IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0366320
(2003-02-14)
|
발명자
/ 주소 |
|
출원인 / 주소 |
|
대리인 / 주소 |
Stradley Ronon Stevens &
|
인용정보 |
피인용 횟수 :
22 인용 특허 :
134 |
초록
▼
A system and method for controlling communications in a security system based upon RFID techniques. The RFID reader of the security system can be provided with multiple modulation techniques, multiple antennas, and the capability to vary its power level and carrier frequency. The controller of the s
A system and method for controlling communications in a security system based upon RFID techniques. The RFID reader of the security system can be provided with multiple modulation techniques, multiple antennas, and the capability to vary its power level and carrier frequency. The controller of the security system determines which RFID readers may transmit, at what times, and the parameters with which to transmit. The RFID transponders of the security system limit their transmissions to responses only, and only when information to transmit exists. The controller may vary the parameters used by the RFID reader based upon the RFID transponder that is being addressed. The RFID reader can detect interference or jamming, and respond.
대표청구항
▼
I claim: 1. A method for controlling the communications in a security system containing at least a first controller, at least a first RFID reader, at least a first intrusion sensor, and at least a first RFID transponder associated with the first intrusion sensor, the method comprising the steps of:
I claim: 1. A method for controlling the communications in a security system containing at least a first controller, at least a first RFID reader, at least a first intrusion sensor, and at least a first RFID transponder associated with the first intrusion sensor, the method comprising the steps of: detecting through the intrusion sensor an emergency occurrence of intrusion into a structure monitored by the security system; prompting the first RFID transponder to transmit to the first RFID reader an interrupt advising the first RFID reader that the intrusion sensor has detected an emergency occurrence of intrusion; and otherwise sending a wireless communication from the first RFID transponder to the first RFID reader only in response to a wireless communication from the first RFID reader. 2. The method of claim 1, wherein the first RFID reader only sends a wireless communications in response to a command from the first controller. 3. The method of claim 1, wherein the security system contains a second RFID reader, further comprising the step of sending from the first RFID reader sends a wireless communications to the first RFID transponder, and both the first and second RFID readers receive the response wireless communications from the RFID transponder. 4. The method of claim 3, wherein the first controller processes only valid messages contained in any response wireless communications from the RFID transponder received at either of the first and second RFID readers. 5. The method of claim 1, wherein the first RFID reader interprets the response wireless communications from the RFID transponder for the presence of interference. 6. The method of claim 5, wherein the first RFID reader further interprets the response wireless communications from the RFID transponder for the presence of a jamming signal. 7. The method of claim 1, wherein the first controller determines the radio frequency at which the first RFID reader shall center the carrier of its wireless communications. 8. The method of claim 1, wherein the first controller determines the modulation technique which the first RFID reader shall use for its wireless communications. 9. The method of claim 7, wherein the first controller determines the radio frequency at which the first RFID reader shall center the carrier of its wireless communications by selecting from a predetermined list of available radio frequencies. 10. The method of claim 8, wherein the first controller determines the modulation technique which the first RFID reader shall use for its wireless communications by selecting from a predetermined list of available modulation techniques. 11. The method of claim 7, wherein the criteria for selecting the radio frequency includes the identity of the RFID transponder to which the wireless communications is directed. 12. The method of claim 8, wherein the criteria for selecting the modulation technique includes the identity of the RFID transponder to which the wireless communications is directed. 13. The method of claim 7, wherein the criteria for selecting the radio frequency includes whether interference is present. 14. The method of claim 8, wherein the criteria for selecting the modulation technique includes whether interference is present. 15. The method of claim 1, wherein the first RFID reader contains more than one antenna with which to communicate, and the first controller determines the antenna that the first RFID reader shall use for its wireless communications. 16. The method of claim 15, wherein the criteria for selecting the antenna includes the identity of the RFID transponder to which the wireless communications is directed. 17. The method of claim 15, wherein the criteria for selecting the antenna includes whether interference is present. 18. The method of claim 1, wherein the first RFID reader can adjust its transmit power level within a predetermined range, and the first controller determines the transmit power level that the first RFID reader shall use for its wireless communication. 19. The method of claim 18, wherein the criteria for selecting the transmit power level includes the identity of the RFID transponder to which the wireless communications is directed. 