RFID reader for a security network

ABSTRACT

An RFID reader for use in a security network based upon RFID techniques. The RFID reader can use wireless communications to communicate with RFID transponders and other devices in the security network. The RFID reader of the security network can be provided with multiple modulation techniques, multiple antennas, and the capability to vary its power level and carrier frequency. The RFID reader can transmit RF energy useful for detecting motion or for charging the batteries in RFID transponders. The RFID reader can contain an audio transducer, a camera, or various environmental sensors to detect parameters such as smoke, temperature, and water, among others. The program code of the RFID reader can be updated. A master controller within the security network can control operations within the RFID reader.

CROSS REFERENCE TO RELATED APPLICATIONS

[0001] This patent application is a continuation-in-part of U.S.application Ser. No. 10/423,887, RFID Based Security Network, attorneydocument number RFID-0106, filed Apr. 28, 2003 by the inventor of thepresent application. This patent application is further cross referencedto the patent application filed on Feb. 3, 2003, titled RFID BasedSecurity System, by the inventor of the present application, attorneydocument number RFID-0100 (U.S. application Ser. No. 10/356,512). Thispatent application is further cross referenced to the following patentapplications, all filed Feb. 14, 2003 by the inventor of the presentapplication:

[0002] Communications Control in a Security System, RFID-0101 (Ser. No.10/366,320);

[0003] Device Enrollment in a Security System, RFID-0102 (Ser. No.10/366,335);

[0004] Controller for a Security System, RFID-0103 (Ser. No.10/366,334);

[0005] RFID Transponder for a Security System, RFID-0104 (Ser. No.10/366,317);

[0006] RFID Reader for a Security System, RFID-0105 (Ser. No.10/366,316).

[0007] All of the foregoing cross referenced patent applications areincorporated by reference into this present patent application.

BACKGROUND OF THE INVENTION

[0008] Security systems and home automation networks are described innumerous patents, and have been in prevalent use for over 40 years. Inthe United States, there are over 14 million security systems inresidential homes alone. The vast majority of these systems arehardwired systems, meaning the keypad, system controller, and variousintrusion sensors are wired to each other.

[0009] These systems are easy to install when a home is first beingconstructed and access to the interiors of walls is easy; however thecost increases substantially when wires must be added to an existinghome. On average, the security industry charges approximately $75 peropening (i.e. window or door) to install a wired intrusion sensor (suchas a magnet and reed switch), where most of this cost is due to thelabor of drilling holes and running wires to each opening. For thisreason, most homeowners only monitor a small portion of their openings.This is paradoxical because most homeowners actually want securitysystems to cover their entire home.

[0010] In order to induce a homeowner to install a security system, manysecurity companies will underwrite a portion of the costs of installinga security system. Therefore, if the cost of installation were $1,500,the security company may only charge $500 and then require the homeownerto sign a multi-year contract with monthly fees. The security companythen recovers its investment over time. Interestingly enough, if ahomeowner wants to purchase a more complete security system, the revenueto the security company and the actual cost of installation generallyrise in lockstep, keeping the approximate $1,000 investment constant.This actually leads to a disincentive for security companies to installmore complete systems—it uses up more technician time without generatinga higher monthly contract or more upfront profit. Furthermore, spendingmore time installing a more complete system for one customer reduces thetotal number of systems that any given technician can install per year,thereby reducing the number of monitoring contracts that the securitycompany obtains per year.

[0011] In order to reduce the labor costs of installing wired systemsinto existing homes, wireless security systems have been developed inthe last 10 to 20 years. These systems use RF communications for atleast a portion of the keypads and intrusion sensors. Typically, atransceiver is installed in a central location in the home. Then, eachopening is outfitted with an intrusion sensor connected to a smallbattery powered transmitter. The initial cost of the wireless system canrange from $25 to $50 for each transmitter, plus the cost of thecentrally located transceiver. This may seem less that the cost of awired system, but in fact the opposite is true over a longer timehorizon. Wireless security systems have demonstrated lower reliabilitythan wired systems, leading to higher service and maintenance costs. Forexample, each transmitter contains a battery that drains over time(perhaps only a year or two), requiring a service call to replace thebattery. Many of these transmitters lose their programming when thebattery dies, requiring reprogramming along with the change of battery.Further, in larger houses, some of the windows and doors may be anextended distance from the centrally located transceiver, causing thewireless communications to intermittently fade out.

[0012] These types of wireless security systems generally operate under47 CFR 15.231 (a), which places severe limits on the amount of powerthat can be transmitted. For example, at 433 MHz, used by the wirelesstransmitters of one manufacturer, an average field strength of only 11mV/m is permitted at 3 meters (equivalent to approximately 36microwatts). At 345 MHz, used by the wireless transmitters of anothermanufacturer, an average field strength of only 7.3 mV/m is permitted at3 meters (equivalent to approximately 16 microwatts). Furthermore,control transmissions are only permitted once per hour, with a durationnot to exceed one second. If these same transmitters wish to transmitdata under 47 CFR 15.231 (e), the average field strengths at 345 and 433MHz are reduced to 2.9 and 4.4 mV/m, respectively. (In a proceedingopened in October, 2001, the FCC is soliciting comments from theindustry under which some of the rules of this section may change.) Theproblems of using these methods of transmission are discussed in variouspatents, including U.S. Pat. Nos. 6,087,933, 6,137,402, 6,229,997,6,288,639, and 6,294,992. In addition, as disclosed in U.S. Pat. No.6,026,165 since centrally located transceivers must have a rangesufficient to attempt to reach throughout the house these transceiverscan also transmit and receive signals to/from outside the house and aretherefore vulnerable to hacking by sophisticated intruders. Therefore,for the foregoing reasons and others, a number of reputable securitymonitoring companies strongly discourage the use of wireless securitysystems.

[0013] In either wired or wireless prior art security systems,additional sensors such as glass breakage sensors or motion sensors arean additional cost beyond a system with only intrusion sensors. Eachglass breakage or motion sensor can cost $30 to $50 or more, notcounting the labor cost of running wires from the alarm panel to thesesensors. In the case of wireless security systems, the glass breakage ormotion sensor can also be wireless, but then these said sensors sufferfrom the same drawback as the transmitters using for intrusionsensing—they are battery powered and therefore require periodicservicing to replace the batteries and possible reprogramming in theevent of memory loss.

[0014] Because existing wireless security systems are not reliable andwired security systems are difficult to install, many homeowners foregoself-installation of security systems and either call professionals ordo without. It is interesting to note that, based upon the rapid growthof home improvement chains such as Home Depot and Lowe's, there is alarge market of do-it-yourself homeowners that will attempt carpentry,plumbing, and tile—but not security. There is, therefore, an establishedneed for a security system that is both reliable and capable of beinginstalled by the average homeowner.

[0015] Regardless of whether a present wired or wireless security systemhas been installed by a security company or self-installed, almost allpresent security systems are capable of only monitoring the house forintrusion, fire, or smoke. These investments are technology limited to asubstantially single purpose. There would be a significant advantage tothe homeowner if the security system were also capable of supportingadditional home automation and lifestyle enhancing functions. There is,therefore, an apparent need for a security system is actually a networkof devices serving many functions in the home.

[0016] Radio Frequency Identification, or RFID, technology has been inexistence for over 40 years, with substantial development by a number oflarge companies. A search of the USPTO database will reveal severalhundred RFID-related patents. Surprisingly, though, a number of largecompanies such as Micron and Motorola have exited the RFID business asthe existing applications for RFID have not proved lucrative enough.Most development and applications for RFID technology have been targetedat moveable items—things, people, animals, vehicles, merchandise, etc.that must be tracked or counted. Therefore, RFID has been applied toanimal tracking, access control into buildings, inventory management,theft detection, toll collections, and library and supermarket checkout.In each of the applications, the low-cost RFID transponder or tag isaffixed to the moveable object, and the RFID reader is generally a muchhigher cost transceiver. The term “RFID reader” or “RFID interrogator”is commonly used in the industry to refer to any transceiver devicecapable of transmitting to and receiving signals from RFID tags or RFIDtransponders. The terms “RFID tag” or “RFID transponder” are commonlyused interchangeably in the industry to refer to the device remote fromthe RFID reader, with which the RFID reader is communicating. Forexample, in a building access application, an RFID reader is usuallyaffixed near the entrance door of a building. Persons desiring access tothe building carry an RFID tag or RFID transponder, sometimes in theform of an ID card, and hold this RFID tag or RFID transponder next toor in the vicinity of the RFID reader when attempting entry to thebuilding. The RFID reader then “reads” the RFID tag, and if the RFID tagis valid, unlocks the entrance door.

