Language:
MotionCam (PhOD) Jeweller

MotionCam (PhOD) Jeweller

Wireless IR motion detector supporting photo by alarm, photo on demand, photo by schedule, and photo by scenario features

Lightning-fast alarms. Verified.

MotionCam (PhOD) Jeweller has a built-in camera that takes photos once the detector is triggered. It needs just 9 seconds to show the actual situation on the scene. With visual evidence available in Ajax apps, the security company can quickly verify the threat and respond accordingly. Photo verification relieves users of unnecessary anxiety and prevents security companies from false patrol calls. Users can take an on-demand photo with a single tap to monitor their house's state at any time. The detector can also automatically take photos by an alarm of another device in the system and by a specific schedule.

Discover PhOD detectors

Introducing motion detectors supporting photo by alarm, photo on demand, photo by schedule, and photo by scenario features

Watch on Youtube

Key features

Motion detection distance

Up to 12 m

motion detection distance

Horizontal viewing angle

Vertical viewing angle

Vertical viewing angle

Horizontal viewing angle

4 types of photo verification

Photo by Alarm

Photo on Demand

Photo by Scenario

Photo by Schedule

9 seconds

to deliver the first photo1

HDR technology for clear photos2

HDR

Software algorithm to prevent false alarms

SmartDetect

Remote control and configuration

Remote configuration

Pet immunity

Pet immunity

Up to 5 years

with pre-installed batteries

Pre-installed batteries

Photo privacy protection

Up to 1,700 m

communication range with an Ajax hub or range extender3

Informative push notifications

Ajax logo
10:00

Critical

Ajax

Warehouse: Motion detected, MotionCam (PhOD) in Storage area

Ajax logo
10:00

Ajax

Office: Lid is closed, MotionCam (PhOD) in Hall

IR backlight

for low-light conditions

IR backlight

Jeweller and Wings radio communication

Jeweller and Wings radio communication

Power adjustment

Temperature compensation

Temperature compensation

for effective detection in heat and cold

Two colors

Colors

Hassle-free installation

1

QR code

2

SmartBracket

3

App

Device compatibility

In an Ajax system, you can combine devices of all product categories: Intrusion protection (both Superior and Baseline), Video surveillance, Fire and life safety, or Comfort and automation. Create the system to suit your needs and manage it in a single interface.

Awards

asial

Wherever there is a risk of intrusion

Office

Office

Store

Store

Educational institution

Educational institution

Warehouse or manufacturing

Warehouse or manufacturing

Cafe

Cafe

Museum

Museum

Apartment

Apartment

Peace of mind on demand

The detector needs just a few seconds to show the actual situation on the scene and dispel the user's doubts in case of an alarm. It takes a click in the Ajax app to take an on-demand photo. Also, it can automatically take photos by schedule and when another detector in the system is triggered.

Privacy first

Detailed event log

Detailed event log

The event log records 500 recent events within the system. The data is explicit with the device, time, and event description. On-demand photos are linked to the user who requested them. Photos can be received only by users with the Photo on Demand access. Security companies do not receive the photos.

Strict permission distribution

Strict permission distribution

The Privacy menu in Ajax apps helps accurately adjust access to visual data for users and security company operators: who and when can request a photo, which detector can take on-demand photos, and who can view the received pictures or streams from integrated surveillance cameras.

Encryption and GDPR

Encryption and GDPR

Photos are encrypted at every stage of transmission. Only system users can access the virtual Ajax Cloud storage and view photos. While stored, no photos are processed or analyzed. The Ajax Cloud service is hosted on geographically distributed servers that meet the General Data Protection Regulation (GDPR) requirements.

Privacy first

The Ajax product portfolio includes motion detectors without Photo on Demand, Photo by Schedule, and Photo by Scenario functions. These detectors support visual alarm verification and do not feature PhOD in their names.

Discover future-proof hardware

Fresnel lens

Fresnel lens

PIR sensor

PIR sensor

Camera

Camera

IR backlight

IR backlight for low-light conditions

Pre-installed batteries

Pre-installed batteries

Tamper

Tamper

Jeweller and Wings antennas

Jeweller and Wings antennas

SmartBracket

SmartBracket mounting panel

No intruder goes unnoticed

PIR sensor

All Ajax motion detectors use PIR sensors by Excelitas Technologies — a field-leading American manufacturer specializing in designing and producing optronic components since 1931. Ajax Systems constantly proves the sensor's superior quality at the production stage: we test 100% of manufactured devices. Wrapped into Ajax technologies, it brings the utmost accuracy of intrusion detection.

