected by the device
Text
The timestamp in
the following
format:
DD/MM/YYYY at
Text
131
Data
Description
Attributes
Comments
HH24: MI
In Figure 117, on page 131, the Filters button appears at the top of the History screen. When pressed, the
History Filters screen appears, as shown in Figure 118 below.
You can press the Clear Filter button to remove all filters and view all the event messages in the History
module.
There are two (2) types of data filters.
Device Filter
Date Filter
132
6.5.2.1
Device Filter
The Device Filter allows you to retrieve and view only the event messages issued by a specific device or
devices.
In Figure 119 below, the Device Filter displays a list of all the devices installed in the WeR@Home System.
To define the Device Filter, perform the following procedure:
1. Tap the ON icon
for the device for which you want to view the messages.
for the device for which you do not want to view the messages.
3. Tap the Apply button to confirm the Device Filter definition. The History screen appears displaying
the list of event messages according to the revised filters definitions.
4. Tap the Cancel button to retain the previous Device Filter definition. The History screen appears
displaying the list of event messages according to the previous, unrevised filters definitions.
For example, in Figure 119 below, the Device Filter allows you to view only the event messages for the
Door/Window Sensor.
133
NOTE: If no devices are selected, the event messages for all devices are listed,
subject to the Date Filter if defined.
6.5.2.2
Date Filter
The Date Filter allows you to retrieve and view only the event messages issued during a specific Viewing
Period.
In Figure 119 above, there is a Date field under the Clear Filters button.
When you press the Date field, the Filters Date Selection screen appears, as shown in Figure 120 below.
The Filters Date Selection screen includes:
The From date entry field
The To date entry field
The calendar mechanism for choosing a date
134
135
5. Tap the Accept button, as in Figure 121 above, to confirm the Viewing Period definition. The History
Filters page appears with the revised Date Filter Viewing period.
6. Tap the Cancel button, as in Figure 121 above, to retain the previous Viewing Period definition. The
History Filters page appears with the previous unrevised Date Filter Viewing period.
For example, in Figure 121 above, the Date Filter defines a Viewing Period that includes all event messages
in the list that were issued from 10 Oct 2014 through 21 Oct 2014, inclusive.
If you choose the wrong dates for the viewing period, the message in Figure 122 above appears.
6.5.2.3
The History Filters can be used together to define the scope of the messages retrieved in the History
page.
For example, in Figure 119, on page 134, the combined filters define a scope of all messages issued by the
Front Door Sensor, from 10 Oct 2014 through 21 Oct 2014, inclusive, as shown in Figure 123 below.
136
137
138
NOTE: The availability of the HD Camera option is based on your specific customer
engagement model.
The Video module allows you to initiate the recording of comfort videos on your Camera Detectors (IPD).
139
6.7.1.1
The function of the Cameras display is to allow you to initiate an immediate instant comfort video.
A list of all the camera devices, recognized by your WeR@Home System, is displayed, as in Figure 128
below.
To initiate a comfort video using a Camera Detector, perform the following procedure:
1. Tap the Play icon
for the Camera Detector from the list of camera devices on the Videos screen.
The camera device opens a viewing screen.
2. View the comfort video live as it is captured and recorded. The comfort video can run up to 40
seconds.
The video is added to the videos captured by your WeR@Home System.
3. Tap the
towards the bottom center of the viewing screen to re-run the video.
4. Tap the
towards the bottom center of the viewing screen to stop the video.
The procedure for viewing Live video is similar to initiating a comfort video. The difference is that the
video is not recorded and added to the Video Gallery.
140
6.7.1.2
The function of the Gallery display is to allow you to view videos that appear in the Gallery list. The list is of
the last 100 videos that were transferred from the WeR@Home Server, including both comfort videos
and security videos.
The list is reloaded when you tap the refresh
All the videos are accessible to each user, regardless of the users profile. You define if the user has the
privilege of viewing comfort videos.
For information on managing user access to the WeR@Home System, see section 5.9.2 on page 91.
Figure 129 below shows the Videos Gallery that lists of the videos captured by the cameras devices (IPDs),
installed in the WeR@Home System.
To view a video, perform the following procedure:
towards the bottom center of the viewing screen to re-run the video.
4. Tap the
towards the bottom center of the viewing screen to stop the video.
141
Table 20 below describes the information reported for each video in the Gallery list.
Data
Video Type
Device Name
Timestamp
User Name
Description
Attributes
Comments
Image
Optional
Video
Security Video
The name you gave the camera device when adding the
device to the WeR@Home System
The date and time the video was recorded
Text
The timestamp in the
following format:
DD/MM/YYYY at HH24: MI
Optional
142
The Video filters are based on the same functionality as the History Filters. For information about how to
use the filters, see section 6.5.2 on page 132.
143
When used together , the Videos filters define the scope of the videos retrieved from the Videos gallery
display. For example, in Figure 130 above, the combined filters define a scope of all videos recorded by the
Living Room Camera Detector, from 13 Oct 2014 through 19 Oct 2014, inclusive, as shown in Figure 131
below.
144
Smart Rules
7. Smart Rules
The WeR@Home System includes the Smart Rules feature. This feature provides you with the capability
to enhance your Smart Living experience by extending your control of your Smart Home environment.
The purpose of the Smart Rules engine is to allow you to setup your environment to automatically react
to detected events and activities. Your WeR@Home Hub can execute actions in response to specific
events and activities. This allows you to further customize your system to fit your everyday life in an
efficient and effective manner.
The Smart Rules (referred to as Rules) are procedures that trigger an action or actions that are performed
as a result of a detected event or activity.
The general structures of Rules are:
If <event or activity or time > occurs, then, execute <action(s)>.
For a specific <date and time>, execute <action(s)>.
For a < time period>, execute <action(s)>.
You can define Rules using the WeR@Home Mobile Application Smart Rules module.
145
Smart Rules
146
Smart Rules
147
Smart Rules
7.3. Triggers
There are three (3) types of triggers corresponding to the three (3) types of Rules:
Time-related Triggers for Schedule Rules
Device Triggers for Devices Rules
System Arming triggers for Arm Modes Rules
148
Smart Rules
A specific time during a recurring day of the week during a defined time period
You can define the trigger for every Monday at 16:30, to be enabled from 20 Oct 2014 to 20 Nov
2014.
A recurring time period on a recurring day of the week during a defined time period
You can define the trigger for every Monday from 16:30 to 18:00 to be enabled from 20 Oct 2014
to 20 Nov 2014.
149
Smart Rules
The Devices triggers are the notifications sent to the Hub triggered by the events detected by the
devices. Devices triggers are determined by the devices connected to your WeR@Home System.
Table 21 below lists the events that can trigger the devices to issue notifications that can trigger Rules.
Device
Camera Detector (IPD)
Event Trigger
Temperature above or below user-defined threshold
Comments
Detector in
Camera used
for security
purposes only
Smoke Detector
Alert issued
Shortcut Button
Button tapped
Unlocked
Locked
Manually switched on
Manually switch off
Table 21: Device Event Triggers
In general, Rule structure requires at least one trigger. However, when you choose an action trigger, such
as a Devices trigger, the Rule structure fundamentals allow you to select an additional Schedule trigger.
150
Smart Rules
For example, when you plan to go away for a long weekend, such as from Friday through Monday, you can
use an Arm Modes Rule to monitor your home while you are away as follows:
If action trigger: Away Arming Mode is armed
at a scheduled time from Friday at 14:00 to Monday at 19:30,
Then, execute actions:
Set dimmer to 40% and
151
Smart Rules
When you return, before you enter your home, you can disarm the rule. You can issue an Arm Modes Rule
for the Disarm mode that resets the motion detectors, turns up the heat, and turn on the water heater.
A Rule with a single Schedule trigger is the only type of Rule that is associated with Arming actions.
If you select a Schedule trigger, the list of actions, as in Figure 138 below, is twofold:
Devices as in Figure 137 above
Arm modes as in Figure 138 below
152
Smart Rules
You can define a Schedule Rule to arm your WeR@Home System, as in Figure 139 below.
153
Smart Rules
154
Smart Rules
You can install Z-Wave controlled devices to integrate the Smart Home experience into your everyday
life using the Smart Rules.
To implement the Smart Home experience, you must install Z-Wave controlled devices, such as:
You can install the Z-Wave controlled switch to turn on appliances, such as indoor and outdoor
lights, air conditioners, heaters, hot water heaters, etc.
You can install the Z-Wave controlled door locks to lock and unlock your doors.
You can install the Z-Wave controlled thermostats on your air conditioners to control the
temperature in your home.
You can install the Z-Wave controlled dimmer on your children bedroom lights to dim them
slowly as they go to sleep.
If you have Z-Wave controlled devices installed in your home, you can use the Rules to monitor and
manage your everyday life.
For example:
You can define a Schedule Rule to trigger actions every day at 18:30 such as:
Brighten the lights in the childrens rooms when the children are preparing their school work
Turn on the Hot Water heater
You can define a Device Rule to trigger actions when the front door unlocks such as:
Turn on the living room lights.
Turn on the air conditioning.
Turn off the outdoor lights.
You can define an Arming Rule to trigger actions when the system is in Arm Away mode such as:
Turn on the outdoor lights.
Turn on the dimmer the indoor lights is some rooms
Turn off the air conditioning.
Close the electric shutters
155
Smart Rules
156
Smart Rules
When you choose a device for a trigger or an action, the Rules mechanism transfers you to a screen where
you can select the specific trigger or action activity. For example:
If you choose the Door/Window Sensor as your trigger device, the Rules mechanism transfers you
to a screen where you can select if the trigger activity is opening the door/window or closing the
door/window.
If you choose the Z-Wave dimmer as the action device, the Rules mechanism transfers you to a
screen where you can select the percentage the dimmer device should dim or brighten the light
fixture controlled by the dimmer device.
157
Smart Rules
4. Enter the name of the new Rule in the field provided. The CONTINUE button appears at the bottom
of the page.
For the purposes of the exercise, create a Rule called Sample Rule. Enter the rule name Sample Rule
in the field provided.
5. Tap the CONTINUE button. The screen appears that defines the Rule being created, as in Figure 141
below.
6. Tap add trigger to add a trigger to the Rule. A screen appears, as in Figure 142 below, prompting
you to choose the kind of Rule you want to create.
7. Tap the button for the type of Rule you want to create.
158
Smart Rules
For the purposes of the exercise, create a Devices Rule. Tap the Devices button. A list of the types of
Device triggers from which you can choose is displayed, as in Figure 142 above. The list reflects only
the types of devices installed in your WeR@Home System.
8. Tap the on the row of the device trigger you want to use.
For the purposes of the exercise, you want to use the Door/Window Sensor as a trigger to monitor
traffic via the Front Door. Tap the on the row of the Open Close Sensor, which is the Door/Window
Sensor. A screen appears for the device trigger you chose, listing all the devices in your WeR@Home
System of that device type.
9. Tap the row of the specific device you want to act as the trigger for the Rule.
For the purposes of the exercise, choose the Front Door device as the trigger for your Rule.
10. Set the device trigger action according to the action you want to use as the trigger for the Rule.
For the purposes of the exercise, select the Opened state of the Front Door Sensor, as illustrated in
Figure 143 below, so that the trigger action is the opening of the Front Door.
11. Tap ACCEPT to confirm the trigger action setting. The screen appears that defines the Rule being
created, as in Figure 144 below. Note that the trigger activity is described where the trigger is
defined: Door unlock.
159
Smart Rules
160
Smart Rules
13. Tap the on the row of the device action you want to use.
For the purposes of the exercise, we want to use the Camera Detector to capture a 15-second video
each time the Front Door is opened.