[0017] The relative high cost (hundreds to thousands of dollars) of RFIDreaders is due to the requirement that it perform reliably in eachmobile application. For example, the RFID reader for a toll collectionapplication must “read” all of the RFID tags on cars traveling 40 MPH ormore. Similarly, access control must read a large number of RFID tags ina brief period of time (perhaps only hundreds of milliseconds) whilepeople are entering a building. Or a portable RFID reader must readhundreds or thousands of inventory RFID tags simultaneously while theoperator is walking around a warehouse. Each of these applications canbe fairly demanding from a technical standpoint, hence the need forsophisticated and higher cost readers. To date, RFID technology has notbeen applied to the market for security systems in homes or businesses.

[0018] It is therefore an object of the present invention to providesecurity system for use in residential and commercial buildings that canbe self-installed or installed by professionals at much lower cost thanpresent systems. It is a further object of the present invention toprovide a combination of RFID transponders and RFID readers that can beused in a security system for buildings.

BRIEF SUMMARY OF THE INVENTION

[0019] The present invention is a highly reliable system and method forconstructing a security system, or security network, for a buildingcomprising a network of devices and using a novel approach to designingRFID readers and RFID transponders to provide the radio link betweeneach of a number of openings and a controller function 250 capable ofcausing an alert in the event of an intrusion.

[0020] The present invention improves upon the traditional system modeland paradigm by providing a security system with reliability exceedingthat of existing wireless security systems, at lower cost than eitherprofessionally installed hardwired systems or wireless security systems.The present invention also allows self-installation, includingincremental expansion, by typical homeowners targeted by the major homeimprovement chains. In the case of already installed security systems,present in more than 14 million residential homes, the present inventionalso provides an RFID reader that can be wired to and powered fromexisting control panels, directly or indirectly.

[0021] Several new marketing opportunities are created for securitysystems that are otherwise unavailable in the market today. First, forprofessional systems sold by major alarm companies, a single customerservice representative may sell the system to a homeowner and theninstall the system in a single visit to the customer's home. This is incontrast to the present model where a salesperson sells the system andthen an installer must return at a later date to drill holes, pullwires, and otherwise install the system. Second, there is a productupgrade available for existing systems whereby the scope of securitycoverage can be increased by adding RFID readers and RFID transpondersto an existing control panel. Third, homeowners may purchase theinventive system at a home improvement chain, self-install the system,and contract for alarm monitoring from an alarm services company. Theoverall system cost is lower, and the alarm services company is notrequired to underwrite initial installation costs, as is presently donetoday. Therefore, the alarm services company can offer monitoringservices at substantially lower prices. Fourth, a new market forapartment dwellers opens up. Presently, very few security systems areinstalled in apartments because building owners are unwilling to permitthe drilling of holes and installation of permanent systems. Apartmentdwellers are also more transient than homeowners and therefore mostapartment dwellers and alarm service companies are unwilling tounderwrite the cost of these systems anyway. The inventive system is notpermanent, nor is drilling holes for hardwiring required. Therefore, anapartment dweller can purchase the inventive security system, use it inone apartment, and then unplug and move the system to another apartmentlater.

[0022] The improvements provided by the present invention areaccomplished through the following innovations. The first innovation isthe design of a low cost RFID reader that can be installed onto anoutlet and cover an area the size of a large room in the example of ahouse. Rather than rely on the centrally located transceiver approach ofexisting unreliable wireless security systems, the present inventionplaces the RFID reader into each major room for which coverage isdesired. The RFID reader has a more limited range than the centrallylocated transceiver, and is therefore less susceptible to hacking bysophisticated intruders. For the example of smaller to medium sizedhouses, a single RFID reader may be able to cover more than one room.Furthermore, the presence of multiple RFID readers within a buildingprovides spatial receiver diversity.

[0023] The second innovation is the design of a low cost RFID readerthat can be installed in conjunction with the control panels of existingsecurity systems, in particular wired security systems that can makepower available to the RFID reader in the same manner as control panelsmake power available to prior art motion detectors, glass breakagedetectors, and other sensors.

[0024] The third innovation is the use of an RFID transponder totransmit data from covered openings and sensors. As is well known thereis at least an order of magnitude difference in the manufacturing costsof RFID transponders versus present wireless security systemtransmitters. This is due both to difference in design, as well asmanufacturing volumes of the respective components used in the twodifferent designs.

[0025] The fourth innovation is the provision of a circuitry in both theRFID reader and the RFID transponder for the charging of any batteryincluded in the RFID transponder. For some installations, a battery maybe used in the RFID transponder to increase the range and reliability ofthe RF link between reader and transponder. The present problem of shortbattery life in wireless security system transmitters is overcome by thetransfer of power through radio waves.

[0026] The RFID reader receives its power from a permanent power sourcesuch as standard AC outlets, and converts some of this power into RFenergy, which can then be received by the RFID transponder and used forbattery charging.

[0027] The fifth innovation is the status monitoring of the need forbattery charging. The RFID transponder can indicate to the RFID readerwhen power for charging is required. If desired, the RFID reader canshut off its transmitter if no power transfer is required, therebyreducing RF emissions and any possible interference.

[0028] The sixth innovation is the use of multiple forms ofcommunications, providing different levels of communications cost,security, and range. The lowest cost and most prevalent form ofcommunications is expected to be active RF communications, operatingunder 47 CFR 15.247.

[0029] Thus an RFID reader can perform both RFID functions and RFcommunications using shared RF circuits and antennas. The system canalso include the use of power line carrier communications, if desired,between the RFID readers and one or more other devices. Also, the RFIDreaders can be hardwired to a control panel or controller. Relative tohardwiring, a significant installation cost advantage is obtained byallowing the RFID readers to “piggyback” on the standard AC power linesalready in the building. By using the RF communications or power linecarrier connection technique, an example homeowner can simply plug inthe controller to a desired outlet, plug in the RFID readers in anoutlet in the desired covered rooms, configure the system and the systemis ready to begin monitoring RFID transponders.

[0030] The seventh innovation is the optional inclusion of a glassbreakage or motion sensor into the RFID reader. In many applications, anRFID reader will be likely be installed into each major room of a house,using the same example throughout this document. Rather than require aseparate glass breakage or motion sensor as in prior art securitysystems, a form of the RFID reader includes a glass breakage or motionsensor within the same integrated package, providing a further reductionin overall system cost when compared to prior art systems.

[0031] The eighth innovation is the permitted use of multipledistributed controller functions in the security system. In the presentinvention, the controller function can be located within RFID readers,the keypad for the security system, or even the alarm panel of a priorart security system. Therefore, a homeowner or building owner installingmultiple devices will also simultaneously be installing multiplecontroller functions. The controller functions operate in a redundantmode with each other. Therefore, if an intruder discovers and disables asingle device containing a controller function, the intruder may stillbe detected by the any of the remaining installed devices containingcontroller functions.

[0032] The ninth innovation is the permitted optional use of thetraditional public switched telephone network (i.e. PSTN—the standardhome phone line), the integrated use of a commercial radio mobileservice (CMRS) such as a TDMA, GSM, or CDMA wireless network, or the useof a broadband internet network via Ethernet or WiFi connection forcausing an alert at an emergency response agency such as an alarmservice company. In particular, the use of a CMRS network provides ahigher level of security, and a further ease of installation. The higherlevel of security results from (i) reduced susceptibility of thesecurity system to cuts in the wires of a PSTN connection, and (ii)optional use of messaging between the security system and an emergencyresponse agency such that any break in the messaging will in itselfcause an alert.

[0033] Additional objects and advantages of this invention will beapparent from the following detailed description.

BRIEF DESCRIPTION OF THE DRAWINGS

[0034]FIG. 1 shows the RFID reader communicating with RFID transpondersand other transmitters.

[0035]FIG. 2A shows the three means by which the RFID reader and gatewaycan communicate with each other.

[0036]FIG. 2B shows an example network architecture if the RFID readersand gateways used power line carrier communications.

[0037]FIG. 2C shows an example network architecture if the RFID readersand gateways used active RF communications.

[0038]FIG. 3 shows a generalized network architecture of the securitynetwork.

[0039]FIG. 4 shows the distributed manner in which the present inventionwould be installed into an example house.

[0040]FIG. 5A shows a generalized architecture of a device in thesecurity system containing a control function.

