Communications control in a security system
First Claim
1. A method for controlling the communications in a security system containing at least a first controller, at least a first RFID reader, at least a first intrusion sensor, and at least a first RFID transponder associated with the first intrusion sensor, the method comprising the steps of:
- detecting through the intrusion sensor an emergency occurrence of intrusion into a structure monitored by the security system;
prompting the first RFID transponder to transmit to the first RFID reader an interrupt advising the first RFID reader that the intrusion sensor has detected an emergency occurrence of intrusion; and
otherwise sending a wireless communication from the first RFID transponder to the first RFID reader only in response to a wireless communication from the first RFID reader.
9 Assignments
0 Petitions
Accused Products
Abstract
A system and method for controlling communications in a security system based upon RFID techniques. The RFID reader of the security system can be provided with multiple modulation techniques, multiple antennas, and the capability to vary its power level and carrier frequency. The controller of the security system determines which RFID readers may transmit, at what times, and the parameters with which to transmit. The RFID transponders of the security system limit their transmissions to responses only, and only when information to transmit exists. The controller may vary the parameters used by the RFID reader based upon the RFID transponder that is being addressed. The RFID reader can detect interference or jamming, and respond.
-
Citations
47 Claims
-
1. A method for controlling the communications in a security system containing at least a first controller, at least a first RFID reader, at least a first intrusion sensor, and at least a first RFID transponder associated with the first intrusion sensor, the method comprising the steps of:
-
detecting through the intrusion sensor an emergency occurrence of intrusion into a structure monitored by the security system; prompting the first RFID transponder to transmit to the first RFID reader an interrupt advising the first RFID reader that the intrusion sensor has detected an emergency occurrence of intrusion; and otherwise sending a wireless communication from the first RFID transponder to the first RFID reader only in response to a wireless communication from the first RFID reader. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A security system for use in a building to be monitored for intrusion, the security system comprising:
-
at least a first intrusion sensor detecting the occurrence of intrusion into the building monitored by the security system; at least a first RFID transponder associated with the first intrusion sensor; at least a first RFID reader in wireless communications with the first RFID transponder; and at least a first controller in communication with the first RFID reader, wherein the first RFID transponder transmits to the first RFID reader an interrupt advising the first RFID reader that the intrusion sensor has detected an intrusion and the first RFID transponder otherwise returns a wireless communications to the first RFID reader only in response to a wireless communications from the first RFID reader. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A security system for use in a building to be monitored for intrusion, the building having a number of rooms each with one or more openings, the security system comprising:
-
an intrusion sensor being located proximate each opening to be monitored and detecting the occurrence of intrusion through that opening; an RFID transponder associated with each intrusion sensor; multiple RFID readers distributed in at least some of the rooms, each RFID reader in wireless communication with one or more RFID transponders and providing overlapping read zones defined as areas in which an RFID reader can communicate with an RFID transponder; at least one controller communicating with each RFID reader and identifying, enrolling, and controlling each RFID transponder and RFID reader of the security system. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
Specification