Tap the on the row of the Camera Detector. A screen appears for the device action you chose, as in
Figure 146 below.
15. Tap ACCEPT to confirm the action setting. The screen appears that defines the Rule being created, as
in Figure 147 below.
161
Smart Rules
162
Smart Rules
163
Smart Rules
icon on the left of the Smart Rule you want to delete. The row that you tapped re-
3. Tap Red
button on the row of the Smart Rule you want to delete. The Confirm Delete message
appears, as in Figure 151 below.
164
Smart Rules
4. Tap the Delete button to confirm your delete Smart Rule request. The Smart Rules screen appears
without the Smart Rule that was deleted.
5. Tap the Cancel button to retract your delete Smart Rule request. The Smart Rules screen appears
with the Smart Rule you wanted to delete.
6. Tap OK on top right corner of the Smart Rules main screen, as in Figure 149 above, to cancel/finish
deletion mode. The Smart Rules screen appears as in Figure 148 on page 163.
NOTE: When you remove a trigger from a Rule during editing, all actions of the Rule
are removed.
7.6.2.1
165
Smart Rules
The Smart Rules screen displays the definition of the rule you selected, as in Figure 152 below.
2. Tap EDIT on top right corner of the screen, as in Figure 153 below, to enter Delete mode.
Delete mode allows you to remove the triggers or actions that define the rule. If you delete an action
or a trigger, you are prompted to add another action or trigger to complete the rule.
166
Smart Rules
3. The Delete process for the Smart Rule definition is the same as the Delete process for deleting rules.
For instructions on the delete process, see section 7.6.1 on page 163.
4. Tap OK on top right corner of the screen, as in Figure 153 above, to cancel/finish deletion mode. The
Smart Rules screen appears as in Figure 152 above.
5. Tap Finish when all changes to the Smart Rule are completed.
7.6.2.2
To change the name of your Smart Rule, perform the following procedure:
1. Enter the Delete mode for the Smart Rule definition. For instructions, see page 166.
2. Tap the Rule name field. The virtual keyboard appears, as in Figure 154 above.
3. Enter the new unique name for the Rule.
4. Tap Go on the keyboard to save the Rule name change. Your application returns to the Smart Rules
definition screen, as in Figure 152 on page 166.
5. Tap Finish when all changes to the Smart Rule are completed.
167
Smart Rules
7.6.2.3
To change the trigger activities and/or the actions activities defined in your Smart Rule,
1. Enter the Smart Rules definition screen, as in Figure 152 on page 166.
2. Tap the on the row of the trigger or action you want to change.
3. Traverse the screens to the activity definition you want to change.
4. Change the activity definition.
5. Tap Accept to save the changes.
6. Return to the Smart Rules definition screen, as in Figure 152 on page 166.
7. Tap Finish when all changes to the Smart Rule are completed.
The
).
To activate a Smart Rule, tap the icon on the Edit Rule screen to be ON
above.
, as in Figure 155
To deactivate a Smart Rule, tap the icon on the Edit Rule screen to be OFF (
168
).
Product
Remote Control or
Key Fob (KF)
Essence ES800KF
Description
The device serves both as the WeR@Home System
Remote Control as well as a personal SOS alarm
(panic) button.
It features:
A 5-button interface for setting Arm and Disarm
states.
Status key or LED indication of system status.
Remote deactivation in case of loss or theft.
Protection against inadvertent activation.
169
ARM
DISARM
Night ARM
Day ARM
SOS (panic)
Figure 156 The Remote Control Command Keys
170
NOTE: The battery images included in this User Guide are for illustration purposes
only.
Only batteries thoroughly tested and approved by Essence should be used to meet
the devices specifications. A list of the approved batteries and their specifications is
provided in Table 36 on page 335.
171
The Add Device window appears, as shown in Figure 159 below. The procedure for the Remote Control
device requires the name of the devices Assigned User.
6. Click the
A window appears, as shown in Figure 160 below, for you to select the Assigned User.
172
7. Click the name of the user prepared prior to beginning of the Remote Control installation. See the
explanation about Assigned Users on page 170.
8. Click the
button to assign the Remote Control to the Assigned User. The Assigned User
appears in the Add Device window, as in Figure 161 below.
The timer starts the count-down for pairing the device with the WeR@Home Hub.
9. Insert the battery into the Remote Control battery compartment with its pole facing out and up, as
demonstrated in Figure 162 below.
173
The Remote Control runs processes to ensure proper communications with the WeR@Home System:
The Remote Control triggers a self-test program which causes the Remote Controls entire front
panel LEDs to blink twice, indicating that the battery was properly installed.
The Remote Control triggers an automatic software handshake procedure in which the Remote
Control communicates with the WeR@Home Hub to flag its presence.
When the Status key is pressed, the right status LED should light up.
The Remote Control appears on the Devices module main page.
174
Status
Status
Disarm
Night Arm
Day Arm
ON Red
ON Red
ON Red
ON Red
ON Red
Duration
Description
Short
Short
Short
Short
Short
Arm
All LEDs
Blinks
Red
175
Product
Camera Detector
(IPD)
Essence ES800IPD
Description
This is referred to as the systems Camera.
It features:
Streaming security and comfort motiondetected images to mobile and web
applications.
An option to compress or encrypt data with
the Essence proprietary ECOP protocol.
Relaying streamed data to the WeR@Home
servers, via the Cloud, for distribution to
designated devices.
A multiple-zone spherical lens for wide
coverage (120o horizontal, 105o vertical).
Sealed optics, immune to light, insects, and
(optional) pets, for reduced false alarms.
A walk-through test-mode.
Table 24: Camera Detector (IPD)
176
177
NOTE: The Camera Detector MUST be installed with the lens pointing downward.
For optimal surveillance, consider the following factors when selecting the Camera Detector position:
On a flat vertical wall surface, or in a corner of a room, between two walls
At a height where the camera lens is 2.1 meters (6.9ft) to 2.3m (7.5ft) above the floor.
On a surface that is clean, dry, flat and smooth
With the motion detector spherical lens pointing downward
Not opposite a window, facing sunlight, or any other strong light sources
In a position where images can be captured from the premises main point of entry
In a position within 500m (1640 feet) RF range of the Hub, open air nominal
For optimal coverage,
For daytime coverage, the Camera Detector must be mounted within 10m (33ft) of the desired
coverage area.
For both daytime and night-time coverage, the Camera Detector must be mounted within 6m
(20ft) of the desired coverage area.
178
To install the mounting base using screws, perform the following procedure:
1. Release the Camera Detector mounting base by lifting the tab and pushing it forward, as illustrated in
Figure 166 on page 182.
2. For Flat Wall Mounting, referring to Figure 164 above, perform the following steps:
i.
ii.
Place and hold the base on the desired mounting location and mark the drilling locations for
punch-outs 1 and 2.
iii.
iv.
v.
vi.
179
3. For Corner Mounting, referring to Figure 164 above, perform the steps:
i.
ii.
Place and hold the base on the desired mounting location and mark the drilling locations for
punch-outs 3 through 8.
iii.
iv.
v.
vi.
180
NOTE: The battery images included in this User Guide are for illustration purposes
only.
Only batteries thoroughly tested and approved by Essence should be used to meet
the devices specifications. A list of the approved batteries and their specifications is
provided in in Table 36 on page 335.
181
182
183
5. The timer count-down provides a time-frame of three (3) minutes within which the batteries should
be installed to power-up the Camera Detector, as demonstrated in Figure 168 below, according to
the poles, aiming towards the lens:
When the Add Device procedure is complete, a message appears in the Add Device window that the
Camera Detector is recognized.
6. Click the
modes.
184
See page 82 for the configuration of the device operational details and completion of the Add Device
process.
These details may be added or edited later, by a Master User, from within the WeR@Home Web
Applications Devices module.
7. Put the battery cover back into place and firmly close it downward.
8. Insert the Camera Detector onto its installed mounting base.
9. Verify that the Camera Detector is properly added by checking the details of the WeR@Home Web
Applications Devices page.
185
186
Product
Motion Detector
(PIR) Essence
ES800PIR
Description
A Passive Infra-Red (PIR) Motion Detector device.
It features:
Sealed optics, immune to light and insects for
reduction of false alarms.
Multiple-zone spherical lens for wide
detection coverage (120o horizontal, 105o
vertical).
Walk-through test mode.
187
Employment of sealed optics and temperature compensation for the Motion Detector to be
immune to direct light, insects and pets (optional) to reduce false alarms
Utilization of a multiple-zone spherical lens for exceptional detection coverage (90o horizontal,
105o vertical) and a detection range of about 12m (39ft)
Support of automatic over-the-air software programming and configuration upgrades
Walk test mode
Tamper Alarm, when the unit is tilted
Long operating period, depending on video usage, powered by three (3) standard AA-size
Alkaline batteries
NOTE: The Motion Detector MUST be installed with the lens pointing downward.
For optimal surveillance, consider the following factors when selecting the Motion Detector position:
On a flat vertical wall surface, or in a corner of a room, between two walls
At a height where the Motion Detector is 2.1 meters (6.9ft) to 2.3m (7.5ft) above the floor
On a surface that is clean, dry, flat and smooth
With the motion detector spherical lens pointing downward
Not opposite a window, facing sunlight, or any other strong light sources
In a position where the camera can capture images from the premises main point of entry
In a position within 500m (1640 feet) RF range of the Hub, open air nominal
188
To install the mounting base using screws, perform the following procedure:
1. Release the Motion Detector mounting base by lifting the tab and pushing it forward, as illustrated in
Figure 173 on page 192.
2. For Flat Wall Mounting, referring to Figure 171 above, perform the following steps:
i.
ii.
Place and hold the base on the desired mounting location and mark the drilling locations for
punch-outs 1 and 2.
iii.
iv.
v.
vi.
189
3. For Corner Mounting, referring to Figure 171 above, perform the following steps:
i.
ii.
Place and hold the base on the desired mounting location and mark the drilling locations for
punch-outs 3 through 8.
iii.
iv.
v.
vi.
10.4.
For dismounting the Motion Detector from the wall (i.e. for battery replacement), press the mounting
base tab, at the bottom of the Motion Detector, and slide it downwards simultaneously, as demonstrated
in Figure 172 below.
190
NOTE: The battery images included in this User Guide are for illustration purposes
only.
Only batteries thoroughly tested and approved by Essence should be used to meet
the devices specifications. A list of the approved batteries and their specifications is
provided in Table 36 on page 335.
191
10.6.
Following the completion of the physical installation procedure, you must add the Motion Detector to the
WeR@Home System.
192
3. Perform the procedure to add a new device to the WeR@Home System, as defined in section 5.7.1.1
page 77. The procedure is defined in general terms.
Integrate the steps to follow, which are specific for a Motion Detector, into the Add Device
procedure.
4. The timer count-down provides a time-frame of three (3) minutes within which the batteries should
be installed to power-up the Motion Detector, as demonstrated in Figure 175 below, with the poles
aiming downwards:
193
When the Add Device procedure is complete, a message appears in the Add Device window that the
Motion Detector is recognized.
5. Click the
button to extend the window to configure the Motion Detectors operation
modes. See page 82 for the configuration of the device operational details and completion of the
Add Device process.
194
These details may be added or edited later, by a Master User, from within the WeR@Home Web
Applications Devices module.
6. Insert the Motion Detector onto its installed mounting base.
7. Verify that the Motion Detector is properly added by checking the details of the WeR@Home Web
Applications Devices page.
195
196
Product
Door/Window
Sensor (MGL)
Essence ES800MGL
Description
A compact-designed magnetic sensor device.
The device has long range and is easy to install.
Referred to as the Door/Window Sensor (MGL).