[0041]FIG. 5B shows the control functions in multiple devices logicallyconnecting to each other.

[0042]FIG. 6 shows the multiple ways in which a gateway can beconfigured to reach different private and external networks.

[0043]FIG. 7 shows some of the multiple ways in which a gateway can beconfigured to reach emergency response agencies and other terminals.

[0044]FIG. 8 shows an example layout of a house with multiple RFIDreaders, and the manner in which the RFID readers may form a network touse wireless communications to reach a gateway.

[0045]FIG. 9 shows the architecture of the RF reader.

[0046]FIG. 10 shows the architecture of the gateway.

[0047]FIG. 11 shows the architecture of the RF transponder.

[0048]FIG. 12 shows the architecture of the RF transponder with anamplifier.

[0049]FIG. 13 is a flow chart for a method of providing a remotemonitoring function.

[0050]FIG. 14 shows the manner in which an RFID reader can be connectedto a controller that is designed to interface with a prior art alarmpanel.

[0051]FIG. 15 shows the manner in which an RFID reader can be connectedto a controller that is part of a prior art alarm panel.

[0052]FIG. 16 shows an example configuration in which power line carriercommunications is used.

[0053]FIG. 17 shows an example embodiment of an RF reader without anacoustic transducer, and in approximate proportion to a standard poweroutlet.

[0054]FIG. 18A shows an example embodiment of an RF reader with anacoustic transducer.

[0055]FIG. 18B shows an example embodiment of an RF reader integratedwith an outlet.

[0056]FIGS. 19A and 19B show one means by which the controller or RFIDreader may be mounted to a plate, and then mounted to an outlet.

[0057]FIGS. 20A and 20B show the locations on the RFID reader wherepatch or microstrip antennas may be mounted so as to provide directivityto the transmissions.

[0058]FIG. 21 shows an example embodiment of a keypad and display.

[0059]FIG. 22 shows one means by which the keypad may be mounted onto anelectrical box while permitting a light switch to protrude.

[0060]FIG. 23A shows an example embodiment of a passive infrared sensorintegrated into a light switch.

[0061]FIG. 23B shows an example embodiment of a gateway.

[0062]FIGS. 24A and 24B show alternate forms of a passive infraredsensor that may be used with the security system.

[0063]FIGS. 25A and 25B show examples of LED generators and LEDdetectors that may be used as intrusion sensors.

[0064]FIG. 26 shows examples of corner antennas for RFID transpondersand examples of window frames in which they may be mounted.

DETAILED DESCRIPTION OF THE INVENTION

[0065] The present invention is a highly reliable system and method forconstructing a security system, or security network, for use in abuilding, such as a commercial building, single or multifamilyresidence, or apartment. For consistency with the cross referencedapplications, the term security system shall be used throughout, thoughin the context of this present application, the terms security systemand security network shall be considered interchangeable as they applyto the present invention. The security system may also be used forbuildings that are smaller structures such as sheds, boathouses, otherstorage facilities, and the like. Throughout this specification, aresidential house will be used as an example when describing aspects ofthe present invention. However, the present invention is equallyapplication to other types of buildings.

[0066] There are 4 primary elements to the security system: an intrusionsensor 600, an RFID transponder 100, an RFID reader 200, and acontroller function 250. FIG. 1 shows a very basic configuration of thesecurity system with a single RFID reader 200 communicating with severalRFID transponders 100, one of which has an associated intrusion sensor600, one of which has any one of several other sensors 620, an a thirdwhich has no sensor. The controller function 250 is not shown in thediagram, but is present in the RFID reader 200.

[0067] A security system with a single RFID reader 200 can be expandedto support multiple RFID readers 200. In addition, the system cancommunicate with external networks 410 using a device known as a gateway300. FIGS. 2A, 2B, and 2C show the means by which multiple RFID readers200 and gateways 300 communicate with each other in the security system.FIG. 2A shows three available connections: via active RF communications422, via power line carrier communications 202 over the power lines 430,or via hardwire connection 431. FIG. 2B shows communications via powerline carrier communications 202, where any of the devices can directlyconnect to any of the other devices. FIG. 2C shows a network in whichactive RF communications 422 is used; some of the devices can directlycommunicate with each other and some pairs of devices can onlycommunicate through one or more intermediate devices. FIG. 8 shows anexample of how the logical architecture of FIG. 2C might appear in asample residence.

[0068] Regardless of the form of communications chosen by any onedesigner or installer of this system, all of the devices, onceinstalled, form a security network 400 with each other as shown in FIG.3. That is, the physical connection means is separated from the logicalnetworking software, and regardless of physical connection means, thedevices of the security system become aware of and communicate with eachother. FIG. 3 shows various examples of the types of devices that can becontained and can communicate within a security system. As can befurther seen in FIG. 3, different example gateways 300, 510, and 520show how the devices in the security system can also communicate tonetworks and devices external to the security system.

[0069] In addition to the primary elements of the security system, otherdevices 550 and functions can be added and integrated. In the context ofthis application, the term “other device 550” means generically anypowered device generally following the architecture shown in FIG. 5A,and includes RFID readers 200, gateways 300, email devices 530, sirendevices 530, camera/audio devices 540, as well as devices notspecifically identified here but designed to operate in the inventivesecurity system by connecting to the security network 400 and capable ofcommunicating over the security network 400 with example devices shownin FIG. 5A.

[0070] A keypad 500 may be added to provide a method for user interface.A gateway 300 can be provided to enable communications between thesecurity system and external networks 410 such as, for example, asecurity monitoring company. The gateway 300 may also convert protocolsbetween the security system and a WiFi network 401 or a USB port of acomputer 450. A siren 551 may be added to provide loud noise-makingcapability. An email terminal 530 can be added to initiate and receivemessages to/from external networks 410 and via a gateway 300. Othersensors 620 may be added to detect fire, smoke, heat, water,temperature, vibration, motion, as well as other measurable events oritems. A camera and/or audio terminal 540 may be added to enable remotemonitoring via a gateway 300. A keyfob 561 may be added to enablewireless function control of the security system. This list of devicesthat can be added is not intended to be exhaustive, and other types canalso be created and added as well.

[0071] The distributed nature of the security system is shown in theexample layout in FIG. 4 for a small house. At each opening in thehouse, such as windows 702 and doors 701, for which monitoring isdesired, an intrusion sensor 600 and RFID transponder 100 are mounted.In a pattern determined by the layout of the house or building intowhich the security system is to be installed, one or more RFID readers200 are mounted. Each RFID reader 200 is in wireless communications withone or more RFID transponders 100. Each RFID reader 200 is also incommunications with one or more other RFID readers 200, each of whichmay contain a controller function 250, wherein the form of thecommunications can vary depending upon the embodiments of the RFIDreaders 200. In general, each RFID reader 200 is responsible for theRFID transponders 100 in a predetermined read range of each RFID reader200. As is well understood to those skilled in the art, the range ofwireless communications is dependent, in part, upon many environmentalfactors in addition to the specific design parameters of the RFIDreaders 200 and RFID transponders 100.

[0072] According to US Census Bureau statistics, the median size ofone-family houses has ranged from 1,900 to 2,100 square feet (176 to 195square meters) in the last ten years, with approximately two-thirdsunder 2,400 square feet (223 square meters). This implies typical roomsin the house of 13 to 20 square meters, with typical wall lengths ineach room ranging from 3 to 6 meters. It is likely in many residentialhomes that most installed RFID readers 200 will be able to communicatewith RFID transponders 100 in multiple rooms. Therefore, in many caseswith this system it will be possible to either install fewer RFIDreaders 200 than major rooms in a building, or to follow the guidelineof one RFID reader 200 per major room, creating a system with excellentspatial antenna diversity as well as redundancy in the event of singlecomponent failure.

[0073] The RFID reader 200 can be installed in various locations withina house or building. The choice of location is at the convenience of theinstaller or building occupant, and is typically chosen to provide goodwireless propagation ability. In a residential house example, the RFIDreader 200 can be installed in a room, a hallway, in the attic above aroom, or in the basement/crawl space below a room. When installed in aroom or a hallway, the RFID reader 200 may either be (i) mounted on awall/ceiling and obtain its power remotely in a manner similar to priorart motion detectors, or (ii) be mounted on or near an outlet and obtainits power locally from the aforesaid outlet. The choice of installationlocation will determine the physical shape and embodiment of the RFIDreader 200, but the primary function will remain the same.

