Functions - Alarm System

RFID Funktion for logging in and operating with RFID keys.

The BERGHOCH Funk alarm system is equipped with the world's most widely used contactless chip technology MIFARE. The alarm system can therefore be easily activated and deactivated with MIFARE transponders (chip / card). This is a particularly practical solution if other MIFARE applications (e.g. access control, locks) are already in use, since the same keys (chips / cards) can be used.

24h schedule to program the alarm system status, organize your daily routine and secure your home.

You have the option of automatically activating and deactivating the BERGHOCH alarm system using a time schedule. Simply set an automatic schedule for each day of the week.

Up to 99 sensors can be connected.

The BERGHOCH alarm system can be expanded at any time. Use up to 99 sensors for security around your home. From the keypad for access control to smoke detectors, water detectors, motion detectors to gas detectors and many other sensors.

Android and iOS app for operation and alarm warning via mobile phone.

Every BERGHOCH Funk alarm system can be easily switched on and off using the app. Just search for "868 Alarm" in the stores and download our APP for free.

868 MHz security frequency for a secure connection between the alarm system and transmitter.

The 868 MHz frequency is specially reserved for security applications such as alarm systems. Many other Funk systems such as garage door openers, baby monitors, car keys and remote controls work in other frequency ranges - for example 433 MHz. Funk interference occurs increasingly in this frequency range. By using the 868 MHz frequency, we rule out such interference.

The alarm system works according to the ASK encryption standard and is protected against external influences (sniffer / jammer) by a code that is always re-assigned.

Rolling code for a safe home and protection against attacks.

The BERGHOCH alarm system uses a so-called rolling code algorithm for sending and receiving signals.

The hand transmitter and alarm system, for example, have the same master code. The rolling code is continuously generated from this with the help of an algorithm. Only this temporary rolling code is sent and not the master code. This way no one can intercept and use the master code.

The actual master code is never sent, but an ever new rolling code and your alarm system remains safe from attacks by hackers.