It features:
Dual LED for open/close status indication.
A lightweight sensor and a magnet.
197
Tamper Alarm, triggered when the transmitter unit is removed from its base
Long operation period, powered by a single standard AA-size Alkaline battery
198
There are two (2) ways to install the Transmitter mounting base:
Using screws
Using double-sided adhesive tape
To install the mounting base using screws, perform the following procedure:
1. Release the Transmitter base by inserting a coin into one of the edge slots, as illustrated in Figure 179
above, and twist it to open the cover.
2. Use a flat screwdriver to remove the punch-outs 1 and 2. See the position of the punch-outs in Figure
180 below.
199
3. Place and hold the base on the desired mounting location on the window/door frame
4. Mark the drilling locations of the punch-outs 1 and 2.
5. Drill the holes.
6. Insert two (2) dowels, if needed.
7. Place the base over the dowels.
8. Screw in the two (2) screws.
9. Attach the Transmitter back onto its base.
11.3.2 Installing the Transmitter and the Magnet with Double-sided Tape
To install the mounting base using the double-sided adhesive tape provided, perform the following
procedure:
1. Release the base of the Transmitter, as illustrated in Figure 179 above, and twist it to open the cover.
No need to release the base of the Magnet.
2. Peel the tapes protective strips of both units.
3. Attach the base of each unit to its designated location while applying slight pressure.
4. Attach the Transmitter back into the base.
200
201
202
When the Add Device procedure is complete, a message appears in the Add Device window that the
Door/Window Sensor is recognized.
203
These details may be added or edited later, by a Master User, in the WeR@Home Web Application
Devices module.
7. Insert the Door/Window Sensor onto its installed mounting base.
8. Verify that the Door/Window Sensor is added to the WeR@Home System, by checking the details of
the WeR@Home Web Application Devices page.
204
The Siren
Product
Siren (SRN)
Essence ES800SRN
Description
The features of the wireless siren (SRN) are:
Loud and powerful siren of up to 95dB
with adjustable volume control.
Siren sound duration: 90 seconds upon
intrusion.
Dual purpose as a siren and doorbell.
205
The Siren
206
The Siren
207
The Siren
NOTE: The Siren should always be installed with the latch tab pointing down.
208
The Siren
Integrate the steps to follow, which are specific for a Siren, into the Add Device procedure.
4. The timer count-down provides a time-frame of three (3) minutes within which the batteries should
be installed to power-up the Siren, as demonstrated in Figure 189 below, according to the pole as
marked within the device body.
The Siren should emit a double-beep following the insertion of the first two (2) consecutive batteries
to indicate proper power-up sequence.
When the Add Device procedure is complete, a message appears in the Add Device window, as shown
in Figure 190 below, that the Siren is recognized.
209
The HD Camera
NOTE: The availability of the HD Camera option is based on your specific customer
engagement model.
Accessories available for the HD Camera:
Power Adapter
Camera mounting bracket
Product
HD Camera (HDC)
Essence ES800HDC
Description
The features of the HD Camera (HDC) are:
WiFi: 802.11b/g/n
Ethernet: 10 / 100 Mbps RJ-45
HD: 720P, 1MP
Simple installation
View using the WeR@Home applications
Broadband connection for LAN/WiFi
Uses VLC in Android phones to view HD
Live View video
Audio capability
Privacy capability
Table 28: HD Camera
210
The HD Camera
211
The HD Camera
WPS button
Privacy button
212
The HD Camera
The HD Camera LEDs, as shown in Figure 193 above, represent the following functions:
LED 1: Privacy The LED is RED when the Privacy function is enabled.
LED 2:WPS The WiFi Protected Setup (WPS) LED is lit when the HD Camera is connected to WiFi.
LED 3:LAN connection The LAN connection LED is blinking Blue, when the HD Camera is
connected to the LAN.
LED 4: Power connection The Power LED is Blue, when the HD Camera is connected to the
power supply
213
The HD Camera
214
The HD Camera
To install the mounting bracket using screws, perform the following procedure:
1. Release the HDC mounting bracket by unscrewing the bracket from the base of the camera, as
illustrated in Figure 195 below.
2. Place and hold the bracket on the desired mounting location and mark the drilling locations for
screw positions 1 and 2, as in Figure 194 on page 214.
3. Drill the holes.
4. Insert two (2) dowels, if needed.
5. Place the base over the dowels.
6. Screw in the two (2) screws.
215
The HD Camera
216
The HD Camera
Power Cable
5. (Optional) If your router is WPS-enabled, you can setup the HD Camera for WiFi communications.
i.
Press the WPS button, on the right side of the HD Camera ,simultaneously with the WPS button
on your LAN router until the 2nd LED (from the left) lights-up, to synchronize the HD Camera
with your WiFi.
ii.
Disconnect the LAN cable from the HD Camera, when the LED lights up.
217
The HD Camera
218
The HD Camera
button to trigger the application to locate and recognize the HD Camera on the
8. Verify that the HDC device is properly added by checking the details of the WeR@Home Web
Applications Devices and Dashboard tabs, as in Figure 200 and Figure 201 above.
NOTE: If you are using an Android mobile, ensure that the VLC application is
installed on your mobile device to view Live video from your HD Camera.
219
The HD Camera
NOTE: The HD Camera can only be accessed by the WeR@Home applications. The
HD Camera cannot be used as an LAN network camera once it is connected to the
WeR@Home System
220
Product
Tag Reader (TR)
Essence
ES800TR and
Tag (TAG)
ES800TAG
Description
The Tag Reader (TR) is an access control device. The
tags are the access keys.
It features:
A user-friendly interface.
Command options for arming the system.
Doorbell or Status functions, depending on
indoor or outdoor installation
Remote tag deactivation in case of loss or theft
via smartphone or web access.
A wall-mount option using double-sided
adhesive tape or screws.
A long operation period of up to 36 months.
A tamper alarm when detached from the wall.
221
222
223
14.4.
For dismounting the Tag Reader from its designated installation site:
1. Press the tab.
2. Slide the Tag Reader body upwards as demonstrated in Figure 204 below.
224
14.6.
Following the completion of the physical installation procedure, you must add the Tag Reader to the
WeR@Home System.
To install the Tag Reader, perform the following procedure.
1. Ensure installation prerequisites have been prepared. For information about the prerequisites, see
section 14.5 on page 225.
2. Install the mounting base according to your decision about the mounting base installation
alternatives. For instructions for installing the mounting base, see section 14.3 on page 223.
3. Perform the procedure to add a new device to the WeR@Home System, as defined in section 5.7.1.1
on page 77. The procedure is defined in general terms.
225
Integrate the steps to follow, which are specific for a Tag Reader, into the Add Device procedure.
4. The down-counter provides a time-frame of three (3) minutes within which the batteries should be
installed to power-up the Tag Reader, as demonstrated in Figure 205 below:
When the Add Device procedure is complete, a message appears in the Add Device window that the
Tag Reader is recognized.
226
5. Mark whether the Tag Reader location is indoors or outdoors, as shown in Figure 206 above. This
defines the Tag Reader operating function.
6. Click the
button to extend the window, as shown in Figure 207 below to configure the
TRs operation modes.
7. Mark whether or not to enable the bell, if the Tag Reader is installed outdoors and you want the Tag
Reader to serve as a door bell.
14.7.Adding Tags
A Tag is a personal device that, like the Remote Control, identifies the assigned user to the WeR@Home
System. It is a passive device that is not battery-powered. The tags use advanced magnetics and RFID
technologies for their operation.
Following the addition of the Tag Reader to the WeR@Home Web Application, you can add the Tags that
are used to arm and disarm the WeR@Home System.
227
228
2. Select the Add Tag option in the dropdown list for the Add New Device button, as shown in Figure
209 below.
The Add Device window appears, as shown in Figure 210 below. The procedure for adding a Tag
device requires the name of the devices Assigned User.
3. Click the
A window appears, as shown in Figure 211 below, for you to select the Assigned User.
229
4. Click the name of the user prepared prior to beginning of the Tag installation. For the explanation
about the Assigned User, see section 14.7.1 on page 228.
5. Click the
The Add Device window re-appears displaying an additional field, as shown in Figure 212 below, for a
label name for the Tag. The Tag label is optional.
230
ii.
Click the
button.
When the Start button is pressed, the timer starts the count-down for pairing the device with the
WeR@Home Hub. The timer count-down provides a time-frame of three (3) minutes within which
the Tag should be held over the Tag Reader to be detected by the WeR@Home Hub.
7. Hold the Tag over the Tag Reader to trigger the Tag Reader to read the Tags identity and trigger a
handshake process. In the handshake process, the Tag Reader communicates with the Hub to
inform it of the new Tag. The Hub adds the tag to the Hub peripherals inventory.
If the Hub did not identify the new Tag within the given time-frame, an error message appears in the
Add New Device window, as shown in Figure 213 below.
8. Click the
9. Click the
10. You can verify that the Tag was properly added by checking the details of the WeR@Home Web
Applications Devices page.
231
Product
Flood Detector
(FL) Essence
ES800FL
Description
The Flood Detector (FL) is a water leakage earlywarning device.
It features:
An alarm triggered by a water leak or dampness.
The alarm is triggered by water running through
the detection element.
Optional Wall or Frame mounting base.
232
Basements
Near air conditioners
Washing machines
Sinks
Dual-LED indication for flood detected (Red) and flood diminished (Green) status
Up to 500m (1640 feet) RF range for open-air communication
Automatic over-the-air software programming and configuration upgrade
Tamper Alarm that is triggered when the Transmitter unit is removed from its base
A long operation period, powered by a single standard AA-size Alkaline battery
233
To install the Flood Detector Transmitter mounting base using screws, perform the following procedure:
1. Release the Flood Detector Transmitter mounting base by inserting a coin into one of the edge slots,
as demonstrated in Figure 214 above, and twist it to open the cover.
2. Use a flat screwdriver to remove the punch-outs 1 and 2, as shown in Figure 215 below.
234
235
236
237
When the Add Device procedure is complete, a message appears in the Add Device window that the
Flood Detector is recognized.
238
Product
Smoke
Detector (SK)
Essence
ES800SK
Description
The Smoke Detector (SK) is a stand-alone earlywarning device. It features:
Tri-color LED for visual indication.
Loud alarm of 85dB from 3 meters.
Independent full operation. Does not rely on the
Hubs operation.
A tamper alarm triggered when detached from
its base.
Long operation life.
Table 31: Smoke Detector (SK)
The Smoke Detector contains a photoelectric smoke detection chamber. The Smoke Detector is capable
of bi-directional radio frequency (RF) communications with the WeR@Home Hub from a remote
location.
When properly positioned, installed and maintained, the Smoke Detector is designed to give early
warnings of possible fires by emitting alarm sounds. The Smoke Detector can provide you and your family
the time to escape before a fire spreads.
When the Smoke Detector detects smoke, the following occurs:
A loud piezoelectric buzzer (85 dBA at 3 meters) is sounded.
The Red LEDs on the device light up.
An RF signal is sent to the WeR@Home Hub.
239
240
241
An alarm required per bedroom area in homes with multiple bedroom areas, as shown in Figure
221 below.
WARNING! Make sure doors or other barriers do not block the path of smoke to
the Smoke Detectors.
242
At both ends of a bedroom hallway if the hallway is longer than 12 meters (40 feet)
At the bottom of the basement stairway, as shown in Figure 222 above.
As close to the center of the ceiling as possible, or on the ceiling no less than 10 cm (4 inches)
away from any wall or corner
On a wall 10 to 15 cm (4 to 6 inches) from the ceiling
A position 90 cm (3 feet) measured horizontally from the highest point of a ceiling, if the ceiling is
either sloped, peaked, or gabled
243
In insect-infested areas. If insects enter the Smoke Detectors chamber, they may cause a
nuisance alarm.