[0074] There are several elements that will typically be common to alldevices part of the security system. One element, networking, hasalready been shown in FIGS. 2 and 3. In a typical installation, the mostnumerous powered device installed will be RFID readers 200. The RFIDreader 200 is the central element in the security system, and ittypically capable of several basic and optional forms of communications.The first basic form is backscatter modulation 420 techniques, used tocommunicate with the RFID transponders 100. The second basic form isactive RF communications 422, used to communicate with other powereddevices within the security system such as other RFID readers 200,gateways, etc. In the context of this present application, both formsare wireless communications, but active RF communications 422 isdifferentiated from backscatter modulation 420 in that (i) backscattermodulation 420 relies on an RFID reader 200 to initiate a wirelesscommunications and an RFID transponder 100 can only respond with awireless communications 421 that is based upon or derived from thewireless transmissions originated by the RFID reader 200, and (ii)active RF communications is that which independently originated from anypowered device in the security system using its own generated carrierfrequency independent of any other device. The first optional form ofcommunications is power line carrier communications 202 that travelsover standard power lines 430. The second optional form ofcommunications is a hardwired connection 431. Each of thesecommunications means will be discussed in more detail below.

[0075] A second common element is the controller function 250. Prior artalarm panels typically contain a single controller, and all othercontacts, motion detectors, etc. are fairly dumb from an electronics andsoftware perspective. For this reason, the alarm panel must be hidden inthe house because if the alarm panel were discovered and disabled, allof the intelligence of the system would be lost. The controller function250 of the present invention is distributed through most, if not all, ofthe powered devices in the security system. The controller function 250is a set of software logic that can reside in the processor and memoryof a number of different devices within the security system, includingwithin the RFID reader 200. FIG. 5A shows a generalized architecture forany device used in the security system. Elements common to most deviceswill be power 264, a processor 261, memory 266 associated with theprocessor, and the chosen networking 262. If the memory 266 is of anappropriate type and size, the memory 266 can contain a controllerfunction 250, consisting of both program code 251 and configuration data252. The program code 251 will generally contain both controllerfunction 250 code common to all devices as well as code specific to thedevice type. For example, an RFID reader 200 will have certain devicespecific hardware 263 that requires matching code, and a gateway 300 mayhave different device specific hardware 263 that requires differentmatching code.

[0076] When multiple devices are installed in a system, the controllerfunctions 250 in the different devices become aware of each other, andshare configuration data 252 and updated program code 251. The updatedprogram code 251 can consist if either a later released version of theprogram code 251, or can consist of device specific code or parameters.For example, if a new type of device is developed and then installedinto an existing system, the older devices in the system may requireupdated program code 251 or parameters in order to effectively managethe new device.

[0077] Independent of the physical communications layer, each controllerfunction 250 in each device can communicate with all other controllerfunctions 250 in all other devices as shown in FIG. 5B. The purpose ofreplicating the controller function 250 on multiple devices is toprovide a high level of redundancy throughout the entire securitysystem, and to reduce or eliminate possible points of failure (whethercomponent failure, power failure, or disablement by an intruder). Thecontroller functions 250 implemented on each device performsubstantially the same common functions, therefore the chances of systemdisablement by an intruder are fairly low.

[0078] When there are multiple controller functions 250 installed in asingle security system, the controller functions 250 arbitrate amongthemselves to determine which controller function 250 shall be themaster controller for a given period of time. The preferred arbitrationscheme consists of a periodic self-check test by each controllerfunction 250, and the present master controller may remain the mastercontroller as long as its own periodic self-check is okay and reportedto the other controller functions 250 in the security system. If thepresent master controller fails its self-check test, or has simplyfailed for any reason or been disabled, and there is at least one othercontroller function 250 whose self-check is okay, the failing mastercontroller will abdicate and the other controller function 250 whoseself-check is okay will assume the master controller role. In theinitial case or subsequent cases where multiple controller functions 250(which will be ideally be the usual case) are all okay after periodicself-check, then the controller functions 250 may elect a mastercontroller from among themselves by each choosing a random number from arandom number generator, and then selecting the controller function 250with the lowest random number. There are other variations of arbitrationschemes that are widely known, and any number are equally useful withoutdeducting from the inventiveness of permitting multiple controllerfunctions 250 in a single security system, as long as the result is thatin a multi-controller function 250 system, no more than one controllerfunction 250 is the master controller at any one time. In amulti-controller function 250 system, one controller function 250 ismaster controller and the remaining controller functions 250 are slavecontrollers, keeping a copy of all parameters, configurations, tables,and status but not duplicating the actions of the master controller.

[0079] In a system with multiple controller functions 250, the securitysystem can receive updated program code 251 and selectively update thecontroller function 250 in just one of the devices. If the single deviceupdates its program code 251 and operates successfully, then the programcode 251 can be updated in other devices. If the first device cannotsuccessfully update its program code 251 and operate, then the firstdevice can revert to a copy of older program code 251 still stored inother devices. Because of the distributed nature of the controllerfunctions 250, the security system of the present invention does notsuffer the risks of prior art alarm panels which had only onecontroller.

[0080] The controller function 250 typically performs the followingmajor logic activities, although the following list is not meant to belimiting:

[0081] configuration of the security system whereby each of the othercomponents are identified, enrolled, and placed under control of themaster controller,

[0082] receipt and interpretation of daily operation commands executedby the homeowner or building occupants including commands whereby thesystem is placed, for example, into armed or monitoring mode or disarmedfor normal building use,

[0083] communications with other controller functions 250, if present,in the system including exchange of configuration information and dailyoperation commands as well as arbitration between the controllerfunctions 250 as to which controller function 250 shall be the mastercontroller,

[0084] communications with various external networks 410 for purposessuch as sending and receiving messages, picture and audio files, new orupdated program code 251, commands and responses, and similar functions,

[0085] communications with RFID readers 200 and other sensors 620 anddevices 550, such as passive infrared sensors 570, in the securitysystem including the sending of various commands and the receiving ofvarious responses and requests,

[0086] processing and interpretation of data received from the RFIDreaders 200 including data regarding the receipt of various signals fromthe sensors and RFID transponders 100 within read range of each RFIDreader 200,

[0087] monitoring of each of the sensors, both directly and indirectly,to determine, for example, whether a likely intrusion has occurred,whether glass breakage has been detected, or whether motion has beendetected by a microwave- and/or passive infrared-based device,

[0088] deciding, based upon the configuration of the security system andthe results of monitoring activity conducted by the controller function250, whether to cause an alert or take another event based action,

[0089] causing an alert, if necessary, by some combination of audibleindication such as via a siren device 551, or using a gateway 300 todial through the public switched telephone network (PSTN) 403 to delivera message to an emergency response agency 460, or sending a messagethrough one or more commercial mobile radio service (CMRS) 402 operatorsto an emergency response agency 460.

[0090] Many homeowners desire monitoring of their security systems by analarm services company. The inventive security system permits monitoringas well as access to various external networks 410 through a gatewaydevice 300. There is actually not a single gateway 300, but rather afamily of gateway devices 300, each of which permit access from thesecurity network 400 to external devices and networks using differentprotocols and physical connection means. Each gateway 300 is configuredwith appropriate hardware and software that match the external network410 to which access is desired. As shown in FIG. 6, examples of externalnetworks 410 to which access can be provided are private Ethernets 401,CMRS 402, PSTN 403, WiFi 404, and the Internet 405. This list ofexternal networks 400 is not meant to be limiting, and appropriatehardware and software can be provided to enable the gateway 300 toaccess other network formats and protocols as well. Private Ethernets401 are those which might exist only within a building or residence,servicing local computer terminals 450. If the gateway 300 is connectedto a private Ethernet 401, access to the Internet 405 can then beprovided through a cable modem 440, DSL 441, or other type of broadbandnetwork 442. There are too many suppliers to enumerate here.

