Method and system for controlling a security system using near field communication
First Claim
1. A method for controlling a security system using a radio frequency communication signal transmitted from a host object comprising the steps of:
- detecting a presence of said radio frequency communication signal, said radio frequency communication signal including an access credential;
determining said access credential;
matching said determined access credential with a specific authorized user from a list of authorized users;
detecting a type of modification to a function of said security system based upon a predetermined detection criterion;
determining if said specified authorized user is authorized to perform said detected type of modification; and
performing said type of modification.
4 Assignments
0 Petitions
Accused Products
Abstract
A security system control system using a host object with a near field communication device and a target object with a near field communication device. The target object broadcasts a carrier signal to the host object. Using the near field communication device, the host object modulated identification information on the carrier signal and broadcasts the modulated signal. The target object demodulates the signal to determine if a user associated with the identification information is authorized to perform the intended control function. The target object determines the intended control function based upon a detection criterion. The target object causes the intended control function to be performed if the associated user is authorized to control the intended control function such as to arm or disarm the security system. The identification information can expired after a predetermined period of time. The target object updates the identification information after expiration.
-
Citations
22 Claims
-
1. A method for controlling a security system using a radio frequency communication signal transmitted from a host object comprising the steps of:
-
detecting a presence of said radio frequency communication signal, said radio frequency communication signal including an access credential; determining said access credential; matching said determined access credential with a specific authorized user from a list of authorized users; detecting a type of modification to a function of said security system based upon a predetermined detection criterion; determining if said specified authorized user is authorized to perform said detected type of modification; and performing said type of modification. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of configuring a security system for receiving remote control signals from a host object comprising the steps of:
-
programming a list of authorized users; associating an access credential with each of said authorized users; assigning a control authority for a function to each of said authorized users; and determining a detection criterion for each function. - View Dependent Claims (7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A security system control system comprising a host object having a near field communication device compatible with ISO/IEC 18092 associated with said host object;
- and
a target object having a second near field communication device associated with said target object, when said host object is brought within a preset distance to said target object, said near field communication device in said host object transmits a radio frequency field including identification information for said near field communication device and access credentials for controlling said security system, said second field communication device in said target object receives said radio frequency field and causes a status of the security system to change if said host object is authorized to initiate said change. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22)
- and
Specification