Near fluorescent lights. Electrical discharges from fluorescent lights can cause nuisance alarms.
Install Smoke Detectors at least 1.5 meters (5 feet) from such lights.
16.4.
244
The Smoke Detector mounting base includes four (4) holes for screws for flexibility of installation. Only
two (2) screws are necessary for a secure installation.
To install the Smoke Detector device, perform the following procedure:
1. Remove the mounting bracket from the device by turning the bracket counter-clockwise, as in
Figure 223 below.
245
NOTE: Prevent dust from getting into the Smoke Detector while drilling the holes.
246
7. Clean the Smoke Detector, following the installation and prior to the power-up of the Smoke
Detector.
i.
ii.
Use the soft brush of the vacuum cleaner to remove dust and dirt from the detection chamber.
NOTE: Do not use water or detergents. They can damage the device.
iii.
Carefully remove any dust residing on the Smoke Detector's components applying special
attention to the openings of the detection chamber, as indicated in Figure 226 below.
Clean here
Figure 226 Clean the Smoke Detector
247
2. The timer count-down provides a time-frame of three (3) minutes within which the batteries should
be installed to power-up the Smoke Detector, as demonstrated in Figure 227 below, according to the
pole as marked within the device body.
248
i.
Use the enforcing key, as indicated in Figure 228 below, for omni-directional assembly.
ii.
Use the locking pins, as indicated in Figure 228 below, to secure the assembly of the Smoke
Detector.
Omni-directional enforcing
key
4. Line-up the locking pins and the direction enforcement pin, push the Smoke Detectors body into
the Mounting Bracket and turn it clockwise until it clicks and locks into position.
5. Confirm proper locking by pulling the device slightly out of the Mounting Bracket.
NOTE: When the batteries make the initial contact with the Smoke Detector
electronic circuit, the tamper prevention sub-system might sound. This means that
the Smoke Detector is working properly and indicates that the batteries are installed
correctly.
When the Add Device procedure is complete, a message appears in the Add Device window that the
Smoke Detector is recognized.
249
6. You may verify that the Smoke Detector was added by checking the details of the WeR@Home Web
Applications Devices page.
250
WARNING! Never disable the Smoke Detector or remove the battery to stop the
alarm.
To eliminate the alarm, open a window or use a fan to remove the smoke around the device. The alarm
turns itself off as soon as the smoke scatters.
If a nuisance alarms persists, clean the Smoke Detector as described in section 16.5.1 on page 252.
WARNING! Do not stand close to the Smoke Detector when the alarm sounds.
Continuous exposure to the alarm at close range may be harmful to your hearing.
251
Non-residential buildings, such as warehouses, industrial buildings, commercial buildings, and other
public buildings, require special fire detection and alarm systems.
This device is not a substitute for a complete fire detection system for structures such as commercial
housing, public housing, or multiple-family dwellings.
NOTE: Do not use water or detergents. They can damage the device.
4. Remove any dust residing on the Smoke Detector's components, specifically the openings of the
detection chamber.
252
Clean here
Figure 231 Clean the Smoke Detector
253
Product
Universal
Transmitter
(UT)
Essence
ES800UT
Description
Provides connection to legacy-wired devices
It features:
Dual LED for visual status indication.
A Single element: a lightweight RF transmitter
with 30 cm double-isolated two-conductor
cable.
Long operation life.
Table 32: Universal Transmitter (UT)
254
255
To install the Universal Transmitter mounting base using screws, perform the following procedure:
1. Release the Universal Transmitter mounting base by inserting a coin into one of the edge slots, as
demonstrated in Figure 232 above, and twist it to open the cover.
2. Use a flat screwdriver to remove the punch-outs 1 and 2, as shown in Figure 233 below.
256
257
258
Figure 235 Associating the Universal Transmitter with a Legacy Wired Device
4. Perform the following steps to define the function of the Universal Transmitter:
i.
Select the type of the legacy-wired device with which to associate the Universal Transmitter.
ii.
Define the mode of operation of the Universal Transmitter with the legacy-wired device:
Normal Open (Green LED)
Normal Close (Red LED)
iii.
iv.
Choose one:
Click the
button to continue adding the Universal Transmitter to the
WeR@Home System.
Click the
If continuing the process, the Add New Device (Universal Transmitter) window appears, as in Figure
236 below.
259
5. The timer count-down provides a time-frame of three (3) minutes within which the battery should be
installed to power-up the Universal Transmitter, as demonstrated in Figure 237 below, according to
the pole as marked within the device body.
260
The Red wire is positive (+) and the Black wire is negative (-).
The Universal Transmitter opens the WeR@Home System to integration with non-Essence peripherals.
261
Product
Z-Wave
Extender
(ZWD)
Essence
ES800ZWD
Description
The Z-Wave Extender is a peripheral controller
device enabling integration of Z-Wave approved
Smart Home devices (i.e. Door Lock, Light Switch,
Dimmer Switch, etc.) with the WeR@Home system.
It features:
A single element
Long operation life
Unlike all other WeR@Home peripheral devices, the WeR@Home Z-Wave Extender is classified as a
controller device. The Z-Wave Extender is similar to the Hub, which is a controller device rather than a
peripheral device.
The Z-Wave Extender allows control of Smart Home devices via the WeR@Home System. Control of
Smart Home devices expands the WeR@Home Systems capabilities and the devices portfolio beyond
the Essence ECOP RF protocol capabilities.
The Z-Wave Extender (dongle) connects to the WeR@Home Hub as an add-on.
The Essence WeR@Home Z-Wave Extender serves as a generic controller covering the following ZWave supported device classes:
262
NOTE: Essence security devices, such as Motion Detectors, Camera Detectors and
Door/Window Sensors, cannot connect to the Z-Wave network.
Figure 240 The USBs for Connecting with the Z-Wave Extender
The Z-Wave Extender incorporates two connecting points, as shown in Figure 240 above:
A cable with a mini-USB connector, connecting to the WeR@Home Hub s mini-USB backpanel socket
A mini-USB socket, on its other end, for the Hubs power adapter connector.
263
A minimal operational WeR@Home System may include only the Hub. The Hub must be registered
through first time registration.
For information and instructions, see section 3.4 on page 30.
To install the Z-Wave Extender to a WeR@Home System, perform the following procedure.
1. Disconnect the Hub from power by unplugging the power adapter cube from the electric power
(mains) socket.
2. Disconnect the power cord from the Hubs mini-USB socket, as in Figure 241 above.
NOTE: The Hubs mini-USB socket is for the WeR@Home power cord only. Do not
connect other equipment to this mini-USB socket except the Z-Wave Extender.
During this installation procedure, a Power Failure event is logged and a notification is expected.
3. Plug the Z-Wave Extender mini-USB connector into the Hub mini-USB socket, as illustrated in
Figure 242 below.
264
4. Plug the power adapter cord into the Z-Wave Extender mini-USB socket as illustrated in Figure 243
below.
5. Plug the power adapter cube back into the mains socket.
Within a minute, the Hub front panel LED turns Green, showing that the Hub is in full operational
mode.
265
6. Verify that the Hub is fully operational. For instructions, see section 18.2.1 below.
18.2.1 Verification
Following the completion of the installation of the Z-Wave Extender, take the following steps:
1. Activate the Z-Wave Extender via the WeR@Home Web Application.
2. Check status of the Z-Wave Extender in the WeR@Home Web Application Dashboard.
For verification instructions, see section 18.3 below.
18.4.
There are three (3) possible configurations when adding the Essence Z-Wave Extender to the
WeR@Home Hub:
The WeR@Home Hub with an Essence Z-Wave Extender acts as the primary Z-Wave controller
on the WeR@Home network. As the primary Z-Wave controller, the Essence Z-Wave Extender
has the permission needed to connect with Z-Wave controlled Smart Home devices can be
added to the WeR@Home network.
The WeR@Home Hub with both an Essence Z-Wave Extender and a 3rd party Z-Wave
controller. The Essence Z-Wave Extender acts as the primary Z-Wave controller while the 3rd
party Z-Wave controller is the secondary controller, on the WeR@Home network.
266
The WeR@Home Hub with an Essence Z-Wave Extender joins an existing network where the a
3rd party Z-Wave controller acts as the primary Z-Wave controller on the WeR@Home network.
In this situation, the Essence Z-Wave Extender is added to the existing network as the secondary
controller.
When any Z-Wave controller is added to an existing network as a secondary controller, all Z-Wave
controlled Smart Home devices connected to the Z-Wave controller automatically lose their connection
to the Z-Wave controller. Secondary controllers do not have the permission needed to add new Z-Wave
controlled Smart Home devices to the Z-Wave network.
If the primary controller on the Z-Wave network has a specific capability, the primary controller can grant
the secondary controller the permission to add devices.
267
268
A message appears warning you that when you join an existing Z-Wave network, all the learned
devices and their information is deleted. The message prompts you for authorization to continue.
5. Click
6. Click
to continue.
269
The Join Existing Network window appears as in Figure 247 below. The window prompts you to pair
the Essence Z-Wave Extender with the 3rd-party Z-Wave controller.
7. To make the Essence Z-Wave Extender the primary controller, perform the following procedure:
270
i.
Select the line for the secondary controller which is your Essence Z-Wave Extender. The page
appears as in Figure 249 below.
ii.
Click the Change to Primary button on the right side of the Smart Home devices page, as
illustrated in Figure 249 below.
271
Figure 250 above shows the Smart Home module that functions similarly to the Devices module. It allows
you to manage the Z-Wave controlled Smart Home devices.
The Devices pane to the left lists the Z-Wave controlled Smart Home devices including the status of each
device. The pane to the right allows you to configure the functions of the device that appears in the
highlighted row to the left.
Managing Z-Wave controlled devices allows you to:
Add new Z-Wave controlled devices.
Configure the Z-Wave controlled device properties
Remove Z-Wave controlled devices.
Define Smart Rules for the Z-Wave controlled devices. For information and instructions about
configuring Smart Rules, see chapter 7 on page 145.
button. The Add New Device window, for a Z-Wave device, appears, as in
272
Note that this procedure does not include selecting a device type from a pre-set list of Z-Wave
controlled device types. There is a timer which counts down a period of 3 minutes, as the pairing
process executes.
5. Press the pairing button or switch on the Z-Wave controlled device to initiate the pairing process.
Each Z-Wave controlled device should include a description of the pairing process for the specific
device, such as where the pairing button is and what should be done to initiate the inclusion process.
For general information about the pairing and bonding processes, see the following sources:
Under Pairing and Bonding: http://en.wikipedia.org/wiki/Bluetooth
Under Administrator, During the pairing process :
http://www.auelectronics.com/forum/index.php?topic=458.0;wap2
When the pairing process is completed, a message confirming the addition of the device appears in
the Add New Device window, as in Figure 252 below. The window prompts you to enter a
Name/Location for the Z-Wave controlled device.
The Z-Wave controlled device communicates with the WeR@Home Z-Wave Extender and is
configured, according to its features, onto WeR@Home System.
273
For example, in Figure 250 on page 271, the Z-Wave controlled device added is a Z-Wave Dimmer. The
Smart Home Devices pane displays the name/location of the device along with the status of the device.
On the right pane, the Smart Home module displays the properties of the device:
Name/Location
On/Off switch
Dimmer switch
The user can change the configuration of the device by altering the devices properties. For instance,
The user can dim the light to 25% by moving the button on the Dimmer Switch to the left until it
reaches 25%.
The user can disable the device by setting the On/Off device to Off.