[0091] A block diagram of the gateway 300 is shown in FIG. 10; it can beseem that the specific architecture of the gateway 300 follows thegeneric device architecture previously shown in FIG. 5A. The major logicfunctions, including a controller function 250, are implemented in thefirmware or software executed by the microprocessor 303 of the gateway300. The microprocessor 303 contains non-volatile memory 304 for storingthe controller function 250 firmware or software as well as theconfiguration of the system. The gateway 300 typically has its own powersupply 308 and can also contain a backup battery 309, if desired, foruse in case of loss of normal power. The gateway 300 will typicallystore the controller function 250 configuration information in the formof one or more tables in non-volatile memory 304. The table entriesenable the gateway 300 to store the identity of each RFID reader 200 andother devices, along with the capabilities of each RFID reader 200 andother device, the identity of each RFID transponder 100, along with thetype of RFID transponder 100 and any associated intrusion sensors 600,and the association of various sensors in the system. For example, asdiscussed later, it is advantageous for the controller function 250 toassociate particular passive infrared sensors 570 with particular RFIDreaders 200 containing a microwave Doppler motion function. With respectto each RFID transponder 100, the table entries may further containradio frequency, power level, and modulation technique data. These tableentries can enable the controller function 250 to command an RFID reader200 to use a particular combination of radio frequency, modulationtechnique, antenna, and power level for a particular RFID transponder100, wherein the combination used can vary when communicating with eachseparate RFID reader 200, RFID transponder 100, or other device 551.Furthermore, the tables may contain state information, such as thereported status of any battery 111 included with an RFID transponder100. One embodiment of the gateway 300 can take the form shown in FIG.23B.

[0092] The security system permits the installation of multiple gateways300 in a single security network 400, each of which can interface to thesame or different external networks 410. For example, a second gateway300 can serve to function as an alternate or backup gateway 300 forcases in which the first gateway 300 fails, such as component failure,disablement or destruction by an intruder, or loss of power at theoutlet where the first gateway 300 is plugged in.

[0093] The gateway 300 will typically communicate with the RFID readers200 using any of active RF communications 422 through an RF interface305, analog interface 306, and antenna 307, a power line carrierprotocol 202, or hardwire interface 209. There are tradeoffs to considerwith each form of communications. Active RF communications 422 willrequire that the gateway 300 be within RF propagation range of otherdevices, such as RFID readers 200. In a typical 2,100 square foot house,this will generally not be a problem, especially given the allowed powerlimits (as discussed below). Power line carrier protocols 202 can extendthe range of communications, but are susceptible to interference on thepower line 430 and interruption if the breaker for that power circuit“trips”. Hardwire communications 209 is the most reliable because it isdedicated; however, it entails the cost of installing dedicated wires431.

[0094] In general, the homeowner or building owner receives maximumbenefit of this inventive security system by avoiding the installationof additional wires. Since active RF communications 422 will bediscussed elsewhere power line communications 202 will be discussedhere. Power line carrier 202 protocols allow the sending of data betweendevices using the existing power lines 430 in a building. One of thefirst protocols for doing this is known as the X-10 protocol. However,there are now a number of far more robust protocols in existence. Onesuch protocol is known as CEBus (for Consumer Electronics Bus), whichwas standardized as EIA600. There are a growing number of otherdevelopers of power line carrier 202 protocols such as Easyplug/Inari,Itran Communications, nSine, and Intellon. For the inventive securitysystem, the primary driver for deciding upon a particular power linecarrier protocol is the availability of chipsets, reference designs, andrelated components at high manufacturing volumes and at lowmanufacturing cost. Furthermore, compatibility with other products inthe home automation field would be an additional advantage. If powerline carrier communications 202 were desired by a homeowner or buildingowner, the preferred choice would be the standard HomePlug, embodied inthe Intellon chipset. HomePlug offers sufficient data speeds overstandard power lines 430 at a reported distance of up to 300 meters.That standard operates using frequencies between 4.3 and 20.9 MHz, andincludes security and encryption protocols to prevent eavesdropping overthe power lines 430 from adjacent houses or buildings. However, thespecific choice of which protocol to use is at the designer'sdiscretion, and does not subtract from the inventiveness of this system.

[0095] For various reasons, it is also possible that a particularbuilding owner will not desire to use power line carrier communications202. For example, the occupants of some buildings may be required tomeet certain levels of commercial or military security that precludepermitting signals on power lines 430 that might leak outside of thebuilding. Therefore a form of the gateway 300 may also be configured touse hardwired connections 431 through a hardwire interface 209 to one ormore RFID readers 200.

[0096] Homeowners and building owners generally desire one or two typesof alerts in the event that an intrusion is detected. First, an audiblealert may be desired whereby a loud siren 551 is activated both tofrighten the intruder and to call attention to the building so that anypassers-by may take notice of the intruder or any evidence of theintrusion. However, there are also scenarios in which the building ownerprefers the so called silent alert whereby no audible alert is made soas to lull the intruder into believing he has not been discovered andtherefore may still be there when law enforcement personnel arrive. Thesecond type of alert involves messaging an emergency response agency460, indicating the detection of an intrusion and the identity of thebuilding, as shown in FIG. 7. The emergency response agency 460 may bepublic or private, depending upon the local customs, and so, forexample, may be an alarm services company or the city police department.

[0097] The gateway 300 of the inventive system supports the second typeof foregoing alert by including a slot capable of receiving optionalmodules 310, 311, 312, or 313 which provide respectively, a modemmodule, wireless module, WiFi module, or Ethernet module. These modules310 to 313 are preferably in the form of an industry standard PCMCIA orcompact flash (CF) module 330, thereby allowing the selection of any ofa growing variety of modules made by various vendors manufactured tothese standards. The modem module 310 is used for connection to a publicswitched telephone network (PSTN) 403; the wireless module 311 is usedfor connection to a commercial mobile radio service (CMRS) network 402such as any of the widely available CDMA, TDMA, or GSM-based 2G, 2.5 G,or 3G wireless networks. The WiFi module 312 is used for connection toprivate or public WiFi networks 404; the Ethernet module 313 is use forconnection to private or public Ethernets 401.

[0098] Certain building owners will prefer the high security leveloffered by sending an alert message through a CMRS 402 network or WiFinetwork 404. The use of a CMRS network 402 or WiFi network 404 by thegateway 300 overcomes a potential point of failure that occurs if theintruder were to cut the telephone wires prior to attempting anintrusion. If the building owner has installed at least two gateways 300in the system, one gateway 300 may have a wireless module 311 installedand a second may have a modem module 310 installed. This provides theinventive security system with two separate communication paths forsending alerts to the emergency response agency 460 as shown in FIG. 7.By placing different gateways 300 in very different location in thebuilding, the building owner significantly decreases the likelihood thatan intruder can discover and defeat the security system.

[0099] The controller function 250, in particular when contained in agateway 300 with a wireless module 311 or WiFi module 312, offers aneven higher level of security that is particularly attractive tomarketing the inventive security system to apartment dwellers.Historically, security systems of any type have not been sold andinstalled into apartments for several reasons. Apartment dwellers aremore transient than homeowners, making it difficult for the dweller oran alarm services company to recoup an investment in installing asystem. Of larger issue, though, is the small size of apartmentsrelative to houses. The smaller size makes it difficult to effectivelyhide the alarm panel of prior art security systems, making it vulnerableto discovery and then disconnection or destruction during the pre-alertperiod. The pre-alert period of any security system is the time allowedby the alarm panel for the normal homeowner to enter the home and disarmthe system by entering an appropriate code or password into a keypad.This pre-alert time is often set to 30 seconds to allow for the fumblingof keys, the carrying of groceries, the removal of gloves, etc. In anapartment scenario, 30 seconds is a relatively long time in which anintruder can search the apartment seeking the alarm panel and thenpreventing alert. Therefore, security systems have not been considered aviable option for most apartments. Yet, at least 35% of the householdsin the U.S. live in apartments and their security needs are not lessimportant than those of homeowners.

[0100] The inventive security system includes an additional remotemonitoring function in the controller function 250, which can beselectively enabled at the discretion of the system user, typically foruse with the wireless module 311 or WiFi module 312, but also availablefor use with the Ethernet module 313. Beginning in 2001, most CMRS 402networks based upon CDMA, TDMA, or GSM have supported a feature known astwo-way Short Messaging Service (SMS). Available under many brand names,SMS is a connectionless service that enables the sending of short textmessages between a combination of wireless and/or wired entities. PublicWiFi networks 404 and Ethernet networks, of course, have a similarmessaging capability. The controller function 250 includes a capabilitywhereby the controller function 250 can send a message, via the wirelessmodule 311 or WiFi module 312 and using the SMS feature of CMRS 402networks or messaging feature of WiFi networks 404, to a designatedremote processor at an alarm services company, or other designatedlocation, at the time that a pre-alert period begins and again at thetime that the security system has been disabled by the normal user, suchas the apartment dweller, by entering the normal disarm code.Furthermore, the controller function 250 can send a different message,via the wireless module 311 or WiFi module 312 and using the SMS featureof CMRS networks 402 or messaging feature of WiFi networks 404, to thesame designated processor if the normal user enters an abnormal disarmcode that signals distress, such as when, for example, an intruder hasforced entry by following the apartment dweller home and using a weaponto force the apartment dweller to enter her apartment with the intruderand disarm the security system.

