Claims
- 1. A security network for use in a building with at least a first opening to be monitored for intrusion, containing:
At least a first intrusion sensor monitoring at least the first opening, connected to a first RFID transponder, At least a first RFID reader, in wireless communications with at least the said first RFID transponder, Wherein the said first intrusion sensor can be in at least two states, and Wherein the said first RFID reader can report to at least a first control function in the security network the present state of at least the said first intrusion sensor.
- 2. The security network of claim 1, further including:
At least a first gateway containing an interface to at least a first network external to the security network, and Wherein the gateway can selectively transmit messages through the said first network external to the security network.
- 3. The security network of claim 2, wherein one of the messages that can be transmitted by the gateway through the said first network external to the security network is an alert message.
- 4. The security network of claim 1, wherein the said first control function is contained within the said first RFID reader.
- 5. The security network of claim 2, wherein the said first control function is contained within the said first gateway.
- 6. The security network of claim 2, further including a second control function, wherein the said first control function is contained within the said first RFID reader and the said second control function is contained with the said first gateway.
- 7. The security network of claim 2, wherein the said first external network is the public switched telephone network.
- 8. The security network of claim 2, wherein the said first external network is a commercial mobile radio service network.
- 9. The security network of claim 2, wherein the said first external network is based upon the standard known as IEEE 802.11b, also known under the trade name WiFi.
- 10. The security network of claim 2, wherein the said first external network is based upon the standard known as Ethernet.
- 11. The security network of claim 2, wherein the said first external network is based upon the standard known as Universal Serial Bus.
- 12. The security network of claim 2, wherein the said first RFID reader and said first gateway communicate using active RF communications.
- 13. The security network of claim 2, wherein the said first RFID reader and said first gateway communicate using a power line carrier protocol.
- 14. The security network of claim 2, wherein the said first RFID reader and said first gateway communicate using a hardwired connection.
- 15. The security network of claim 1, wherein the said first RFID reader includes means for transferring power to the said first RFID transponder using radio waves.
- 16. The security network of claim 1, wherein the said first RFID transponder includes an energy store to power at least a portion of the circuits contained with the said first RFID transponder.
- 17. The security network of claim 16, wherein the said first RFID transponder includes means for receiving power from radio waves, converting the power received from the radio waves, and using the converted power to charge the energy store.
- 18. The security network of claim 16, wherein the said energy store contains a battery.
- 19. The security network of claim 6, wherein one of the said first and second control functions is elected as the master controller and the remaining control function is a slave to the master controller.
- 20. The security network of claim 3, wherein the said alert message is transmitted to an emergency response agency.
- 21. The security network of claim 1, further including at least a first siren, wherein the said first control function can cause the said first siren to emit an audible tone.
- 22. The security network of claim 1, further including a second RFID transponder, wherein the said first RFID reader can report to the said first control function in the security network whether the said second RFID transponder can be detected by the said first RFID reader.
- 23. The security network of claim 1, further including a second RFID transponder, wherein the said first RFID reader can report the state of the said second RFID transponder to the said first control function in the security network.
- 24. The security network of claim 1, wherein the said first control function determines the time at which the said first RFID reader transmits its wireless communications to at least the said first RFID transponder.
- 25. The security network of claim 1, wherein the said first control function determines the power level at which the said first RFID reader transmits its wireless communications to at least the said first RFID transponder.
- 26. The security network of claim 1, wherein the said first control function determines the modulation method used by the said first RFID reader to transmit its wireless communications to at least the said first RFID transponder.
- 27. The security network of claim 1,
wherein the said first RFID reader contains at least two antennas, and wherein the said first control function determines the antenna to be used by the said first RFID reader to transmit wireless communications to at least the said first RFID transponder.
- 28. The security network of claim 1, wherein the said first RFID transponder only sends a wireless communications to at least the said first RFID reader in response to a wireless communications from the said first RFID reader.
- 29. The security network of claim 2, further including a second RFID reader
wherein the said second RFID reader can send a first message to the said first RFID reader, and wherein the said first RFID reader can forward the said first message to the said first gateway.
- 30. The security network of claim 29, wherein the said first RFID reader and said second RFID reader communicate using active RF communications.
- 31. The security network of claim 29, wherein the said first RFID reader and said second RFID reader communicate using a power line carrier protocol.
- 32. The security network of claim 1, wherein the said wireless communications used by the said first RFID transponder is backscatter modulation.
- 33. An RFID reader for use in a security network for use in a building with at least a first opening to be monitored for intrusion, containing:
means for receiving commands from a first control function, means for communicating with at least a first RFID transponder using wireless communications techniques, means for receiving a message from at least said first RFID transponder indicating the present state of at least a first intrusion sensor, and means for reporting the present state of the said first RFID transponder to the said first control function.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This patent application is a continuation-in-part of U.S. application Ser. No. ______ (not yet assigned), RFID Reader for a Security System, attorney document number RFID-0105, mailed Feb. 13, 2003 by the inventor of the present application. This patent application is further cross referenced to the patent application mailed on Jan. 31, 2003, titled RFID Based Security System, by the inventor of the present application, attorney document number RFID-0100. This patent application is further cross referenced to the following patent applications, all mailed Feb. 13, 2003 by the inventor of the present application:
[0002] Communications Control in a Security System, attorney document number RFID-0101;
[0003] Device Enrollment in a Security System, attorney document number RFID-0102;
[0004] Controller for a Security System, attorney document number RFID-0103;
[0005] RFID Transponder for a Security System, attorney document number RFID-0104.
[0006] All of the foregoing cross referenced patent applications are incorporated by reference into this present patent application.