274
The following is the exclusion process for removing a Z-Wave controlled device from your WeR@Home
Smart Home module.
1. Log in to the WeR@Home Web Application.
2. Click the Smart Home tab, as in Figure 250 on page 271 above.
3. Select a Z-Wave controlled device which you want to remove. The row of the device is highlighted.
The pane to the right displays the devices properties.
4. Click the
button. A window message appears prompting you to press the
pairing button on the device being removed, as in Figure 253 below.
5. Press the
The Z-Wave controlled device selected is removed from the WeR@Home System when the
highlighted row in the Devices pane of the Smart Home module is deleted.
275
276
277
These arming modes are set individually for each device. The WeR@Home Web Application Devices
module provides you with the tools to define how each device functions for each security mode of
operation.
Arming and disarming the WeR@Home System can be done by using a number of different tools. These
tools trigger the WeR@Home System arming commands as well as provide feedback for the User.
The WeR@Home Web Application System Status Bar: See section 5.4.6 on page 63.
The WeR@Home Mobile Applications Home screen: See section 6.3.2 on page 106.
The Remote Control: See chapter 7 on page 145.
The Tag Reader: See chapter 14 on page 221.
button
button
If Delayed Arming is configured, the Siren and Tag Reader beep for the configured duration. For more
information about Delayed Arming, see section 19.1.5 on page 281.
278
button
button
button
button
279
19.1.4 Disarm
When the WeR@Home System is armed, the WeR@Home Web Application System Status Bar display is
altered. The grey arming mode
as shown in Figure 255 above.
Click the
button labelled
button to disarm the WeR@Home System, regardless of the current arming mode.
status icon.
The WeR@Home Web Application System Status Bar display returns to its original state, as in Figure 254
on page 277.
When triggering the system for any of the three (3) security arm modes via the WeR@Home Mobile
Application, the three (3) arming buttons at the bottom of the WeR@Home Mobile Application Home
screen,
, turn into the
the system via the WeR@Home Mobile Application.
When the WeR@Home System detects an event, the arming buttons are replaced by the actions buttons:
.
If you activate the use of your PIN Code to disarm your WeR@Home System, your disarm process is
different than the process described above.
280
For information on PIN Code usage to disarm your WeR@Home System, see section 6.4.6.3 on page 123.
To disarm the system using the Remote Control, press the
button.
To disarm the system using the Tag Reader, place the Tag in close proximity with the Tag Reader.
NOTE: The Delayed Arming feature is applicable only for Arm Away mode.
After you activate Arm Away, the Siren and Tag Reader beep for the configured duration, until the system
is actually armed.
If you arm the system using the WeR@Home Mobile Application, a countdown screen is displayed
showing the number of seconds remaining until the system is armed. To cancel, tap DISARM.
281
You can configure the delay duration in the the WeR@Home Web Application and the WeR@Home
Mobile Application.
For instructions on configuring Delayed Arming:
Mobile Application: see section section 6.4.7 on page 128.
Web Application: see section 5.4.3 on page 57.
282
Click the Force Arm button to configure the WeR@Home System to bypass the open device
when detecting motion or intrusion on the premises.
Click the Dont Arm button to cancel the request to arm the WeR@Home System.
283
is blinks Red.
The Mobile Application Home screen display is altered, as shown in Figure 261 below.
284
The functionality of the Mobile Application for a triggered security event is partly automatic and partly up
to the discretion of the User, as follows:
An Intrusion Alarm title is displayed along with the triggering device identification and a time
stamp.
blinks Red
Three (3) buttons are displayed at the bottom of the screen as follows:
285
blinks Orange.
286
When a safety alert is triggered, the WeR@Home Mobile Application sends a notification message, as
shown in Figure 263 below:
The Mobile Application Home Status screen display is altered, as shown in Figure 264 below:
287
The following explains the functionality of the Mobile Application for a safety event:
A Flood (or Smoke) Alert title is displayed along with the triggering device identification and a
time stamp.
blinks Orange.
Three (3) buttons are displayed at the bottom of the screen as follows:
288
When a panic alarm is triggered, you can receive Alert Notifications on:
The WeR@Home Web Application
The smartphone where the WeR@Home Mobile Application software is installed
The cellular phone you entered when you registered as a User
When a panic alarm is triggered, the WeR@Home Web Application System Status Bar display is altered as
in Figure 266 below:
Figure 266 Panic Alarm Status Display on the WeR@Home Web Application
blinks Red.
289
The WeR@Home Mobile Application Home Status screen display is altered, as shown in Figure 268 below:
The functionality of the WeR@Home Mobile Application for a triggered panic event is partly automatic
and partly up to the discretion of the User, as follows:
A Panic Alarm title is displayed along with the triggering device identification and a time stamp.
blinks Red.
Three (3) buttons are displayed at the bottom of the screen as follows:
290
The top half of the Cameras pane provides a viewing frame to view the images captured by the Camera
Detector devices.
The bottom half of the center pane displays camera detectors available on your WeR@Home System.
Each camera icon is displayed with the name or location of the camera the icon represents.
291
To activate a Camera Detector to capture a comfort video, perform the following procedure.
1. Click the icon of the camera you need. The system activates the camera associated with the icon
selected.
2. Click the
button to view the captured images. The viewing frame of the Cameras pane displays
the images captured by the camera, as shown in Figure 270 below.
The images are displayed sequentially for about 40 seconds.
3. Click the
292
19.4.
Managing Users
To define access to the WeR@Home System to each User, the prospective Users need to be profiled and
their personal data analyzed. Each User must be assigned the access required to control each of the
device types defined in the WeR@Home System.
293
294
The following are use cases for application of the special features of the WeR@Home devices:
Entry/Exit feature
Walk Through Feature
Chime Feature
19.5.1 Entry/Exit
The Entry/Exit feature provides the owner with the time to arm or disarm the WeR@Home System while
entering or exiting the premises, without triggering an alarm.
The Entry/Exit feature is usually enabled for a Door/Window Sensor installed on the main entrance door,
or for a Motion Detector or a Camera Detector installed in the entrance.
NOTE: This configuration may be enabled, per device, for the security devices:
Motion Detector, Camera Detector, and Door/Window Sensor. To enable for the
entire system, use the Delayed Arming feature. For more information, see
section 19.1.5 on page 281.
295
296
19.5.3 Chime
The Chime feature provides audible warning for a door being opened when the WeR@Home System is
disarmed.
The Chime feature may be enabled only for a Door/Window Sensor and for an installation that includes a
Siren.
A Magnetic Sensor can be defined simultaneously as Entry/Exit or Walk-Through and as Chime.
When the Chime feature is enabled:
Whenever the system is disarmed, the Siren will emit a bell-like sound whenever the Magnetic
Sensor is opened.
Users who want to get an audible warning when a door is opened, as in small shops or offices, may want an
installation that includes both a Door/Window Sensor and an Indoor Siren.
19.6.Log of Events
Users can monitor the latest events that occurred in the WeR@Home System in the pane farthest to the
right in the Dashboard in the WeR@Home Web Application.
For information about the log of recent events, see section 5.6.3 on page 74.
297
20.1.Maintenance Frequency
Battery replacement for any of the battery-powered peripherals is performed according to the devices
indicators. Both the WeR@Home Web Application and the WeR@Home Mobile Application provide
power status displays for each peripheral device.
Notifications are sent informing you that the batteries in a device(s) require(s) replacement.
The Smoke Detector filter cleaning should be performed on a monthly basis. Cleaning the filter of the
Smoke Detector device requires removal of any dust that might block the path to the sensor.
The sections to follow describe the maintenance process per device type. Each section may refer you
back to the chapter about the device for more specific instructions.
20.2.
The Hub requires a power adapter for its main power and a special backup battery, the square battery
pack, Essence MCBT05001.
For technical specifications about the power adapter and the backup battery, see Appendix D on page
334.
For detailed information and instructions about setting up and activating the Hub, see section 3.3 on page
26. For battery insertion specifically, see page 28.
298
NOTE The battery label should be facing up and the battery contacts should be
aiming towards the base of the Hub.
2. Return the battery cover back into place and click it firmly.
3. Plug the Power Adapter cable into the mini-USB connector on the back of the Hub.
4. Plug the adapter cube into the mains socket.
The LED on the front panel of the Hub should light up Orange.
5. Place the Hub in its designated location and wait for the front panel LED to switch from Orange to
Green.
A Green LED indicates that the Hub is active. It takes up to five (5) minutes for the LED to turn Green.
When the LED turns Green, the WeR@Home System is up and running.
20.3.
The Camera Detector requires three (3) 1.5V AA-size Alkaline batteries.
For more information and instructions about battery insertion for the Camera Detector, see section 9.6 on
page 183.
WeR@Home System User Guide
299
NOTE Rattling sounds might be heard during the battery replacement process.
The rattling sound is the internal tamper-prevention mechanism. The rattling
sound confirms that the circuit is released. No damage has been made to the
Camera Detector.
300
20.4.
The Motion Detector requires two (2) 1.5V AA-size Alkaline batteries.
For more information and instructions about installing the Motion Detector, see section 10.6 on page 192.
NOTE Rattling sounds might be heard during the battery replacement process.
The rattling sound is the internal tamper-prevention mechanism. The rattling
sound confirms that the circuit is released. No damage has been made to the
Motion Detector.
301
20.5.
20.6.
2. Install the new batteries as demonstrated in Figure 189 on page 209. Each battery is in opposite
direction to the adjoining battery and the correct polarity is engraved onto the bottom of the
batteries compartment.
3. Return the Siren back into its mounting base.
WeR@Home System User Guide
303
The insertion of the battery into the Siren triggers a bonding process in which the Siren communicates
with the Hub to re-instate it into the Hub peripherals inventory.
There is no need to perform Add Device process following battery replacement since the Siren is already
defined in the WeR@Home System.
20.7.
To insert a new battery into the Remote Control, perform the following procedure:
1. Insert the new battery into the Remote Controls compartment with its positive () pole facing
out/up, as illustrated in Figure 162 on page 174.
2. Seal the cover by turning it a quarter of a circle (90o) clockwise.
304
It is unnecessary to perform the Add Device procedure following battery replacement since the Remote
Control is already defined in the WeR@Home System.
20.8.
The Tag Reader requires three (3) 1.5V AA-size Alkaline batteries.
The Tags used with the Tag Reader are passive components and require no power source. No
maintenance is required for the Tags.
For more information and instructions about installing the Tag Reader, see section 14.6 on page 225.
305
20.9.
20.10.
The Smoke Detector requires two (2) 1.5V AA-size Alkaline batteries.
For more information and instructions about installing the Smoke Detector, see section 16.4 on page 244.
306
20.10.1
To remove the old batteries from the Smoke Detector, perform the following procedure.
1. Remove the mounting bracket from the device by turning the bracket counter-clockwise, as in
Figure 223 on page 245.
2. Pull the body straight out of the base.
3. Remove the batteries by pressing them slightly towards the negative () pole and extracting them,
one at a time.
20.10.2
To insert the new batteries into the Smoke Detector, perform the following procedure:
1. Install the new batteries as demonstrated in Figure 227 on page 248. Note that the correct polarity is
engraved onto the bottom of the battery compartment.
2. Return the Smoke Detector onto its mounting base.
For specific instructions for re-assembly of the Smoke Detector, see page 248.
The insertion of the battery into the SK triggers a bonding process in which the Smoke Detector
communicates with the Hub to re-instate it into the Hub peripherals inventory.
It is unnecessary to perform the Add Device process following battery replacement since the Smoke
Detector is already defined in the WeR@Home System.
20.11.
307
20.12.
