Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for controlling a security system using near field communication

A technology of security system and control system, applied to record carriers, instruments, induction record carriers, etc. used by machines, and can solve the problems of errors, eavesdropping, false alarms, etc.

Inactive Publication Date: 2008-04-16
HONEYWELL INT INC
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, the security device generally only provides a small amount of time to enter the disarming passcode. The user is in a hurry when entering the passcode, and as a result, an error occurs when entering the passcode, resulting in false alarms.
Also, if the user is carrying something, it may be difficult for the user to enter the passcode
Additionally, because the remote transmitter operates on VHF and UHF frequencies and operates in such a range that the transmitted information could be overheard by a malicious eavesdropper using a "code grabbing" device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling a security system using near field communication
  • Method and system for controlling a security system using near field communication
  • Method and system for controlling a security system using near field communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] Fig. 1 shows a control system for controlling the state of a security system according to one embodiment of the present invention. As shown in the figure, the control system 1 includes a host object 10 and a target object 20 . The host object 10 includes a near field communication device 15 . The host object 10 may be any object or device capable of having a near field communication device, which may be attached, embedded, installed in or used in conjunction with a locally installed security system, and be portable. For example, but not limited to, key cards, cell phones, PDAs, laptops, watches, pencils, pens, and key chains. The target object 20 also includes a near field communication device 25 . The target object 20 may be a user interface keypad or device associated with a security control panel or a separate entry or disarming station. Typically, the target object 20 will be located near an entrance or door so that a user can arm or disarm the security system wh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A security system control system using a host object with a near field communication device and a target object with a near field communication device. The target object broadcasts a carrier signal to the host object. Using the near field communication device, the host object modulated identification information on the carrier signal and broadcasts the modulated signal. The target object demodulates the signal to determine if a user associated with the identification information is authorized to perform the intended control function. The target object determines the intended control function based upon a detection criterion. The target object causes the intended control function to be performed if the associated user is authorized to control the intended control function such as to arm or disarm the security system. The identification information can expired after a predetermined period of time. The target object updates the identification information after expiration.

Description

technical field [0001] The present invention generally relates to security systems and communication systems. More particularly, the present invention relates to controlling a security system with a remote object by transmitting radio frequency signals to a target device including a receiver and a transmitter capable of receiving and transmitting radio frequency signals. Background technique [0002] Security systems in both residential and commercial environments are well known and commonplace as people seek to protect themselves and their belongings. Security systems include any life, safety and property protection systems. Security devices including user interface keypads, control panels, and multiple sensors are installed in residential or commercial buildings. Both the installer and the security device owner can use the user interface keypad to control, configure, and manage the security device. Such control functions include arming the security device when leaving t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G07C9/00G06K7/08G06K19/07
CPCG07C9/00817
Inventor K·L·阿迪
Owner HONEYWELL INT INC