Method and system for controlling a security system using near field communication
First Claim
1. A method for controlling a security system using a near field radio frequency communication signal having a preset range transmitted from a host object to a target object associated with the security system comprising the steps of:
- detecting a presence of said radio frequency communication signal, said radio frequency communication signal including an access credential;
determining said access credential;
matching said determined access credential with a specific authorized user from a list of authorized users;
the target object detecting a type of modification to a function of said security system of a plurality of modifications based upon a predetermined detection criterion associated with the preset range of the near field signal specifying an association between the modification and a time threshold, said time threshold is a period of time where said host object is brought within the preset range of the target object;
determining if said specified authorized user is authorized to perform said detected type of modification; and
performing said type of modification.
4 Assignments
0 Petitions
Accused Products
Abstract
A security system control system using a host object with a near field communication device and a target object with a near field communication device. The target object broadcasts a carrier signal to the host object. Using the near field communication device, the host object modulated identification information on the carrier signal and broadcasts the modulated signal. The target object demodulates the signal to determine if a user associated with the identification information is authorized to perform the intended control function. The target object determines the intended control function based upon a detection criterion. The target object causes the intended control function to be performed if the associated user is authorized to control the intended control function such as to arm or disarm the security system. The identification information can expired after a predetermined period of time. The target object updates the identification information after expiration.
20 Citations
20 Claims
-
1. A method for controlling a security system using a near field radio frequency communication signal having a preset range transmitted from a host object to a target object associated with the security system comprising the steps of:
-
detecting a presence of said radio frequency communication signal, said radio frequency communication signal including an access credential; determining said access credential; matching said determined access credential with a specific authorized user from a list of authorized users; the target object detecting a type of modification to a function of said security system of a plurality of modifications based upon a predetermined detection criterion associated with the preset range of the near field signal specifying an association between the modification and a time threshold, said time threshold is a period of time where said host object is brought within the preset range of the target object; determining if said specified authorized user is authorized to perform said detected type of modification; and performing said type of modification. - View Dependent Claims (2, 3, 4)
-
-
5. A method for controlling a security system for receiving remote control signals from a host object, the remote control signals using a near field radio frequency communication signal having a preset range transmitted from the host object to a target object associated with the security system, the method comprising the steps of:
- programming a list of authorized users;
associating an access credential with each of said authorized users;
assigning a control authority for a function to each of said authorized users;
determining a detection criterion for each function;
detecting a presence of a radio frequency communication signal from the host object, said radio frequency communication signal including the access credential;
determining said access credential;
matching said determined access credential with a specific authorized user from the list of authorized users;
the target object detecting the function of said specific authorized user based upon the predetermined detection criterion associated with the preset range of the near field signal, the detection criteria specifying an association between the function and a time threshold, said time threshold is a period of time where said host object is brought within the preset range of the target object;
determining if said specified authorized user has the assigned control authority for the function; and
performing said function. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13)
- programming a list of authorized users;
-
14. A security system control system comprising a host object having a near field communication device compatible with ISO/IEC 18092 associated with said host object;
- and
a target object having a second near field communication device associated with said target object, said near field communication devices having a preset range that is controlled in advance, wherein said host object and said target object are configured such that, when said host object is brought within a preset distance to said target object defined by a preset range, said near field communication device in said host object transmits a radio frequency field including identification information for said near field communication device and access credentials for controlling said security system, said second near field communication device in said target object receives said radio frequency field and processes said information and identification, said second near field communication device detecting a status change request of a plurality of status change requests based upon a predetermined detection criteria associated with the radio frequency field based upon the preset range the predetermined detection criteria specifying an association between the status change request and a time threshold, said time threshold is a period of time where said host object is brought within the preset range of the target object and where satisfaction of the predetermined detection criteria causes a status of the security system to change only if said host object is authorized to initiate said change. - View Dependent Claims (15, 16, 17, 18, 19, 20)
- and
Specification