The Smoke Detectors sensor is protected from dust and other particles with a metal filter.
It is recommended to clean the Smoke Detector:
Following the installation of the Smoke Detector
Prior to the power-up of the Smoke Detector
Annual maintenance
For more information and the instructions for cleaning the Smoke Detector, see section 16.5.1 on page
252.
308
Security Aspects
309
Appendix A
Term
3G
AES
API
APN
APNS
ASP
DIY
DMZ
DNS
ECOP
ECS
ESIX
FCC
FL
310
Description
3G is a short for 3rd Generation.
This is a term used to represent the 3rd generation of mobile telecommunications
technology.
Advanced Encryption Standard.
A specification for the encryption of electronic data in a symmetric-key encryption format
based on a design principle known as a substitution-permutation network, and is fast in
both software and hardware.
Application Programming Interface.
Access Point Name.
The name of a gateway between a GPRS (or 3G, etc.) mobile network and another
computer network, frequently the public Internet.
Apple Push Notification Service.
A service created by Apple Inc. that uses push technology through a constantly open IP
connection to forward notifications from the servers of third party applications to the
Apple devices; such notifications may include badges, sounds or custom text alerts.
Active Server Pages.
Microsoft's first server-side script engine for dynamically generated web pages.
Do-It-Yourself
Demilitarized Zone.
In computer security, a DMZ is a physical or logical sub-network that contains and exposes
an organization's external-facing services to a larger and untrusted network, usually the
Internet. The purpose of a DMZ is to add an additional layer of security to an organization's
local area network (LAN).
Domain Name System.
An Internet server naming system that enables using logical names for identifying servers.
An Essence Term.
Enhanced Controlled Open Protocol.
Essence proprietary bi-directional compressing and encrypting over-radio protocol.
An Essence Term.
Essence Connect Server.
An Essence Term.
The protocol used to send encrypted messages between WeR@Home CCUs and the
WeR@Home servers.
Federal Communications Commission.
An institute that regulates interstate (USA) and international communications via radio.
An Essence Term.
WeR@Home System User Guide
Term
FSK
FTP
GCM
IPD
JSON
KF
LSU
MGL/MGLS
Node (Unit
or module)
OS
PIR
RF
RFID
RIA
RSU
SHA-1
Description
A Flood Detector peripheral device.
Frequency-Shift Keying.
A frequency modulation scheme in which digital information is transmitted through
discrete frequency changes of a carrier wave.
File Transfer Protocol.
A standard network protocol used to transfer files from one host to another host over a
TCP-based network, such as the Internet.
Google Cloud Messaging.
GCM is a service that helps developers sending data from servers to their Android
applications on Android devices, or from servers to their Chrome applications and
extensions on Personal Computers.
GCM replaces a previous beta version of Android Cloud to Device Messaging (C2DM).
An Essence Term.
A Motion Indoor Photo Detector peripheral device. Also referred to as Camera.
JavaScript Object Notation.
An open standard format that uses human-readable text to transmit data objects
consisting of key:value pairs. It is derived from the JavaScript scripting language for
representing simple data structures and associative arrays, referred to as objects.
An Essence Term.
A Key Fob peripheral device.
An Essence Term.
Local Software Update.
An Essence Term.
An Indoor Magnetic Sensor peripheral device.
A Z-Wave Term.
Single module entity within the Z-Wave network (i.e. plug in switch, light dimmer,
controller, etc.). The main controller is typically node #1 and is also considered a device.
Operating System.
Software that manages computers basic functions.
An Essence Term.
A Motion Detector peripheral device.
Radio Frequency.
Radio-Frequency Identification.
A wireless, non-contact system using radio signals to transfer data from a tag attached to
an object for automatic identification.
Rich Internet Application.
Web application with many characteristics of desktop application software.
Typically delivered by way of a site-specific browser, a browser plug-in, an independent
sandbox, extensive use of JavaScript, or a virtual machine.
Remote Software Update
Secure Hash Algorithm.
311
Term
SIM
SK2
SMPP
SMS
SMSC
SMTP
SOAP
SRN
SSL
TR5
UT
UTC
VPN
Description
In cryptography, SHA-1 is a cryptographic hash function designed by the US National
Security Agency and published by the US NIST as a U.S. Federal Information Processing
Standard.
A small card placed in a mobile phone in order to identify the phone to the cellular carrier.
An Essence Term.
A Smoke Detector peripheral device.
Short Message Peer-to-Peer.
An open, industry standard protocol designed to provide a flexible data communication
interface for the transfer of short message data between External Short Messaging Entities
(ESME), Routing Entities (RE) and Message Centers.
A text message on a mobile device.
Short Message Service Center.
A cellular operators infrastructure for sending/receiving SMS messages.
When sending SMS messages, the user may connect directly to a providers infrastructure
for this purpose.
Simple Mail Transfer Protocol.
An Internet standard for email transmission.
Simple Object Access Protocol.
A protocol specification created for exchanging structured information in the
implementation of Web Services in computer networks.
An Essence Term.
An Indoor Siren peripheral device.
Secure Sockets Layer.
A protocol that provides secure communication over the Internet.
An Essence Term.
A Tag Reader wireless access control peripheral device.
An Essence Term.
A Universal Transmitter peripheral device.
Universal Time Coordinated.
The primary time standard by which the world regulates local clocks and time zones. It is
one of several closely related successors to Greenwich Mean Time (GMT).
Virtual Private Network.
VPN extends a private network across a public network, such as the Internet.
The Virtual Private Network enables a computer to send and receive data across shared or
public networks as if it were directly connected to the private network, while benefitting
from the functionality, security and management policies of the private network.
Table 34: Terms, Abbreviations and Acronyms
312
Appendix B
Definitions
The following terms will have the meaning ascribed to them in this EULA:
"The Company": Essence Security International (E.S.I.) Ltd.
"The System": Security systems or any control systems or any part thereof.
"Device": A mobile phone, personal computer, tablet or any other device or any other application interface that you
own and/or use and/or hold and/or control, which may enable access to third parties services and applications.
"Service Provider": an entity (excluding the Company) that provides you services and/or call center services and/or
other services that enable you to use the Service (as defined below).
The Company provides a user interface application (including any updates and/or upgrades and/or patches thereto) for
monitoring and/or controlling the System via your Device(s) (hereinafter, respectively, the "Application", and the "Service").
By using the Service, downloading the Application, installing or using the Application or any part thereof, you irrevocably agree
to the following terms and conditions (the "Terms and Conditions").
Certain information about you is subject to our Privacy Policy; for more information, see our full Privacy Policy at ADDENDUM A.
313
copyright law, trade secret law, trademark law, unfair competition law, and any and all other proprietary rights, and any and all
applications, renewals, extensions and restorations thereof, now or hereafter in force and effect worldwide. You agree that you
will not, and will not allow any third party to, (1) copy, sell, license, distribute, transfer, modify, adapt, translate, prepare
derivative works from, decompile, reverse engineer, disassemble or otherwise attempt to derive source code from the
Application or content that may be presented or accessed through the Application and/or the Service for any purpose, without
the express written consent of the Company, (2) take any action to circumvent or defeat the security or content usage rules
provided, deployed or enforced by any functionality (including without limitation digital rights management functionality)
contained in the Application and/or the Service, (3) use the Application and/or the Service to access, copy, transfer or
retransmit content in violation of any law or third party rights, or (4) remove, obscure, or alter the Company's copyright
notices, trademarks, logos or other proprietary rights notices affixed to or contained within or accessed in conjunction with or
through the Application and/or the Service.
b. USERNAME AND PASSWORD: In order to access and use the Application and/or the Service you must obtain a valid username
and password. You are solely responsible for maintaining the confidentiality of your username and password. For security
reasons and to avoid unauthorized access, you are required to logout in an orderly manner from the Application at the end of
each session. In any case, the Company shall not be liable for any damage or loss of any kind or nature incurred and/or suffered
by you and/or by any third party as a result of the Application and/or the Service being accessed and/or used by unauthorized
user/s.
c. TERMINATION: The License is effective until terminated by you or by the Company by written notice. Your rights under the
License will terminate automatically without prior notice from the Company if you fail to comply with any Terms and
Conditions, or if the term of the Service expires or terminates; in such event the Company may block you from using and/or
accessing the Application and/or the Service and you shall not have any claim against the Company in connection with such
restriction. Upon termination of the License, you shall cease all use of the Application and/or the Service, and destroy all copies,
full or partial, of the Application.
d. INDEMNITY: To the maximum extent permitted by law, you agree to defend, indemnify and hold harmless the Company, its
affiliates and their respective directors, officers, employees and agents from and against any and all claims, actions, suits or
proceedings, as well as any and all losses, liabilities, damages, costs and expenses (including attorneys fees) arising out of or
accruing from your use of the Application and/or the Service, including your downloading, installation, or use of the
Application and/or the Service, or your violation of the Terms and Conditions.
AND/OR THE SERVICE PROVE DEFECTIVE, YOU ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICING, REPAIR OR
CORRECTION.
b. YOU ARE SOLELY RESPONSIBLE FOR ANY DAMAGE TO YOUR DEVICE(S), OR LOSS OF DATA THAT RESULTS FROM USING
THE APPLICATION AND/OR THE SERVICE.
c. YOU EXPRESSLY UNDERSTAND AND AGREE THAT THE COMPANY CANNOT ASSURE AND TAKES NO RESPONSIBILITY THAT
SOME OR ALL OF THE INFORMATION SENT VIA THE APPLICATION AND/OR THE SERVICE WILL BE SENT AND/OR REACH THE
INTENDED RECIPIENT AND/OR NOT BE SENT AND/OR NOT REACH OTHER THIRD PARTIES, IN WHICH CASE THE COMPANY
WILL NOT BE LIABLE FOR ANY DAMAGE AND/OR LOSS OF ANY KIND OR NATURE INCURRED AND/OR SUFFERED BY YOU
AND/OR BY ANY THIRD PARTY AS A RESULT THEREOF.
d. YOU EXPRESSLY UNDERSTAND AND AGREE THAT THE COMPANY CANNOT ASSURE AND TAKES NO RESPONSIBILITY THAT
THE APPLICATION AND/OR THE SERVICE WILL SUCCESSFULLY ARM AND/OR DISARM THE SYSTEM AND/OR ANY PART OF THE
SYSTEM, IN WHICH CASE THE COMPANY WILL NOT BE LIABLE FOR ANY DAMAGE AND/OR LOSS OF ANY KIND OR NATURE
INCURRED AND/OR SUFFERED BY YOU AND/OR BY ANY THIRD PARTY AS A RESULT THEREOF.
e. YOU EXPRESSLY UNDERSTAND AND AGREE THAT THE INFORMATION GATHERED AND/OR STORED BY THE SYSTEM (THE
"INFORMATION") (INCLUDING BUT NOT LIMITED TO VIDEO SEGMENTS FILMED AND/OR STORED AND OR GATHERED BY THE
SYSTEM (THE "VIDEO SEGMENTS") (THE "INFORMATION" AND THE "VIDEO SEGMENTS" COLLECTIVELY TOGETHER: THE
"SYSTEM INFORMATION") IS STORED ON THE COMPANY'S SERVERS, AND IS THE SOLE PROPERTY OF THE COMPANY, AND
YOUR SERVICE PROVIDER MAY HAVE ACCESS TO SOME OR ALL OF THE INFORMATION (EXCLUDING THE VIDEO SEGMENTS).