PIR sensor

Special lens

The pattern of the Fresnel lens sections is designed to differentiate between the IR diagrams of a human, animal, and thermal noise. Large lens sections capture radiation at an adult's head and torso level. Smaller sections make the diagram more detailed. The lens provides the detector with accurate information about the thermal object in the detection zone and the nature of its movement.

Special lens

Thermal interferences filter

SmartDetect

We processed thousands of thermal patterns caused by humans, animals, and the environment to develop the SmartDetect software algorithm. In armed mode, the detector constantly analyzes the thermal diagram from the PIR sensor, including the IR radiation intensity, thermal spot size, movement speed, time spent in the detection zone, and other parameters. The algorithm identifies false alarm markers instantly and with high accuracy. As a result — the detector accurately responds to human motion without false alarms.

Size
Detection size

False alarm

Real alarm

Speed
Detection speed

False alarm

Real alarm

Intensity
IR radiation intensity

False alarm

Real alarm

Temperature compensation

Temperature compensation is a software mechanism keeping the thermal diagram contrast even if the ambient temperature is close to the temperature of the human body. With each ambient temperature measurement, the detector corrects the PIR sensor data according to the coefficient table stored in its memory. The detector is effective over the entire operating temperature range.

Temperature compensation

Sensitivity level

The detector can adapt to the conditions of a particular facility, considering possible thermal interference or pets. The sensitivity setting changes the set of markers by which false alarms are filtered. Low sensitivity makes the detector less likely to respond to an active pet. A high sensitivity will raise the alarm in case of any motion in the detection zone.

Sensitivity level

Professional installation

With the correct installation at the height of 2.4 m and lens direction perpendicular to an alleged intrusion path, the detector provides an accurate thermal diagram and pet immunity. It instantly responds to a real threat, minimizing false alarms caused by animals weighing up to 20 kg and below 50 cm in height.

Professional installation

Stable operation with pre-installed batteries

MotionCam (PhOD) Jeweller comes equipped with pre-installed batteries, boasting a remarkable 5-year lifespan. Ajax apps proactively notify both the monitoring company and users of a low battery level a couple of months in advance. The batteries are replaceable, allowing the installer to simply swap them out after five years. Thanks to the batteries, MotionCam (PhOD) Jeweller functions independently of the facility’s power grid.

Up to 5 years of operation from pre-installed batteries

Low battery level warning

Replaceable CR123A batteries

Batteries
Unique wireless technology

Jeweller | Wings

Unique wireless technologies

MotionCam (PhOD) uses Jeweller and Wings proprietary radio protocols for reliable communication

Up to 1,700 m of radio communication3 with a hub or range extender

Encrypted two-way radio communication

Notifications about jamming and connection loss

9 seconds1 to deliver the first photo

Scaled and comprehensive

ReX 2 Jeweller range extender boosts the range of all Ajax devices and manages their communication with the hub via Jeweller. It also assures stable communication through steel and concrete via Ethernet using the wire as the additional communication channel. Up to 5 range extenders can operate within one Ajax system to expand the network twice as big, covering multistorey buildings with underground parking and basements.

Up to 5 range extenders within one system

Ethernet as an alternative communication channel

System supervision

All Ajax devices perform automatic self-diagnosis and report their states to the hub. Essential parameters, including tamper, communication, power supply, and sensor statuses, are continuously monitored. The Ajax Cloud server controls communication between the hub and Ajax apps, ensuring instant notifications for ARCs, security companies, and users. In case of any malfunction or communication failure, an engineer is informed immediately to provide necessary services.

Automatic device self-diagnosis with status report

Regular polling to display the current device state on apps

Instant maintenance notifications

System supervision

Sabotage-resistant

Tamper alarm

Tamper alarm

The enclosure has a tamper button, which notifies the security company and users once the device is dismantled from the mount.

Data encryption

Data encryption

All data the system stores and transmits is protected by a block cipher with a dynamic key. Encryption makes it extremely difficult to reprogram the device, replace or steal the data.

Data-rich notifications

Data-rich notifications

The Ajax system instantly notifies about alarms and events with informative notifications: security companies and users know exactly which device triggered, when and where it happened.

Device authentication against spoofing

Device authentication against spoofing

The hub checks the device's unique parameters for authentication during each communication session. If any parameter fails the check, the hub ignores device commands.

Regular polling

Regular polling

The device regularly exchanges data with the hub. The system controls each device state and reports if there is a malfunction or connection loss.

