Language:
MotionCam S (PhOD) Jeweller

MotionCam S (PhOD) Jeweller

Wireless IR motion detector supporting photo by alarm, photo on demand, photo by schedule, and photo by scenario features. Superior edition.

Product is not available in your region

Gradient

Expanded features, reliability, and compliance for PROs

Superior is a project-oriented product line. It includes advanced wireless versions of Jeweller devices. Experience exceptional features, cutting-edge hardware, improved certification compliance, effortless installation, and more.

The Superior difference

MotionCam (PhOD) Jeweller

Compliance with international security standards

No holding screw

Common battery

Available for all PROs

Superior

MotionCam S (PhOD) Jeweller

Compliance with both international and local security standards

Holding screw for secured installation

Enhanced battery for stable operation in any temperature

Available only for accredited partners

Lightning-fast alarms. Verified.

MotionCam S (PhOD) Jeweller has a built-in camera that takes photos once the detector is triggered. It needs just 9 seconds to show the actual situation on the scene. With visual evidence available in Ajax apps, the security company can quickly verify the threat and respond accordingly. Photo verification relieves users of unnecessary anxiety and prevents security companies from false patrol calls. Users can take an on-demand photo with a single tap to monitor their house's state at any time. The detector can also automatically take photos by an alarm of another device in the system and by a specific schedule.

Discover Superior

Introducing a new product line for projects

Watch on Youtube

Key features

Four types of photo verification

Photo by Alarm

Photo on Demand

Photo by Scenario

Photo by Schedule

IR backlight

for low-light conditions

Ir-backlight

9 seconds

to deliver the first photo1

Fast photo deliver

Software algorithm to prevent false alarms

SmartDetect technologie
Motion detection distance

Up to 12 m

motion detection distance2

Up to 5 years

with pre-installed enhanced batteries

Battery
Privacy
Lock
Photo privacy privacy

Informative push notifications

Ajax logo
10:00

Critical

Ajax

Warehouse: Motion detected, MotionCam S (PhOD) in Storage area

Ajax logo
10:00

Ajax

Office: Lid is closed, MotionCam S (PhOD) in Hall

Pet immunity

Pet immunity

Temperature compensation

Temperature compensation

for effective detection in heat and cold

Device range

Up to 1,700 m

communication range with an Ajax hub or range extender3

Jeweller and Wings radio communication

Jeweller and Wings radio communication

Power adjustment

Two colours

of matte enclosure

Two colours
Remote control

Remote control and configuration

Holding screw

to secure the detector on a mounting panel

Hassle free installation

Hassle-free installation

1

QR code

2

SmartBracket

3

App

Devices compatibility

Superior, Fibra, and Baseline product lines are mutually compatible. This opens up numerous possibilities for building systems of any configuration.

Wherever there is a risk of intrusion

Office

Office or coworking

Store

Store

Educational institution

Educational institution

Restaurant or cafe

Restaurant or cafe

Warehouse or manufacturing

Warehouse or manufacturing

Museum or exhibition center

Museum or exhibition center

Gym

Gym

Private residence or apartment

Private residence or apartment

Peace of mind on demand

The detector needs just a few seconds to show the actual situation on the scene and dispel the user's doubts in case of an alarm. It takes a click in the Ajax app to take an on-demand photo. Also, it can automatically take photos by schedule and when another detector in the system is triggered.

Privacy first

Detailed event log

Detailed event log

The event log records 500 recent events within the system. The data is explicit with the device, time, and event description. On-demand photos are linked to the user who requested them. Photos can be received only by users with the Photo on Demand access. Security companies do not receive the photos.

Strict permission distribution

Strict permission distribution

The Privacy menu in Ajax apps helps accurately adjust access to visual data for users and security company operators: who and when can request a photo, which detector can take on-demand photos, and who can view the received pictures or streams from integrated surveillance cameras.

Encryption and GDPR

Encryption and GDPR

Photos are encrypted at every stage of transmission. Only system users can access the virtual Ajax Cloud storage and view photos. While stored, no photos are processed or analysed. The Ajax Cloud service is hosted on geographically distributed servers that meet the General Data Protection Regulation (GDPR) requirements.

Discover future-proof hardware

Ir-backlight

IR backlight for low light conditions

Fresnel lens

Fresnel lens

Camera

Camera

Enhanced battery

Enhanced battery

Jeweller and Wings antennas

Jeweller and Wings antennas

PIR sensor

PIR sensor

Tamper

Tamper

SmartBracket mounting panel

SmartBracket mounting panel

Holding screw on SmartBracket

Holding screw to secure the detector on SmartBracket

No intruder goes unnoticed

PIR sensor

All Ajax motion detectors use PIR sensors by Excelitas Technologies — a field-leading American manufacturer specializing in designing and producing optronic components since 1931. Ajax Systems constantly proves the sensor's superior quality at the production stage: we test 100% of manufactured devices. Wrapped into Ajax technologies, it brings the utmost accuracy of intrusion detection.

PIR sensor

Special lens

The pattern of the Fresnel lens sections is designed to differentiate between the IR diagrams of a human, animal, and thermal noise. Large lens sections capture radiation at an adult's head and torso level. Smaller sections make the diagram more detailed. The lens provides the detector with accurate information about the thermal object in the detection zone and the nature of its movement.