HOWEVER, THE COMPANY WILL NOT REVIEW OR LET OTHER PARTIES REVIEW THE VIDEO SEGMENTS, WITHOUT YOUR PRIOR
CONSENT, EXCLUDING DISCLOSURE THAT IS REQUIRED BY LAW, REGULATION OR ORDER OF A COMPETENT AUTHORITY.
f. YOU EXPRESSLY UNDERSTAND AND AGREE THAT THE COMPANY CANNOT ASSURE AND TAKES NO RESPONSIBILITY FOR
MEASURES TAKEN AND/OR NOT TAKEN BY YOUR SERVICE PROVIDER IN ORDER TO PROTECT THE SYSTEM INFORMATION,
AND IN NO CASE WILL THE COMPANY BE LIABLE FOR ANY DAMAGE AND/OR LOSS OF ANY KIND OR NATURE INCURRED
AND/OR SUFFERED BY YOU AND/OR BY ANY THIRD PARTY IN CASE THE SYSTEM INFORMATION GATHERED AND/OR STORED
BY YOUR SERVICE PROVIDER IS EXPOSED TO THIRD PARTIES.
g. YOU EXPRESSLY UNDERSTAND AND AGREE THAT ALTHOUGH THE COMPANY WILL TAKE REASONABLE MEASURES IN
ORDER TO PROTECT THE SYSTEM INFORMATION STORED ON THE COMPANY'S SERVERS AND PREVENT PENETRATION OF
THE COMPANY'S SERVERS BY THIRD PARTIES, THERE IS A POSSIBILITY THAT SOME OR ALL OF THE SYSTEM INFORMATION
MAY, FOR WHATEVER REASON, WITHOUT THE COMPANY'S AND/OR YOUR SERVICE PROVIDER'S CONSENT, BE EXPOSED TO
THIRD PARTIES, IN WHICH CASE THE COMPANY WILL NOT BE LIABLE FOR ANY DAMAGE AND/OR LOSS OF ANY KIND OR
NATURE INCURRED AND/OR SUFFERED BY YOU AND/OR BY ANY THIRD PARTY AS A RESULT THEREOF.
315
c. The Application is designed to utilize your enabled cellular device to access the WeR@Home system. The device will work
only in areas where the cellular service has coverage and Company has no control over such coverage. Company is authorized
to record and maintain audio transmissions, data and communications, and shall be the exclusive owner of such property. You
are responsible for all permits and permit fees, if any, and agree to file for and maintain any permits required by applicable law
and indemnify or reimburse Company for any fines relating to permits. Should Company be required by existing or hereafter
enacted law to perform any service or furnish any material not specifically covered by the terms of this agreement you agree to
pay Company for such service or material. Company does not monitor signals and communications received by from your
enabled cellular device.
d. You acknowledge that signals which are transmitted over telephone lines, wire, air waves, internet, VOIP, or other modes of
communication pass through communication networks wholly beyond the control of Company and are not maintained by
Company and Company shall not be responsible for any failure which prevents transmission signals from reaching your Internet
enable device or damages arising therefrom, or for data corruption, theft or viruses to your Internet enabled device.
and/or the Service. The Company also reserves the right to terminate any or part of the Application and/or the Service at any
time on its sole discretion without prior notice.
Article IX MISCELLANEOUS
a. Your contractual relationship with your Service Provider and/or other third parties, including payment, delivery of goods or
services, and any other terms, conditions, privacy policies, warranties or representations associated with such dealings, are
solely between you and such provider and/or third party. You agree that the Company will not be responsible or liable for any
loss and/or damage of any kind or nature incurred and/or suffered by you and/or any third party as a result of the presence of
such provider and/or third parties on the Application and/or the Service.
b. These Terms and Conditions constitute the entire Agreement between you and the Company relating to the Application
and/or the Service and govern your use of the Application and/or the Service, and completely replace and supersede any prior
or contemporaneous agreements between you and the Company regarding the Application and/or the Service.
c. The failure of the Company to exercise or enforce any right or provision of these Terms and Conditions does not constitute a
waiver of such right or provision, which will still be available to the Company.
d. The provisions of these Terms and Conditions are independent of and severable from each other. If any provision is found to
be invalid or unenforceable for any reason, that provision shall be deemed modified to the extent necessary to make it valid and
operative, or if it cannot be so modified, eliminated, and the remainder of these Terms and Conditions shall continue in full
force and effect as if these Terms and Conditions had been signed with the invalid portion so modified or eliminated.
e. These Terms and Conditions and your relationship with the Company under these Terms and Conditions will be governed by
the laws of the State of Israel without regard to its conflict of laws provisions. You and the Company agree to submit to the
exclusive jurisdiction of the courts located within the Tel-Aviv district, Israel, to resolve any legal matter arising from these
Terms and Conditions.
317
collection and processing of such information and to the terms of this Privacy Policy. If you do not agree to the terms of this
Privacy Policy, you must not use the Application or Site.
This Privacy Policy may be amended or updated from time to time. If we make any material changes to this Privacy Policy, we will
post a notice of these changes on our website and in this Privacy Policy. You are advised to consult this Privacy Policy regularly
for any changes.
Information Collection
Personally Identifiable Information
In the course of using the Services, we might ask you to provide us with certain personally identifiable information that can be
used to contact or identify you ("Personal Information"). Personal Information may include, but is not limited to, your name,
country of residence, email address and website address.
Non-Personally Identifiable Information
When you use the Services (whether such use is performed on the System or a Device, on the Site or on a website of one of our
partners or other third parties), we collect information regarding your use of the Services, and information that your browser
sends whenever you visit a site or online service, including, without limitation, your computer's Internet Protocol (IP) address,
browser type, the web page you were visiting before, and information for which you search.
When you use a widget or any other tool offered by us, whether on the System or a Device, on the Site or on a third party
website, including a website owned or operated by you, we may record data related to that activity, the deployment of the
widget or tool and any other account related data.
Like many websites, we use "cookies" to collect information. A cookie is a small data file that we transfer to your computer's
hard disk for record-keeping purposes. You can instruct your browser, by changing its options, to stop accepting cookies or to
prompt you before accepting a cookie from the website you visit. If you do not accept cookies, however, you may not be able
to use all portions of the Site or all functionality of the Services.
We may present links in a format that enables us to keep track of whether these links have been followed.
Third Party Sites
This Privacy Policy applies only to Services provided on the System or a Device under your control, or on the Site. The Site may
include links and references to the websites of others or third party advertises. These other sites may place their own cookies or
other files on your computer, collect data or solicit personal information from you. Other websites follow different rules
regarding the use or disclosure of the Personal Information that you submit. We encourage you to read the privacy policies and
other terms of the other websites. We do not review, approve, monitor, endorse, warrant, or make any representations with
respect to such websites. In no event will we be responsible or liable, directly or indirectly, to anyone for any loss or damage
arising from such sites, including without limitation for your use of such website and for any information submitted by you, or
otherwise collected by such websites.
1. Our Policy towards Children
We do not knowingly collect personally identifiable information from children under the age of 18. If a parent or guardian
becomes aware that his or her child has provided us with Personal Information without their consent, he or she should contact
us at info@essence-grp.com. If we become aware that a child under 18 has provided us with Personal Information, we will delete
such information from our files.
2. Security
We are concerned with safeguarding your information. We employ a variety of safety measures designed to protect your
information from unauthorized access and disclosure. However, we cannot guarantee that your personal information or private
communications will always remain private and secure.
318
319
Technical Specifications
Appendix C
Technical Specifications
The following are the technical specifications for the Hub and peripheral devices described in this User
Guide.
NOTE: The full part number is required when ordering components. Contact the
Essence Account Manager or Professional Services Personnel to receive the part
numbers.
Security
Data Security 128-bit AES encryption
Unique electronic serial number
Power Consumption
100-240VAC to 5VDC Power Adapter/Charger and 3.7V/1.4Ah Li-polymer rechargeable backup
battery
Maximum five (5) hours battery life
Dimensions
Size: H: 40.8mm (1. 61in.), L: 141mm (5.55in.), W: 74.8mm (2.94in.)
Weight: 125 grams (0.27lbs.) + 35 grams (0.08lbs.) backup battery
LAN cable: UTP unshielded twisted-pair cable, maximum length 3 meters (10 feet)
320
Technical Specifications
Environment
Storage Ambient Temperature range: -20oC +60oC (-4oF +140oF)
Operating Ambient Temperature range with battery: -5oC +50oC (+23oF +122oF)
Humidity: Up to 95% non-condensing
Certification
FCC
IC
Y4I-ES8000CP
YXG-ES8000GP
Comments
no cellular version
11061A-ES8000GP
Security
4G DragonFlyEye technology
Tamper Alarm when unit is tilted
Temperature compensation for the Motion Detector element
Optional up to 30Kg (66lb.) pet immune lens
Detection Range up to 12m (39.4ft.)
Image Capture
Captures color Motion-JPEG photos (up to 5 frames per second)
Resolution for comfort video: 320x240
Resolution for security video: 256x192
321
Technical Specifications
Power Consumption
Three (3) AA-size alkaline batteries
One-year battery life
Optional 5VDC power adapter
Dimensions
Size: H: 60mm (2.36in.), L: 122.7mm (4.84in.), W: 58mm (2.36in.)
Weight: 160 grams (0.35lbs.) + 45 grams (0.1lbs.) batteries
Environment
Storage Ambient Temperature range: -20oC +50oC (-4oF +122oF)
Operating Ambient Temperature range with battery: 0oC +50oC (+32oF +122oF)
RF transmitter humidity: Up to 95% non-condensing
Certification
FCC
IC
Y4I-M800IPD
11061A-ES800IPD
Comments
322
Technical Specifications
Security
4G DragonFlyEye technology
Tamper Alarm
Temperature compensation for the Motion Detector element
Optional up to 30 Kg (66lb.) pet immune lens
Detection Range up to 12m (39.4ft.)
Power Consumption
Two AA-size alkaline batteries
Three-year battery life
Dimensions
Size: H: 50mm (1.97in.), L: 114mm (4.49in.), W: 60mm (2.36in.)
Weight: 90 grams (0.2lbs.) + 30 grams (0.07lbs.) batteries
Environment
Storage Ambient Temperature range: -20oC +50oC (-4oF +122oF)
Operating Ambient Temperature range with battery: 0oC +50oC (+32oF +122oF)
RF transmitter humidity: Up to 95% non-condensing
Certification
FCC
IC
Y4I-M800PIR
11061A-ES800PIR
Comments
323
Technical Specifications
Power Consumption
One AA-size alkaline battery
Maximum two-year battery life
Dimensions
Detector
Size H: 25mm (0.98in.), L: 72mm (2.83in.), W: 30mm (1.18in.)
Weight 25 grams (0.55lbs.) + 15 grams (0.33lbs.) battery
Magnet
Size H: 18mm (0.71in.), L: 52mm (2.05in.), W: 24mm (0.94in.)
Weight 25 grams (0.55lbs.)
Environment
Storage Ambient Temperature range: -20oC +50oC (-4oF +122oF)
Operating Ambient Temperature range with battery: 0oC +50oC (32oF +122oF)
RF transmitter humidity: Up to 95% non-condensing
Certification
FCC
IC
Y4I-M800MGL
11061A-ES800MGL
Comments
Siren ES800SRN
Communication
Maximum RF range 500m (1640 ft.) open air
ECOP bi-directional radio protocol
Modulation and Frequency: DSSS, 2.4GHz
Data Security 128bit AES encryption
324
Technical Specifications
Security
Tamper Alarm if removed from back bracket
Power Consumption
Four AA-size alkaline batteries
Two-year battery life
Dimensions
Size: H: 39mm (1.54in.), Diameter: 120mm (4.72in.).