Communication failure detection

Communication failure detection

The device regularly exchanges data with the hub. With maximum ping interval settings available (3 data packages once in 12 seconds), it takes only 36 seconds to identify communication loss and notify the security company and users about the incident.

Effortless installation and setup

MotionCam (PhOD) is ready to operate straight out of the box. Using the SmartBracket panel, an installer can effortlessly mount the device on the wall, eliminating the need to disassemble the enclosure. Ajax apps help quickly make the device a part of the ecosystem: simply pair the device with the hub by scanning the QR code. It can always be reconfigured remotely without the need for on-site visits.

Pairing with the hub via QR code

Connection

SmartBracket panel — no need to disassemble the enclosure

Installation

Configuring and testing in mobile and desktop apps

Setup

PRO Desktop app for macOS and Windows

Monitoring
  • 1 With default settings (photo resolution is 320 × 240 px).
  • 2 The HDR image feature is available for devices with the 15.59.35.14 firmware version or later. Сontact your Ajax Systems manager, supplier, or authorized partner to check the availability in your region.
  • 3 In an open space.

Ajax product categories

In an Ajax system, you can combine devices of all product categories: Intrusion protection (both Superior and Baseline), Video surveillance, Fire and life safety, or Comfort and automation. Create the system to suit your needs and manage it in a single interface.

Wireless motion detectors with photo verification in the security system

Motion sensors of the security system are designed to record the fact of unauthorized entry into the property under security. When the motion sensor is activated, its signal is transmitted to the alarm central via a wire or radio signal, depending on the type of system.

How motion sensors work

Motion sensors analyze microwave, ultrasonic, infrared and radio type radiation. If movement was noticed in the room, the sensor detects changes in the parameters of incoming waves and activates a certain reaction to the event. When triggered, the motion sensor sends data to the alarm control panel, informs the user, and initiates the activation of the siren.

Types of motion sensors

Motion sensors differ in:
  1. The type of reaction to alarm: these are ultrasonic devices, infrared, microwave and combined type.
  2. Place of installation: outdoor and indoor devices.
  3. Data transmission method — wireless or wired system.
  4. Wave processing and creation mechanism — active and passive models that process radiation at the input.

How to choose a motion sensor for a security system

In order to choose a motion sensor for alarming correctly, it is worth considering the features of the devices:
  • First you need to choose the type of installation of the motion sensor — on the wall or ceiling. With the choice of location, the installation engineer will best help.
  • The presence of immunity to animals, which helps to avoid false alarms on pets.
  • Energy consumption level — the amount of electricity that the sensor consumes.
  • The angle and radius of detection — this determines how large a territory the motion sensor can control.
  • Customizable — adjusting the weight and height of the object to which you want to respond.
  • The speed of the motion sensor's response to an alarm.
  • Case protected from opening and damage.

Wireless motion sensor from Ajax Systems — MotionCam (PhOD)

MotionCam (PhOD) is a wireless motion sensor from Ajax. MotionCam (PhOD) for indoor installation detects movement in a guarded room and allows you to take photos from the scene not only on alarm, but also on request. The MotionCam (PhOD) Jeweller motion sensor will show the current situation at the guarded object in seconds and dispel doubts in the event of an alarm. You can request a photo in one click in the Ajax application. Also, the sensor will automatically take a series of photos if it detects movement or a FireProtect 2 (Heat/Smoke) or FireProtect 2 (Heat/Smoke/CO) fire detector is triggered.

The principle of operation of the wireless motion sensor for MotionCam alarm (PhOD)

MotionCam indoor wireless motion sensor (PhOD) works with Ajax security system. The internal motion sensor communicates with the system control panel at a distance of up to 1700 meters, using two secure radio protocols — Jeweller for transmitting events and alarms and Wings. The second protocol is responsible for the transfer of photo data from the scene. MotionCam (PhOD) Jeweller is a wireless indoor motion sensor with photo verification support. The device detects movement in a guarded room using an IR sensor and detects moving objects with a temperature close to that of a human body. After the sensor detects movement, the built-in camera takes a series of pictures. Thus, the user can evaluate the event in dynamics. When the MotionCam wireless motion detector (PhOD) is triggered, the event is transmitted to the security system control panel, which starts scripts, turns on sirens, informs users and the security company about the alarm. Each MotionCam (PhOD) Jeweller motion sensor is recorded in the notification feed of the Ajax application. The alarm message also contains the room in which the sensor was triggered, the name of the control panel and the name of the device.