[0101] In logic flow format, the remote monitoring function operates asshown in FIG. 13 and described in more detail below, assuming that thefunction has been enabled by the user:

[0102] An intrusion is detected in the building, such as the apartment,

[0103] the controller function 250 begins a pre-alert period,

[0104] the controller function 250 sends a message via the wirelessmodule 311 or WiFi module 312 to a designated remote processor that maybe remotely monitoring security systems, whereby the message indicatesthe identity of the security system and the transition to pre-alertstate,

[0105] the said designated remote processor begins a timer (for example30 seconds or any reasonable period allowing for an adequate pre-alerttime),

[0106] if the person causing the intrusion is a normal user under normalcircumstances, the normal user will enter the normal disarm code,

[0107] the controller function 250 ends the pre-alert period, and entersa disarmed state,

[0108] the controller function 250 sends a message via the wirelessmodule 311 or WiFi module 312 to the said designated remote processor,whereby the message indicates the identity of the security system andthe transition to disarm state,

[0109] if the person causing the intrusion is an intruder who does notknow the disarm code and/or disables and/or destroys the devicecontaining the controller function 250 of the security system,

[0110] the timer at the said designated remote processor reaches themaximum time limit (30 seconds in this example) without receiving amessage from the controller function 250 indicating the transition todisarm state,

[0111] the said designated remote processor may remotely cause an alertindicating that a probable intrusion has taken place at the locationassociated with the identity of the security system,

[0112] if the person causing the intrusion is an authorized user underdistressed circumstances (i.e. gun to back), the authorized user willenter an abnormal disarm code indicating distress,

[0113] the controller function 250 sends a message via the wirelessmodule 311 or WiFi module 312 to the said designated remote processor,whereby the message indicates the identity of the security system andthe entering of an abnormal disarm code indicating distress,

[0114] the said designated remote processor may remotely cause an alertindicating that an intrusion has taken place at the location associatedwith the identity of the security system and that the authorized user ispresent at the location and under distress.

[0115] As can be readily seen, this inventive remote monitoring functionnow enables the installation of this inventive security system intoapartments without the historical risk that the system can be rendereduseless by the discovery and disablement or destruction by the intruder.With this function enabled, even if the intruder were to disable ordestroy the system, a remote alert could still be signaled because amessage indicating a transition to disarm state would not be sent, and atimer would automatically conclude remotely at the designated processor.This function is obviously not limited to just apartments and could beused for any building.

[0116] With the wireless module 311, WiFi module 312, or Ethernet module313 installed, a gateway 300 can also be configured to send either anSMS-based message through the CMRS 402 or an email message through aWiFi network 404 or Ethernet network 401 to the Internet 405 to anyemail address based upon selected user events. For example, anindividual away from home during the day may want a message sent to hispager, wireless phone, or office email on computer 450 if the inventivesecurity system is disarmed at any point during the day when no one issupposed to be at home. Alternately, a parent may want a message sentwhen a child has retuned home from school and disarmed the securitysystem. Perhaps a homeowner has provided a temporary disarm code to aservice company scheduled to work in the home, and the homeowner wantsto receive a message when the work personnel have arrived and enteredthe home. By assigning different codes to different family membersand/or work personnel, the owner of the security system can discriminateamong the persons authorized to disarm the system. Any message sent, asdescribed herein, can contain an indication identifying the code and/orthe person that entered the disarm code. The disarm code itself is notsent for the obvious security reasons, just an identifier associatedwith the code.

[0117] With the modem module 310, wireless module 311, WiFi module 312,or Ethernet module 313 installed, the gateway 300 can send or receiveupdated software, parameters, configuration, or remote commands, as wellas distribute these updated software, parameters, configuration, orremote commands to other controller functions 250 embedded in otherdevices such as RFID readers 200. For example, once the security systemhas been configured, a copy of the configuration, including all of thetable entries, can be sent to a remote processor for both backup and asan aid to responding to any reported emergency. If, for any reason, allof the controller functions 250 within the security system everexperienced a catastrophic failure whereby its configuration were everlost, the copy of the configuration stored at the remote processor couldbe downloaded to a restarted or replacement controller function 250.Certain parameters, such as those used in glass breakage detection, canbe downloaded to the controller function 250 and then propagated, inthis example, to the appropriate glass breakage detection functions thatmay be contained within the system. Therefore, for example, if ahomeowner were experiencing an unusual number of false alarm indicationsfrom a glass breakage detection function, remote technical personnelcould remotely make adjustments in certain parameters and then downloadthese said new parameters to the controller function 250. Additionally,the operating parameters for new devices can also be downloaded to thecontroller function 250. For example, if a homeowner added a new deviceto the security system several years after initial installation, theparameters for this new type of device might not exist in the controllerfunction 250. The security system could obtain the parameters associatedwith the new device from a site designated by the manufacturer.

[0118] The controller function 250 can also report periodic statusand/or operating problems detected by the system to the emergencyresponse agency 460 or to the manufacturer of the system. One example ofthe usefulness of this function is that reports of usage statistics,status, and/or problems can be generated by an emergency response agency460 and a copy be provided to the customer as part of his monthly bill.Furthermore, the usage statistics of similarly situated customers can becompared and analyzed for any useful patterns.

[0119] The RFID reader 200 is typically designed to be inexpensivelymanufactured since in each installed security system, there may beapproximately one RFID reader 200 for each major room to be monitored.From a physical form factor perspective, the RFID reader 200 of thepresent invention can be made in several embodiments, where the form ofthe embodiment is partially dependent upon whether the RFID reader 200is being used with existing security systems of the prior art or whetherthe RFID reader 200 is being used in a new self-install system.Embodiments particularly useful in self-installed security systems,wherein the RFID reader 200, or other devices 550 such as for examplegateways 300, obtains its power from a nearby standard AC power outlet720 shall hereinafter be termed “self-install embodiments”. In thisembodiment, shown in FIG. 17, the packaging of the RFID reader 200, orother devices 550 such as for example gateways 300, may have the plugintegrated into the package such that the RFID reader 200 or otherdevice 550 is plugged into a standard outlet 720 without any associatedextension cords, power strips, or the like.

[0120] Second embodiments particularly useful with existing securitysystems of the prior art, wherein the RFID reader 200 receives powerdirectly or indirectly via its connection to the power supply of analarm panel such as those of prior art security systems, shallhereinafter be termed “existing embodiments”. In this embodiment, thereceived power will typically be 12 VDC, which is also commonlyavailable to prior art motion detectors and other sensors. FIGS. 14 and15 show the RFID reader 200 as it can be connected, typically viahardwire, to controllers associated with prior art alarm panels.Existing embodiments of the RFID reader 200 will generally not include acontroller function 250. Rather, the controller function 250 may beimplemented using a dedicated processor on a panel interface module 350as shown in FIG. 14 or it may be incorporated into the processor of acontroller 351 associated with the alarm panel of prior art securitysystems. In existing embodiments, the panel interface module 350 andassociated RFID readers 200 derive their power from the power supplyand/or lead acid battery of the prior art alarm panel.

[0121] From a mechanical standpoint, the self-install embodiment of theRFID reader 200, as well as other self-install devices 550 for use inthe inventive security system, such as gateways 300, sirens 551, andother devices 550, is provided with threaded screw holes on the rear ofthe packaging, as shown in FIG. 19A. If desired by the user installingthe system of the present invention, holes can be drilled into a plate722, which may be an existing outlet cover (for example, if the user hasstylized outlet covers that he wishes to preserve) whereby the holes areof the size and location that match the holes on the rear of thepackaging for the RFID reader 200 or the gateway 300, for example.Alternately, the user can employ a plate in the shape of an extendedoutlet cover 721 shown in FIG. 19B which provides additional mechanicalsupport through the use of additional screw attachment points. Then, asshown in FIGS. 19A and 19B, the plate 722 or 721 can be first attachedto the rear of the RFID reader 200 or other device packaging, using thescrews 724 shown, and if necessary, spacers or washers. The RFID reader200 or other example devices 550 can be plugged into the outlet 720,whereby the plate 722 or 721 is in alignment with the sockets of theoutlet 720. Finally, an attachment screw 723 can be used to attach theplate 722 or 721 to the socket assembly of the outlet 720. Thiscombination of screws provides positive mechanical attachment wherebyneither the RFID reader 200 or other example devices can accidentally bejostled or bumped out of the outlet 720. Furthermore, the presence ofthe attachment screw 723 will slow down any attempt to rapidly unplugthe RFID reader 200 or other example devices 550. Existing embodimentsof the RFID reader 200 are not mounted to outlets 720, but rather aremounted in similar fashion to prior art motion detectors.