Weight: 150 grams (0.33lbs.) + 100 grams (0.22lbs.) batteries
Environment
Storage Ambient Temperature range: -20oC +50oC (-4oF +122oF)
Operating Ambient Temperature range with battery: 0oC +50oC (32oF +122oF)
RF transmitter humidity: Up to 95% non-condensing
Certification
FCC
IC
Y4I-M800SRN
11061A-ES800SRN
Comments
325
Technical Specifications
Power Consumption
One 3V CR2450 lithium battery
Three-year battery life
Dimensions
Size: H: 12.3mm (0.48in.), L: 87.3mm (3.44in.), W: 61mm (2.40in.)
Weight: 25 grams (0.055lbs.) including the battery
Environment
Storage Ambient Temperature range: -10oC +55oC (14oF +131oF)
Operating Ambient Temperature range with battery: -5oC +55oC (23oF +131oF)
Humidity: Up to 95% non-condensing
Certification
FCC
IC
Y4I-M801EKFB
11061A-ES800KFB
Comments
Security
Tamper Alarm when detached from wall
326
Technical Specifications
Power Consumption
Three AA-size alkaline batteries (Reader only)
One year battery life
Dimensions
Reader
Size: H: 27.6mm (1.09in.), L: 97.8mm (3.85in.), W: 97.8mm (3.85in.)
Weight 135 grams (0.3lbs.) + 45 grams (0.1lbs.) batteries
Tag
Size: H: 9.9mm (0.39in.), L: 46.7mm (1.84 in.), W: 33.4mm (1.31in.)
Weight 10 grams (0.02lbs.)
Environment
Storage Ambient Temperature range: -20oC +50oC (-4oF +122oF)
Operating Ambient Temperature range with battery: 0oC +50oC (+32oF +122oF)
RF transmitter humidity: Up to 95% non-condensing
Certification
FCC
IC
Comments
YXG-ES800TR5
11061A-ES800TR5
(In lab.)
327
Technical Specifications
Power Consumption
One AA-size alkaline battery
Two-year battery life
Dimensions
Transmitter
Size H: 29.2mm (1.15in.), L: 71.9mm (2.83in.), W: 24.6mm (0.97in.)
Weight 25 grams (0.55lbs.) + 15 grams (0.33lbs.) battery
Detector
Size H: 22.4mm (0.88in.), D: 49.9mm (1.96in.)
Weight 25 grams (0.55lbs.)
Cable length 30cm (11.8in.)
Environment
Storage Ambient Temperature range: -20oC +50oC (-4oF +122oF)
Operating Ambient Temperature range with battery: 0oC +50oC (32oF +122oF)
RF transmitter humidity: Up to 95% non-condensing
Certification
FCC
IC
Comments
YXG-ES800FL
11061A-ES800FL
(In lab.)
328
Technical Specifications
Safety
Tamper alarm
Mechanism prevents installation without battery
Alarm operates even if the Hub is not functional Safety Spec
Power Consumption
Two AA-size alkaline batteries
Over two years battery life
Dimensions
Size: H: 46.7mm (1.84in.), Diameter: 135mm (5.32in.)
Weight 210 grams (0.46lbs.) including batteries
Environment
Storage Ambient Temperature range: -20oC +50oC (-4oF +122oF)
Operating Ambient Temperature range with battery: 0oC +50oC (32oF +122oF)
RF transmitter humidity: Up to 85% non-condensing
Certification
EN14604
FCC
IC
YXG-ES800SK
11061A-ES800SK
Comments
329
Technical Specifications
Power Consumption
One AA-size alkaline battery
Two-year battery life
Dimensions
Size: H: 29.3mm (1.15in.), L: 71.9mm (2.83in.), W: 24.6mm (0.97in.)
Weight 25 grams (0.55lbs.) + 15 grams (0.33lbs.) battery
Cable length 30cm (11.8in.)
Environment
Storage Temperature:-20oC +50oC (-4oF+122oF)
Operating Ambient Temperature range with battery: 0oC +50oC (32oF +122oF)
Humidity: Up to 95% non-condensing
Certification
FCC
IC
Comments
YXG-ES800UT
11061A-ES800UT
(in lab.)
HD Camera ES800HDC
NOTE: The availability of the HD Camera option is based on your specific customer
engagement model.
Communication
WiFi: 802.11 b/g/n
Ethernet: One 10 / 100 Mbps RJ-45
Supports Protocols: TCP/IP<DNS,SMTP,FTP,HTTP, etc.
WiFi setting using WPS button
Remote firmware update
330
Technical Specifications
Security
Privacy button (with LED)
Video is encrypted from camera to Mobile Application / Hub
Image Capture
WiFi HD (720p) IP Camera
View live video stream in HD/SD using the mobile app
Privacy button (with LED)
Manual focus on the lens
Indoor use
Installation on a flat surface or a wall
Video
Auto Exposure Control
Auto White Balance
Auto gain Control
Image Compression Format: H.264/MPEG4/MJPEG
Audio
2-way audio / Built-in MIC / Built-in Speaker
331
Technical Specifications
Power Consumption
Power Supply: DC 12V/1A
Dimensions
Length: 33 mm
Width: 69 mm
Height: 103 mm
Environment
Operating Temperature : 0C ~ 50C ( 32F~122F )
Operating Humidity : 10% ~ 80%
Security
Data Security 128-bit AES encryption
Unique electronic serial number
332
Technical Specifications
Dimensions
Z-Wave controller: H: 5mm (0.2in.), L: 58mm (2.28in.), W: 24mm (0.94in.)
Cable length: 15cm (5.9in.)
Z-Wave controller: 10 grams (0.03lb.)
Environment
Storage Temperature: -20oC +50oC (-4oF+122oF)
Operating Ambient Temperature range: 0oC +50oC (+32oF +122oF)
Humidity: Up to 95% non-condensing
Certification
FCC
IC
YXG-ES800ZWD
11061A-ES800ZWD
Comments
333
Appendix D
Table 35 below describes the equipment required to complete the WeR@Home System installation. The
equipment is included in the WeR@Home kit along with the Hub and components provided by the
Service Provider.
Product
LAN Cable
Power Adapter
Description
Local Area Network (LAN) cable (Category 5).
A twisted-pair cable for carrying the wired data
communication signals. The cable is used for
connecting the Hub to an Internet port via a
switch, router, etc.
A Universal Switching adapter that converts AC
power voltage into DC power required by the
Hub. The adapter includes an electrical cord with a
mini-USB connector, providing the Hub with the
power required for proper operation.
Coin Battery
334
Device
Remote Control
Siren
Motion Detector
Camera Detector
Door/Window
Sensor
Tag Reader
Smoke Detector
Flood Detector
Universal
Transmitter
Essence Part
No.
ES800KFB
ES800SRN
ES800PIR
ES800IPD
ES800MGL
ES800TR5
ES800SK
ES800FL
ES800UT
Quantity
Voltage
Type
Chemistry
Approved Manufacturer
Committed Lifetime
1
4
2
3
1
3V
1.5V
1.5V
1.5V
1.5V
CR2450
AA
AA
AA
AA
Lithium
Alkaline
Alkaline
Alkaline
Alkaline
Energizer, Duracell, GP
Energizer, Duracell, GP
Energizer, Duracell, GP
Energizer, Duracell, GP
Energizer, Duracell, GP
Maximum: 3 years
Maximum: 2 years
Maximum: 3 years
Maximum: 1 year
Maximum: 2 years
3
2
1
1
1.5V
1.5V
1.5V
1.5V
AA
AA
AA
AA
Alkaline
Alkaline
Alkaline
Alkaline
Energizer, Duracell, GP
Energizer, Duracell, GP
Energizer, Duracell, GP
Energizer, Duracell, GP
Maximum: 1 year
Maximum: 2 years
Maximum: 2Years
Maximum: 2 years
335
Appendix E
Except for the Hub and the Remote Control, as well as the Z-Wave Extender, all WeR@Home devices
have the option to be installed with screws.
Table 37 below is a summary of Essence recommendations regarding these optional parts.
Product
Camera Detector
Motion Detector
Door/Window Sensor
Siren
Tag Reader
Flood Detector
Smoke Detector
Universal Transmitter
HD Camera*
Components
Quantity
per
Device
Screw Type
Dowel Type
2-4
2-4
Transmitter
Magnet
3
4
Transmitter
Sensor
2-4
2
2
* - The availability of the HD Camera option is based on your specific customer engagement model.
336
Appendix F
The devices in the WeR@Home Web Application are represented by icon images. The icon images are
enhanced with properties that depict their status.
Basic Device Icons: See Table 38 below.
Z-Wave Devices: See Table 39 on page 338.
Colored Device Icons: See Table 40 on page 338.
Combined Device Icons: See Table 41 on page 339.
Table 38 below shows the icon images for the devices and other objects presented in the WeR@Home
Web Application.
WeR@Home Hub
Remote Control
Camera Detector
Siren
Motion Detector
Door/Window Sensor
Flood Detector
Smoke Detector
Tag Reader
Tag
Universal Transmitter
Z-Wave Extender
Master User
Standard User
HD Camera
Note: The availability of the HD Camera
option is based on your specific customer
engagement model.
Table 38: Device Icons in the WeR@Home Web Application
337
Table 39 below shows three (3) device icons used to represent the Z-Wave devices in the Smart Home
and Scenarios pages:
The device icons are altered by additional properties to represent the status of the device. The Icon color
can change according to the reported event/status of the device. For example, a device icon is displayed
as Red following a reported Tamper event.
Table 40 below shows a list of altered device icons with the respective status explanation.
APN failure
APN restored
Connection restored
Low battery
Low Connection
338
The status of a device can be presented by the combination of the device icon and an additional icon, as
shown in Table 41 below.
Power failure
Power restored
339
Appendix G
The WeR@Home System is designed to accommodate a maximum number of peripheral devices that can
be configured in a single WeR@Home System.
The WeR@Home Hub can support up to a total of 64 devices as detailed in Table 42 below:
Essence
P/N
Number of devices
Camera Detector
Motion Detector
Door/Window Sensor
Siren
Remote Control
Tag Reader
Smoke Detector
Flood Detector
Universal Transmitter
Z-Wave Extender
HD Camera*
Users
ES800IPD
ES800PIR
ES800MGL
ES800SRN
ES800KFB
ES800TR
ES800SK
ES800FL
ES800UT
ES800ZWD
ES800HDC
Up to 8
Up to 64 total Security
Up to 64 total Security
Up to 3
Up to 8
Up to 8 in total Security. Up to total of 8 Tags
Up to 16 (total Safety)
Safety
Devices
Item
* - The availability of the HD Camera option is based on your specific customer engagement model.
Total number of supported peripheral devices is dependent on the number of other peripheral devices
already installed in the system.
For example:
If there are two Sirens installed in the WeR@Home System, the Hub can accommodate only 62
more devices.
If there are four Motion Detectors and two Remote Control devices installed in the WeR@Home
System, only 58 more devices can be installed in the system.
340
Out of the 32 possible Users, the WeR@Home System designates up to two (2) Master Users. Master
Users are granted privileges to change the system setup, such as:
Add a device
Remove a device
Add a user
Remove a user
A minimum of one Master User must be defined to allow the initial setup and control of the WeR@Home
System.
For more information about managing users, see section 19.4 on page 293.
341
Port Checking
Appendix H
Port Checking
342
Port Checking
NOTE: For Windows 7, make sure the Telnet feature is enabled. For information
about enabling the Telnet feature, see Appendix I below.
343
Appendix I
button.
344
Owners Records
Appendix J
Owners Records
Table 43 below is a worksheet for the End User who is the WeR@Home System owner to record a list of all
the vital information required for installation of the WeR@Home System.
Numbered
Item
1
Item
Data
User Email
User Password
User Name
APN Name
APN User
APN Password
10
345