Photo on request

The MotionCam Motion Sensor (PhOD) Jeweler allows users to take pictures using the built-in cameras. Using the function, you can check the situation at the facility or simply monitor the condition of the house. Depending on the settings, a photo can be taken at any time or when motion sensors with alarm photo verification are armed. By default, Photo on Demand is disabled for system users. Users with the right to manage privacy settings (control panel settings, Privacy item) determine who can take and view on-demand photos, as well as which photo-verified sensors can be used for shooting. PRO-users of the system cannot manage privacy settings, but can take photos on demand if they have been granted such a right. Privacy settings do not apply to photos taken by sensors during an alarm. Event photos can be seen by all system users who have access to the system control panel's event feed.

Photo according to the scenario

The "Photo by scenario" function allows you to create a scenario for motion sensors of the MotionCam series, according to which they will take pictures when other Ajax devices are alarmed. By default, Scripted Photo is disabled for all motion sensors. The feature can be enabled by a user with access to privacy settings. Users of PRO applications cannot manage privacy settings, but they can grant this right to system users. In the system settings, you can also specify when the photo-verified sensor can take pictures according to the scenario: when the MotionCam (PhOD) Jeweler is armed or at any time. Scenario photos are available to all users of the security system who have access to the event feed. A photo event when other devices are alarmed is sent to the control panel of the security company.

Photo according to the scenario

The "Photo by scenario" function allows you to create a scenario for motion sensors of the MotionCam series, according to which they will take pictures when other Ajax devices are alarmed. By default, Scripted Photo is disabled for all motion sensors. The feature can be enabled by a user with access to privacy settings. Users of PRO applications cannot manage privacy settings, but they can grant this right to system users. In the system settings, you can also specify when the photo-verified sensor can take pictures according to the scenario: when the MotionCam (PhOD) Jeweler is armed or at any time. Scenario photos are available to all users of the security system who have access to the event feed. A photo event when other devices are alarmed is sent to the control panel of the security company.

Features of MotionCam Wireless Indoor Motion Detector (PhOD)

The MotionCam motion sensor (PhOD) has a number of the following features:

Working with Jeweler and Wings data transfer protocols

The sensor uses Jeweler technology for alarm and event transmission, and Wings for photo transmission. These are two-way wireless communication protocols that provide fast and reliable communication between a system control panel or repeater and connected system devices. The protocols support floating-key block encryption and device recognition at every communication session to prevent sabotage and sensor substitution. It is possible to control communication with system devices and their statuses in Ajax applications thanks to the central sensor polling system with a frequency of 12 to 300 seconds. The polling frequency is set by the user or PRO with administrator rights individually.

Photo delivery time

The alarm message is transmitted instantly. The time it takes for images to be delivered to the Ajax application depends on the Wings signal strength, Internet connection speed, image resolution, and connection to a repeater.

False alarm filter

In motion sensors, special optics are combined with a software false alarm filter, which, in combination with a professional installation, ensures high detection accuracy. The Fresnel lens in the design of the device provides the most informative thermal diagram. SmartDetect software algorithm filters out false alarms.

Data protection

The MotionCam (PhOD) Jeweler wireless motion sensor monitors the safety of system owners. Photo confirmations are protected from strangers at the level of the sensor, the security system and the Ajax application.

Thermal noise filter

The MotionCam (PhOD) Jeweler motion sensor instantly analyzes the thermal diagram read by the sensor: movement speed, time spent in the detection zone, infrared radiation intensity, heat spot size and other parameters.

Temperature compensation

Temperature compensation is a software mechanism that allows you to keep the thermal pattern contrast even if the temperature in the armed room is close to the temperature of the human body.

Motion Sensor Sensitivity Setting

Sensitivity adjustment allows you to adapt the sensor to the conditions of a particular room: pets, possible thermal interference. Increasing or decreasing sensitivity affects the false alarm filter. With the high sensitivity of the motion sensor configured, the device will react to any movement in the detection zone. If the sensitivity is low, the sensor is less likely to respond even to an active pet. Sensitivity is configured in the Ajax application remotely or on site.

Installation and configuration of the Ajax motion sensor

To install the sensor, you should use the services of an installation company. Ajax device installation services are provided by accredited partners. MotionCam Jeweler connects to the Ajax security system after scanning the QR code on the device body. The sensor housing does not need to be disassembled. The SmartBracket mounting plate allows you to mount the wireless sensor on a flat surface or in the corner of a room. Mounting the MotionCam Wireless Motion Detector (PhOD) at the optimum height in the correct location and perpendicular to the likely path of intrusion into the premises ensures an informative thermal diagram. Proper installation of the device significantly improves the accuracy of alarm detection. Professional installation also enhances the effectiveness of the sensor's immunity to animals.