[0122]FIG. 9 shows a block diagram of the RFID reader 200. Blocks shownin solid lines are typically included in each embodiment of an RFIDreader 200. Blocks shown in dashed lines may or may not be included in aparticular embodiment, depending upon the integration wishes of thedesigner. Generally, the RFID reader 200 will include at a minimum amicroprocessor 203 controlling transmission and receive functionsthrough an RF interface 204 chipset, an analog interface 205, andantenna 206. The microprocessor 203, RF interface 204, and analoginterface 205 may be incorporated as a single chipset or discretelyseparated. While FIG. 9 shows only a single antenna 206 for simplicity,as will be discussed later it may be advantageous for the RFID reader206 to contain more than one antenna 206 to provide increaseddirectivity. When more than one antenna 206 is present, the analogcircuits 205 will typically enable the switching of the RF interface 204between the multiple antenna elements 206.

[0123] If the RFID reader 200 is being used with an alarm panel of aprior art security system, typically described as a retrofitapplication, then this existing embodiment of the RFID reader 200 mayonly support limited functions such as only backscatter modulation ifthe RFID reader 200 will only be in wireless communications with RFIDtransponders 100 and not with any other devices 550. In this case, theprocessor 203 and memory 204 may not be present if the controllerfunctions 250 are incorporated into the panel interface module 350 orcontroller 351 of a prior art alarm panel. For similar reasons, theexisting embodiment of the RFID reader 200 may not have a power supply207 since power can be derived directly or indirectly from the prior artalarm panel.

[0124] If the configuration of the RFID reader 200 includes only asingle antenna, it can take the form shown in FIG. 17 with one PCmotherboard containing most of the components, with a slot for acceptinga daughter card in the form factor of an industry standard PCMCIA orcompact flash (CF) module 220. These module sizes are preferred becausethe growing variety of modules made by various vendors and manufacturedto these standards are leading to rapidly declining component andmanufacturing costs for chipsets, discrete resistors, capacitors,inductors, antennas, packaging, and the like. Furthermore, it may easethe process of FCC equipment certification to make the intentionalradiating portions of the RFID reader 200 into a mechanical packageseparate from the remaining circuits. It is not a requirement of thispresent invention that the RFID reader 200 be constructed in these twoparts as shown in FIG. 17 (motherboard plus daughter board); rather itis one possible choice because of the opportunity to lower developmentand manufacturing costs. It is likely that variations of the RFID reader200 can also be produced with all components integrated into a singlepackage, perhaps even smaller in size, without detracting from thepresent inventive architecture and combination of functions, circuits,and logic. For example, as will be discussed later, when multipleantennas 206 are used the packaging is generally integrated.

[0125] Other elements of FIG. 9 may be incorporated depending uponchosen embodiment. If the RFID reader 200 is a self-install embodiment,then the RFID reader 200 includes a local power supply 207. If batterybackup is desired, the packaging of the RFID reader 200 also permits theinstallation of a battery 208 for backup purposes in case normal powersupply 207 is interrupted. When the RFID reader 200 is used in aself-install embodiment, the RFID reader 200 will generally also includea controller function 250, therefore the microprocessor 203 will alsorequire sufficient memory 211 for program and data storage. The lowestcost form of the self-install embodiment will use active RFcommunications 422 between multiple RFID readers 200 and other devices550. However, the RFID reader 200 may also include a power lineinterface 202 or a hardwire interface 209 to provide communicationscapability over wires, as discussed elsewhere.

[0126] The RFID reader 200 will typically communicate with the RFIDtransponders 100 using frequencies in one or more of followingunlicensed frequency bands: 902 to 928 MHz, 2435 to 2465 MHz, 2400 to2483 MHz, or 5725 to 5850 MHz. These bands permit the use of unlicensedsecondary transmitters, and are part of the bands that have becomepopular for the development of cordless phones and wireless LANnetworks, thereby leading to the wide availability of many low costcomponents that are required for this invention, such as the RFinterface 204 chips, analog interface 205 components, and antennas 206.There are 3 different FCC rule sets applicable to the present invention,which will be discussed briefly.

[0127] Transmissions regulated by FCC rules 47 CFR 15.245 permit fieldstrengths of up to 500 mV/m at 3 meters (measured using an averagedetector function; the peak emission limit may be up to 20 dB higher).This implies an averaged transmission power of 75 mW and a peaktransmission power of up to 7.5 Watts. Furthermore, transmissions underthese do not suffer the same duty cycle constraints as existing wirelesssecurity system transmitters operating under 47 CFR 15.231 (a). However,in order to use the rules of 47 CFR 15.245, the RFID reader 200 mustoperate as a field disturbance sensor, which it does. Existing wirelesssecurity system transmitters are not field disturbance sensors.

[0128] Transmissions regulated by FCC rules 47 CFR 15.247 permitfrequency hopping (FHSS) or digital modulation (DM) systems attransmission powers up to 1 Watt into a 6 dBi antenna, which results ina permitted 4 Watt directional transmission. In order for a FHSS deviceto take advantage of the full permitted power, the FHSS device mustfrequency hop at least once every 400 milliseconds.

[0129] Transmissions regulated by FCC rules 47 CFR 15.249 permit fieldstrengths of up to 50 mV/m at 3 meters (measured using an averagedetector function; the peak emission limit may be up to 20 dB higher).This implies an averaged transmission power of 750 μW and a peaktransmission power of up to 75 mW. Unlike 47 CFR 15.247, rule section 47CFR 15.249 does not specify modulation type or frequency hopping.

[0130] Most other products using these unlicensed bands are othertransient transmitters operating under 47 CFR 15.247 and 47 CFR 15.249,and so even though it may seem that many products are available and inuse in these bands, in reality there remains a lot of available space inthe band at any one instant in time, especially in residential homes.Most transmitters operating under 47 CFR 15.247 are frequency hoppingsystems whereby the given spectrum is divided into channels of aspecified bandwidth, and each transmitter can occupy a given channel foronly 400 milliseconds. Therefore, even if interference occurs, the timeperiod of the interference is brief. In most cases, the RFID readers 200can operate without incurring interference or certainly withoutsignificant interference. In residential homes, the most frequentproduct user of these bands are cordless telephones, for which there areno standards. Each phone manufacturer uses its own modulation andprotocol format. For data devices, there are several well knownstandards that use the 2400 to 2483 band, such as 802.11, 802.11b(WiFi), Bluetooth, ZigBee (HomeRF-lite), and IEEE 802.15.4, amongothers.

[0131] The present invention has a substantial advantage of theaforementioned products in that the RFID readers 200, gateways 300, andother devices 550 of the security system are fixed. Other products suchas cordless phones and various data devices usually have at least onehandheld, usually battery powered, component. The FCC's MaximumPermitted Exposure (MPE) guidelines, described in OET 65, generallycause manufacturers to limit transmission power of handheld devices to100 mW or less. Since most wireless links are symmetrical, once thehandheld device (such as the cordless phone) is power limited, any fixedunit (such as the cordless base unit) is also limited in power to matchthe handheld device. Given that the RFID reader 200, gateway 300, andother devices 550 of the security system are not handheld, they can usethe full power permitted by the FCC rules and still meet the MPEguidelines.

[0132] As discussed earlier, the preferred means of communications byand between RFID readers 200, gateways 300, and other devices is activeRF communications 422. The invention is not limiting, and modulationformats and protocols using either FHSS or DM can be employed. As oneexample, the active RF communications 422 can use Gaussian FrequencyShift Keyed (GFSK) modulation with FHSS. This particular modulationformat has already been used quite successfully and inexpensively forBluetooth, 802.11, and other data systems to achieve raw data rates onthe order of 1 Mbps. In order to take maximum advantage of the permittedpower limits in, for example, the 2400 to 2483 MHz band, if a FHSSprotocol is chosen, GFSK or otherwise, at least 75 hopping channelsshould be used and if a DM protocol is chosen, a minimum 6 dB bandwidthof 500 KHz should be used. Any designer of a security system under thisinvention can take advantage of the fixed nature of the RFID readers200, gateways 300, and other devices 550 as well as the relatively lowdata rate requirements to select a modulation format and protocol withhigh link margins. Most other products in these bands have at least onemobile component and high data rates are required. Therefore, in spiteof the presence of other products, the active RF communications 422 usedin the security system should achieve higher reliability and range, andlower susceptibility to interference than other collocated products.

