A method for enrolling devices in a security system based upon RFID techniques. The method prevents unauthorized devices from engaging in communications by and between the various devices in the security system. While the security system may have long RF range during normal operation, the RFID reade
A method for enrolling devices in a security system based upon RFID techniques. The method prevents unauthorized devices from engaging in communications by and between the various devices in the security system. While the security system may have long RF range during normal operation, the RFID readers of the security system reduce their read range during an enrollment operation. A user must be physically proximate to an RFID reader to enroll any device. The controller has an associated master key RFID transponder containing at least one code necessary for enabling enrollment of an RFID reader. This master key RFID transponder can only be read during enrollment. RFID transponders and RFID readers also exchange at least one code during the enrollment of RFID transponders. The codes can enable encrypted communications during normal system operation.
대표청구항▼
I claim: 1. A method of enrolling devices in a security system containing at least a first controller and at least two other devices, a first RFID reader having a read zone and a first RFID transponder, the method comprising the steps of: placing the first controller into an enrollment made; reduci
I claim: 1. A method of enrolling devices in a security system containing at least a first controller and at least two other devices, a first RFID reader having a read zone and a first RFID transponder, the method comprising the steps of: placing the first controller into an enrollment made; reducing the transmit power of the first RFID reader to reduce its read zone to an area proximate to the first RFID reader; placing the first RFID transponder within the reduced read zone of the first RFID reader; further reducing the transmit power of the first RFID reader, thereby narrowing the size and shape of the read zone, until the first RFID reader detects only the first RFID transponder; still further reducing the transmit power of the first RFID reader to a predetermined threshold which assures that the first RFID transponder is physically close to the first RFID reader; exchanging information between the first RFID reader and the first RFID transponder; and using the exchanged information to enroll a device in the first controller of the security system. 2. The method of claim 1, wherein the enrolled device is the first RFID reader. 3. The method of claim 1, wherein the enrolled device is the first RFID transponder. 4. The method of claim 1, wherein the first RFID transponder is a master key RFID transponder associated with the first controller. 5. The method of claim 4, wherein the master key RFID transponder contains at least a first code usable for enabling encrypted communications between the first controller and the first RFID reader. 6. The method of claim 5, wherein the first code is never sent over the communications medium used between the first controller and the first RFID reader. 7. The method of claim 1, wherein the exchanged information includes at least one code usable in encrypting communications. 8. The method of claim 1, wherein the first RFID reader communicates with the first controller only after the first RFID reader has been enrolled with the first controller. 9. The method or claim 8, wherein the communications between the first RFID reader and the first controller are encrypted using a key known to bath the first RFID reader and the first controller. 10. The method of claim 9, wherein the first RFID reader obtains the key from a master key RFID transponder. 11. The method of claim 1, further comprising storing enrollment information in a table. 12. The method of claim 11, wherein the first controller enters enrollment information in the table for at least one of the first RFID reader or the first RFID transponder. 13. The method of claim 1, wherein the first RFID reader and the first RFID transponder exchange information using wireless communications. 14. The method of claim 1, wherein the first RFID transponder communicates with the first RFID reader only after the first RFID transponder has been enrolled with the first controller. 15. The method of claim 14, wherein the communications between the first RFID reader and the first RFID transponder are encrypted using a key known to both the first RFID reader and the first RFID transponder. 16. A method of enrolling devices in a security system containing at least a first controller and at least two other devices, a first RFID reader having a read zone and a first RFID transponder, the method comprising the steps of: placing the first controller into an enrollment mode; reducing the transmit power of the first RFID reader to reduce its read zone to an area proximate to the first RFID reader; placing the first RFID transponder within the reduced read tone or the first RFID reader; further reducing the transmit power of the first RFID reader, thereby narrowing the size and shape of the read zone, until the first RFID reader detects only the first RFID transponder; still further reducing the transmit power of the first RFID reader to a predetermined threshold which assures that the first RFID transponder is physically close to the first RFID reader; exchanging information between the first RFID reader and the first RFID transponder, the exchanged information including at least one code usable in encrypting communications; and using the exchanged information to enroll both the first RFID reader and the first RFID transponder in the first controller of the security system. 