Claims
- 1. A method for controlling the communications in a security system containing at least a first controller, at least a first RFID reader, and at least a first RFID transponder, comprising the steps of:
Sending a wireless communications from the said first RFID transponder to the said first RFID reader only in response to a wireless communications from the said first RFID reader.
- 2. The method of claim 1, wherein the said first RFID reader only sends a wireless communications in response to a command from the said first controller.
- 3. The method of claim 1, including a second RFID reader, wherein the said first RFID reader sends a wireless communications to the first RFID transponder, and both the first and second RFID reader receive the response wireless communications from the RFID transponder.
- 4. The method of claim 3, wherein the controller processes only valid messages contained in any response wireless communications from the RFID transponder received at any of the first and second RFID readers.
- 5. The method of claim 1, wherein the first RFID reader interprets the response wireless communications from the RFID transponder for the presence of interference.
- 6. The method of claim 5, wherein the first RFID reader further interprets the response wireless communications from the RFID transponder for the presence of a jamming signal.
- 7. The method of claim 1, wherein the said first controller determines the radio frequency at which the said first RFID reader shall center the carrier of its wireless communications.
- 8. The method of claim 1, wherein the said first controller determines the modulation technique which the first RFID reader shall use for its wireless communications.
- 9. The method of claim 7, wherein the first controller determines the radio frequency at which the said first RFID reader shall center the carrier of its wireless communications by selecting from a predetermined list of available radio frequencies.
- 10. The method of claim 8, wherein the said first controller determines the modulation technique which the first RFID reader shall use for its wireless communications by selecting from a predetermined list of available modulation techniques.
- 11. The method of claim 7, wherein the criteria for selecting the radio frequency includes the identity of the RFID transponder to whom the wireless communications is directed.
- 12. The method of claim 8, wherein the criteria for selecting the modulation technique includes the identity of the RFID transponder to whom the wireless communications is directed
- 13. The method of claim 7, wherein the criteria for selecting the radio frequency includes whether interference is present.
- 14. The method of claim 8, wherein the criteria for selecting the modulation technique includes whether interference is present.
- 15. The method of claim 1, wherein the first RFID reader contains more than one antenna with which to communicate, and the said first controller determines the antenna that the first RFID reader shall use for its wireless communications.
- 16. The method of claim 15, wherein the criteria for selecting the antenna includes the identity of the RFID transponder to whom the wireless communications is directed.
- 17. The method of claim 15, wherein the criteria for selecting the antenna includes whether interference is present.
- 18. The method of claim 1, wherein the first RFID reader can adjust its transmit power level within a predetermined range, and the said first controller determines the transmit power level that the first RFID reader shall use for its wireless communications.
- 19. The method of claim 18, wherein the criteria for selecting the transmit power level includes the identity of the RFID transponder to whom the wireless communications is directed.
- 20. The method of claim 18, wherein the criteria for selecting the transmit power level includes whether interference is present.
- 21. A security system for use in a building to be monitored for intrusion, containing:
At least a first controller, At least a first RFID transponder, At least a first RFID reader, capable of wireless communications with at least the said first RFID transponder, and in communications with at least the first controller, Wherein the first RFID transponder returns a wireless communications to the said first RFID reader only in response to a wireless communications from the said first RFID reader.
- 22. The security system of claim 21, wherein the said first RFID reader only sends a wireless communications in response to a command from the said first controller.
- 23. The security system of claim 21, wherein the said first RFID reader can send its wireless communications with its carrier centered at more than one radio frequency.
- 24. The security system of claim 21, wherein the said first RFID reader can send its wireless communications using more than one modulation technique.
- 25. The security system of claim 21, wherein the said first RFID reader can send its wireless communications using more than one antenna.
- 26. The security system of claim 21, wherein the said first RFID reader can send its wireless communications using more than one power level.
- 27. The security system of claim 23, wherein the said first controller determines the radio frequency at which the said first RFID reader shall center the carrier of its wireless communications.
- 28. The security system of claim 23, wherein the criteria for selecting the radio frequency includes the identity of the RFID transponder to whom the wireless communications is directed.
- 29. The security system of claim 24, wherein the said first controller determines the modulation technique which the said first RFID reader shall use for its wireless communications.
- 30. The security system of claim 24, wherein the criteria for selecting the modulation technique includes the identity of the RFID transponder to whom the wireless communications is directed.
- 31. The security system of claim 25, wherein the said first controller determines the antenna that the said first RFID reader shall use for its wireless communications.
- 32. The security system of claim 25, wherein the criteria for selecting the antenna includes the identity of the RFID transponder to whom the wireless communications is directed.
- 33. The security system of claim 26, wherein the said first controller determines the transmit power level that the said first RFID reader shall use for its wireless communications.
- 34. The security system of claim 26, wherein the criteria for selecting the transmit power level includes the identity of the RFID transponder to whom the wireless communications is directed.
- 35. The security system of claim 21, wherein the said first RFID reader can determine whether interference is present in the wireless communications returned from the said first RFID transponder.
- 36. The security system of claim 21, wherein the said first RFID reader can determine whether jamming is present in the wireless communications returned from the said first RFID transponder.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This patent application is a continuation-in-part of US application serial number (not yet assigned), filed on Jan. 31, 2003, titled RFID Based Security System, by the inventor of the present application, attorney document number RFID-0100. This patent application is further cross referenced to the other following patent applications, filed even date herewith by the inventor of the present application:
[0002] Communications Control in a Security System, attorney document number RFID-0101;
[0003] Device Enrollment in a Security System, attorney document number RFID-0102;
[0004] Controller for a Security System, attorney document number RFID-0103;
[0005] RFID Transponder for a Security System, attorney document number RFID-0104; and
[0006] RFID Reader for a Security System, attorney document number RFID-0105.