20. The method of claim 18, wherein the criteria for selecting the transmit power level includes whether interference is present. 21. A security system for use in a building to be monitored for intrusion, the security system comprising: at least a first intrusion sensor detecting the occurrence of intrusion into the building monitored by the security system; at least a first RFID transponder associated with the first intrusion sensor; at least a first RFID reader in wireless communications with the first RFID transponder; and at least a first controller in communication with the first RFID reader, wherein the first RFID transponder transmits to the first RFID reader an interrupt advising the first RFID reader that the intrusion sensor has detected an intrusion and the first RFID transponder otherwise returns a wireless communications to the first RFID reader only in response to a wireless communications from the first RFID reader. 22. The security system of claim 21, wherein the first RFID reader only sends a wireless communications in response to a command from the first controller. 23. The security system of claim 21, wherein the first RFID reader can send its wireless communications with its carrier centered at more than one radio frequency. 24. The security system of claim 21, wherein the first RFID reader can send its wireless communications using more than one modulation technique. 25. The security system of claim 21, wherein the first RFID reader can send its wireless communications using more than one antenna. 26. The security system of claim 21, wherein the first RFID reader can send its wireless communications using more than one power level. 27. The security system of claim 23, wherein the first controller determines the radio frequency at which the first RFID reader shall center the carrier of its wireless communications. 28. The security system of claim 23, wherein the criteria for selecting the radio frequency includes the identity of the RFID transponder to which the wireless communications is directed. 29. The security system of claim 24, wherein the first controller determines the modulation technique which the first RFID reader shall use for its wireless communications. 30. The security system of claim 24, wherein the criteria for selecting the modulation technique includes the identity of the RFID transponder to which the wireless communications is directed. 31. The security system of claim 25, wherein the first controller determines the antenna that the first RFID reader shall use for its wireless communications. 32. The security system of claim 25, wherein the criteria for selecting the antenna includes the identity of the RFID transponder to which the wireless communications is directed. 33. The security system of claim 26, wherein the first controller determines the transmit power level that the first RFID reader shall use for its wireless communications. 34. The security system of claim 26, wherein the criteria for selecting the transmit power level includes the identity of the RFID transponder to which the wireless communications is directed. 35. The security system of claim 21, wherein the first RFID reader can determine whether interference is present in the wireless communications returned from the first RFID transponder. 36. The security system of claim 21, wherein the first RFID reader can determine whether jamming is present in the wireless communications returned from the first RFID transponder. 37. A security system for use in a building to be monitored for intrusion, the building having a number of rooms each with one or more openings, the security system comprising: an intrusion sensor being located proximate each opening to be monitored and detecting the occurrence of intrusion through that opening; an RFID transponder associated with each intrusion sensor; multiple RFID readers distributed in at least some of the rooms, each RFID reader in wireless communication with one or more RFID transponders and providing overlapping read zones defined as areas in which an RFID reader can communicate with an RFID transponder; at least one controller communicating with each RFID reader and identifying, enrolling, and controlling each RFID transponder and RFID reader of the security system. 38. The security system of claim 37 wherein at least one of the RFID readers has a glass breakage, heat, smoke, contact, or motion sensor. 39. The security system of claim 38 wherein the controller adjusts the parameters of the glass breakage, heat, smoke, contact, or motion sensor. 40. The security system of claim 37 wherein the controller commands the RFID readers to use a particular combination of radio frequency, modulation technique, antenna, and power level to communicate with a particular RFID transponder. 41. The security system of claim 37 wherein the controller, upon receipt of a particular communication from an RFID reader, sends an alert to an emergency response agency. 42. The security system of claim 37 wherein at least one RFID reader operates as a field disturbance sensor. 43. The security system of claim 37 wherein each RFID reader wirelessly communicates with one or more RFID transponders using modulated backscatter techniques. 44. The security system of claim 37 wherein the controller sequences the RFID readers so that only one RFID reader communicates with the controller at a time. 45. The security system of claim 37 wherein the RFID readers and the one or more RFID transponders are in a fixed physical configuration. 46. The security system of claim 37 wherein the ratio of RFID readers to major rooms in the building is approximately one-to-one. 47. The security system of claim 37 wherein at least one of the RFID readers varies the range of its read zone.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.