Special lens

Thermal interferences filter

SmartDetect

We processed thousands of thermal patterns caused by humans, animals, and the environment to develop the SmartDetect software algorithm. In armed mode, the detector constantly analyses the thermal diagram from the PIR sensor, including the IR radiation intensity, thermal spot size, movement speed, time spent in the detection zone, and other parameters. The algorithm identifies false alarm markers instantly and with high accuracy. As a result — the detector accurately responds to human motion without false alarms.

Size
Detection size

False alarm

Real alarm

Speed
Detection speed

False alarm

Real alarm

Intensity
IR radiation intensity

False alarm

Real alarm

Temperature compensation

Temperature compensation is a software mechanism keeping the thermal diagram contrast even if the ambient temperature is close to the temperature of the human body. With each ambient temperature measurement, the detector corrects the PIR sensor data according to the coefficient table stored in its memory. The detector is effective over the entire operating temperature range.

Temperature compensation

Sensitivity level

The detector can adapt to the conditions of a particular facility, considering possible thermal interference or pets. The sensitivity setting changes the set of markers by which false alarms are filtered. Low sensitivity makes the detector less likely to respond to an active pet. A high sensitivity will raise the alarm in case of any motion in the detection zone.

Sensitivity level

Professional installation

With the correct installation at the height of 2.4 m and lens direction perpendicular to an alleged intrusion path, the detector provides an accurate thermal diagram and pet immunity. It instantly responds to a real threat, minimising false alarms caused by animals weighing up to 20 kg and below 50 cm in height.

Professional installation

Stable performance in heat and cold

The Superior devices are equipped with high-quality batteries from proven manufacturers only. In addition to real-time testing on the battery production stage, Ajax Systems inspects every unit to ensure the accuracy of the batteries’ characteristics. The temperature range does not affect the capacity, as the batteries provide stable performance in temperatures from –10°С to +40°С.

Minimal impact of threshold temperatures on battery life

High quality proven by regular tests

Up to 5 years of operation

Batteries
Unique wireless technology

Jeweller | Wings

Unique wireless technologies

The Ajax system uses two-way secure radio communication based on Jeweller and Wings proprietary protocols. Radio protocols work in parallel and focus on their own function, guaranteeing instant data and delivery even with communication interruptions and a weak signal.

Up to 1,700 m of radio communication with a hub or range extender3

Encrypted two-way radio communication

Notifications about jamming and connection loss

9 s to deliver the first photo1

Scaled and comprehensive

ReX 2 boosts the radio range of all Ajax devices via Jeweller and assures stable communication even through steel and concrete via Ethernet using the wire as the additional communication channel. Up to 5 range extenders can operate within one Ajax system to expand the network twice as big, covering underground parking, basement, or metal hangar.

Up to 5 range extenders within one system

Ethernet as an alternative communication channel

System supervision

All Ajax devices perform automatic self-diagnosis and report their states to the hub. Essential parameters, including tamper, communication, power supply, and sensor statuses, are continuously monitored. The Ajax Cloud server controls communication between the hub and Ajax apps, ensuring instant notifications for ARCs, security companies, and users. In case of any malfunction or communication failure, an engineer is informed immediately to provide necessary services.

Automatic device self-diagnosis with status report

Regular polling to display the current device state on apps

Instant maintenance notifications

Advanced system supervision

Sabotage-resistant

Tamper alarm

Tamper alarm

The enclosure has a tamper button, which notifies the security company and users once the device is dismantled from the mount.

Data encryption

Data encryption

All data the system stores and transmits is protected by a block cypher with a dynamic key. Encryption makes it extremely difficult to reprogram the device, replace or steal the data.

Data-rich notifications

Data-rich notifications

The Ajax system instantly notifies about alarms and events with informative notifications: security companies and users know exactly which device triggered, when and where it happened.

Regular polling

Regular polling

The device regularly exchanges data with the hub. The system controls each device state and reports if there is a malfunction or connection loss.

Device authentication against spoofing

Device authentication against spoofing

The hub checks the device's unique parameters for authentication during each communication session. If any parameter fails the check, the hub ignores device commands.

Communication failure detection

Communication failure detection

The device regularly exchanges data with the hub. With maximum ping interval settings available (3 data packages once in 12 seconds), it takes only 36 seconds to identify communication loss and notify the security company and users about the incident.

Effortless installation and setup

MotionCam S (PhOD) is ready to operate straight out of the box. Using the SmartBracket panel, an installer can effortlessly mount the device on the wall, eliminating the need to disassemble the enclosure. Ajax apps help quickly make the device a part of the ecosystem: simply pair the device with the hub by scanning the QR code. It can always be reconfigured remotely without the need for on-site visits.

Pairing with the hub via QR code

Connection

SmartBracket panel — no need to disassemble the enclosure

Installation

Configuring and testing in mobile and desktop apps

Setup

PRO Desktop app for macOS and Windows

Monitoring
  • 1 — With default settings (photo resolution is 320 × 240 px).
  • 2 — According to INCERT certification, detection range is up to 10 m.
  • 3 — In an open space.

Ajax product lines

Superior, Fibra, and Baseline product lines are mutually compatible. This opens up numerous possibilities for building systems of any configuration.