Device enrollment in a security system
First Claim
1. A method of enrolling devices in a security system containing at least a first controller and at least a first RFID reader, comprising the steps of:
- Placing the said first controller into enrollment mode, Reducing the transmit power of the said RFID reader to a predetermined threshold, wherein the predetermined threshold causes the said RFID reader to reduce its read zone to an area proximate to the said RFID reader, Placing a first RFID transponder within the reduced read zone of the said first RFID reader, Exchanging information between the said RFID reader and the said RFID transponder, Using the exchanged information to enroll a device in the said first controller of the security system.
16 Assignments
0 Petitions
Accused Products
Abstract
A method for enrolling devices in a security system based upon RFID techniques. The method prevents unauthorized devices from engaging in communications by and between the various devices in the security system. While the security system may have long RF range during normal operation, the RFID readers of the security system reduce their read range during an enrollment operation. A user must be physically proximate to an RFID reader to enroll any device. The controller has an associated master key RFID transponder containing at least one code necessary for enabling enrollment of an RFID reader. This master key RFID transponder can only be read during enrollment. RFID transponders and RFID readers also exchange at least one code during the enrollment of RFID transponders. The codes can enable encrypted communications during normal system operation.
144 Citations
26 Claims
-
1. A method of enrolling devices in a security system containing at least a first controller and at least a first RFID reader, comprising the steps of:
-
Placing the said first controller into enrollment mode, Reducing the transmit power of the said RFID reader to a predetermined threshold, wherein the predetermined threshold causes the said RFID reader to reduce its read zone to an area proximate to the said RFID reader, Placing a first RFID transponder within the reduced read zone of the said first RFID reader, Exchanging information between the said RFID reader and the said RFID transponder, Using the exchanged information to enroll a device in the said first controller of the security system. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A security system for use in a building to be monitored for intrusion, containing:
-
At least a first controller, At least a first RFID reader capable of communications with at least the first controller, Wherein the said first controller only engages in communications with the said first RFID reader if the said first RFID reader has been enrolled with the said first controller. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
- 15. A first controller for use in a security system containing at least a first RFID reader, wherein the said first controller contains at least a first table capable of storing enrollment information for the said first RFID reader.
Specification