17. The method of claim 16, wherein the first RFID transponder is a master key RFID transponder associated with the first controller. 18. The method of claim 17, wherein the master key RFID transponder contains at least a first code usable for enabling encrypted communications between the first controller and the first RFID reader. 19. The method of claim 18, wherein the first code is never sent over the communications medium used between the first controller and the first RFID reader. 20. The method of claim 16, wherein the first RFID reader communicates with the first controller only after the first RFID reader has been enrolled with the first controller. 21. The method of claim 16, further comprising storing enrollment information in a table. 22. The method of claim 21, wherein the first controller enters enrollment information in the table for the first RFID reader and the first RFID transponder. 23. The method of claim 16, wherein the first RFID reader and the first RFID transponder exchange information using wireless communications. 24. The method of claim 16, wherein the first RFID transponder communicates with the first RFID reader only after the, first RFID transponder has been enrolled with the first controller. 25. A method of enrolling devices in a security system containing at least a first controller and at least two other devices, a first RFID reader having a read zone and a first RFID transponder, the method comprising the steps of: placing the first controller into an enrollment mode; reducing the transmit power of the first RFID reader to reduce its read zone to an area proximate to the first RFID reader; placing the first RFID transponder within the reduced read zone of the first RFID reader; further reducing the transmit power of the first RFID reader, thereby narrowing the size and shape of the read zone, until the first RFID reader detects only the first RFID transponder; still further reducing the transmit power of the first RFID render to a predetermined threshold which assures that the first RFID transponder is physically close to the first RFID reader; exchanging information between the first RFID reader and the first RFID transponder, the exchanged information including at least one code usable in encrypting communications; using the exchanged information to enroll both the first RFID reader and the first RFID transponder in the first controller of the security system; and entering in a table via the first controller enrollment information for the first RFID reader and the first RFID transponder; and storing the enrollment information in the table, wherein the first RFID reader communicates with the first controller only after the first RFID render has been enrolled with the first controller and the first RFID transponder communicates with the first RFID reader only after the first RFID transponder has been enrolled with the first controller. 26. The method of claim 25, wherein the first RFID reader and the first RFID transponder exchange information using wireless communications.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (134)
Friedman, Daniel J.; Cofino, Thomas Anthony; Chieu, Trieu C., Active RF tag with wake-up circuit to prolong battery life.
Markwell Scott ; Hanning David L. ; Fox Alan ; Evans Bill ; Ellis Jack ; Goldblatt Richard ; Matson Bob, Battery-powered, RF-interconnected detector sensor system.
Clow, Robert J.; Tice, Lee D.; Howard, Jerry L.; Keeler, Manley S.; Meggesin, John F., Communication system for defining a variable group of processors for receiving a transmitted communication.
MacLellan John Austin (Aberdeen NJ) Shober R. Anthony (Red Bank NJ) Vannucci Giovanni (Middletown NJ) Wright Gregory Alan (Colts Neck NJ), Full duplex modulated backscatter system.
Proctor David Edwin,ZAX ; Turner Christopher Gordon Gervase,ZAX, High impedance transponder with improved backscatter modulator for electronic identification system.
Addy Kenneth L. ; Schmit Thomas P. ; Adamo Patrick, High power control signal transmission and low power data signal transmission in a wireless security system.
Wilson Dennis A. (McHenry IL) Williamsen Mark S. (Crystal Lake IL), Peripheral data acquisition, monitor, and adaptive control system via personal computer.
Christopher Gordon Gervase Turner ZA; Johan Dawid Kruger ZA; David Edwin Proctor ZA, Reader arrangement for an electronic identification system having a plurality of reader heads for energizing transponders.
Salazar Joe Andrew ; Molero-Castro Luis,ESX, Wireless and wired communications, command, control and sensing system for sound and/or data transmission and reception.
Agre Jonathan R. ; Clare Loren P. ; Marcy ; 5th Henry O. ; Twarowski Allen J. ; Kaiser William ; Mickelson Wilmer A. ; Yakos Michael D. ; Loeffelholz Christian J. ; Engdahl Jonathan R., Wireless integrated sensor network using multiple relayed communications.
Hayden, Craig A.; Caler, Dennis M.; Parker, Patrick A.; Berube, James E.; Crosier, John B.; Hayter, Alan B., Method and apparatus for adding wireless devices to a security system.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.