[0133] When using active RF communications 422, RFID readers 200,gateways 300, and other devices 550 function as a network of devices. Amessage originating on one device may pass through intermediate devicesbefore terminating on the destination devices, as shown in FIGS. 2C and8. The RFID readers 200, gateways 300, and other devices 550 determinetheir own network topology based upon the ability of each device toreliably receive the transmissions from other devices. As will bediscussed later, the antennas 206 used in these devices may bedirectional, and therefore it is not always certain that each device candirectly transmit to and receive from every other device. However, giventhe power limits and expected distribution of devices in typical homesand buildings, it can be generally expected that each device cancommunicate with at least one other device, and that the devices canthen form for themselves a network that enables the routing of a messagefrom any one device to any other device. Networking protocols are wellunderstood in the art and therefore not covered here. The devicesdescribed herein typically will use the unique originating anddestination address of each device in the header of each message sent inrouting messages within the network.

[0134] While the RFID readers 200, gateways 300, and other devices 550use 47 CFR 15.247 rules for its active RF communications 422, the RFIDreaders 200 can use both 47 CFR 15.245 and 47 CFR 15.247 rules for itswireless communications 420 with the RFID transponders 100. Thus, theRFID readers 200 can communicate to the RFID transponders 100 using oneprotocol, at a maximum power of 4 W for any length of time, and thenswitch to a second protocol, if desired, at a maximum power of 7.5 W toobtain a response 421 from an RFID transponder 100. While the RFIDreader 200 can transmit at 7.5 W for only 1 ms under the 47 CFR 15.245,that time period is more than enough to obtain tens or hundreds of bitsof data from an RFID transponder 100. The extra permitted 2.7 dB ofpower under 47 CFR 15.245 is useful for increasing the read range of theRFID reader 200. In a related function, the RFID reader 200 can use thelonger transmission times at 4 W to deliver power to the RFIDtransponders 100, as described elsewhere, and reserve the brief burstsat 7.5 W only for data transfer.

[0135] As an alternative to active RF communications 422, the RFIDreaders 200, gateways 300, and other devices 550 can use a power linecarrier protocol 202, matching of course, the chipsets and protocolsdiscussed for the gateway 300. Either means of communications permitsthe homeowner or building owner to install the RFID readers 200 bysimply plugging each into an outlet 720 in approximately each majorroom. The RFID readers 200, gateways 300, and other devices 550 can thenuse the method disclosed later to associate themselves with each otherand begin communications without the need to install any new wires.However, as also discussed in the foregoing, there may be some userswith higher security requirements that do not permit the use of radiospectrum or power lines 430 that may be shared with users outside of thebuilding, and therefore the design permits the use of hardwiredconnections 209 between the gateways 300, RFID readers 200, and otherdevices 550.

[0136] Each RFID reader 200 communicates with one or more RFIDtransponders 100 typically using modulated backscatter techniques. Thesetechniques are very well understood by those skilled in the art, andhave been well discussed in a plethora of literature including patentspecifications, trade publications, marketing materials, and the like.For example, the reader is directed to RFID Handbook Radio-FrequencyIdentification: Fundamentals And Applications, by Klaus Finkenzeller,published by John Wiley, 1999. U.S. Pat. No. 6,147,605, issued to Vegaet al, provides additional material on the design and theory ofmodulated backscatter techniques. Patent application Ser. No.10/072,984, by Shanks et al, also provides material on the design andtheory of modulated backscatter techniques. Therefore, this samematerial is not covered here. Presently, a number of companies produceminiaturized chipsets, components, and antennas for RFID readers andtransponders. Many of these chipsets, though designed for the 13.56 MHzband, are applicable and/or will be available in the higher bands suchas those discussed here. For example, Hitachi has recently announced themanufacture of its mu-chip, which is a 2.4 GHz RFID transpondermeasuring only 0.4 mm square. The most important point here is that thewide availability of parts permits the designer many options in choosingthe specific design parameters of the RFID reader 200 and RFIDtransponder 100 and therefore the innovative nature of this invention isnot limited to any specific circuit design implementing the wirelesslink 420 and 421 between the RFID reader 200 and RFID transponder 100.

[0137] The extensive literature on RFID techniques and the wideavailability of parts does not detract from the innovative applicationand combination of these techniques and parts to the present invention.Most applications of RFID have been applied to mobile people, animals,or things that must be authorized, tracked, counted, or billed. No onehas previously considered the novel application of low cost RFIDcomponents to solve the problem of monitoring fixed assets such as thewindows 702, doors 701, and other sensors that comprise the openings ofbuildings. All present transmitters constructed for prior art wirelesssecurity systems are several times more expensive than the RFID-baseddesign of the present invention because of the additional componentsrequired for active transmission. Furthermore, no one has considered theuse of multiple, distributed low cost RFID readers 200 with overlappingcoverage so that a building's security is not dependent on a single,vulnerable, and historically unreliable central transceiver.

[0138] There are several examples of the advantages that the presentRFID approach offers versus prior art wireless security systems. Presentwireless security systems limit status reporting by transmitters totimes even longer than the FCC restriction of once per hour in order toconserve the battery in the transmitter. The RFID approach does not havethe same battery limitation because of the modulated backscatter design.Prior art wireless security systems are subject to both false positiveand false negatives indications because centrally located transceivershave difficulty distinguishing noise from real signals. The centraltransceiver has little control over the time of transmission by atransmitter and therefore must evaluate every signal, whether noise,interference, or real transmission. This is made more difficult becausethe prior art central transceivers are not always located centrally inthe house. Professional installers generally hide these centraltransceivers in a closet or similar to prevent an intruder from easilyspotting the central transceivers and disabling it. Each wall or doorthrough which signals must pass to reach a central transceiver can causeof loss of up to 10 dB in signal power. In contrast, the RFID approachplaces all of the transmission control in the master controller and RFIDreader 200. The RFID reader 200 only looks for a reflected response 421during a read 420. Therefore the RFID reader 200 can be simpler indesign.

[0139] Some centralized transceivers attempt to use diversity antennasto improve their reliability; however, these antennas are separated onlyby the width of the packaging, which is frequently much less than onewavelength of the chosen frequency (i.e. 87 cm at 345 MHz and 69 cm at433 MHz). As is well known to those skilled in the art of wireless,spatial diversity of antennas works best when the antennas are separatedby more than one wavelength at the chosen frequency. With the presentinvention, RFID readers 200 are separated into multiple rooms, creatingexcellent spatial diversity and the ability to overcome environmentalaffects such as multipath and signal blockage. Multipath and signalblockage are effects of the RF path between any transmitter andreceiver. Most cellular systems use diversity antennas separated bymultiple wavelengths to help overcome the effects of multipath andsignal blockage. Under the present invention, in most installationsthere will be multiple RFID readers 200 in a building. Therefore willtherefore be an independent RF path between each RFID reader 200 andeach RFID transponder 100. The master controller sequences transmissionsfrom the RFID readers 200 so that only one RFID reader 200 istransmitting at a time. Besides reducing the potential for interference,this allows the other RFID readers 200 to listen to both thetransmitting RFID reader 200 and the subsequent response from the RFIDtransponders 100. If the RF path between the transmitting RFID reader200 and the RFID transponder 100 is subject to some form of multipath orsignal blockage, it is possible and even highly probable that one of theremaining RFID readers 200 are capable of detecting and interpreting thesignal. If the transmitting RFID reader 200 is having trouble receivingan adequate response from a particular RFID transponder 100, the mastercontroller will then poll the remaining RFID readers 200 to determinewhether the response was received by any of them.

[0140] One major design advantage of the present invention versus allother applications of RFID is the fixed relationship between each RFIDreader 200 and the RFID transponders 100. While RFID readers 200 forother applications must include the complexity to deal with manysimultaneous tags in the read zone, tags moving rapidly, or tags onlybriefly in the read zone, the present invention can take advantage ofcontrolled static relationship in the following ways.

[0141] While there may be multiple RFID transponders 100 in the readzone of each RFID reader 200, the RFID reader 200 can poll each RFIDtransponder 100 individually, preventing collisions or interference. Inaddition, because each RFID transponder 100 is responding individually,the RFID reader 200 can use the expected response bit sequence toimprove the receive processing gain. A specific RFID transponder 100 isresponding at a specific time, and at least a portion of the response421 will contain bits in a predetermined sequence.

[0142] Because the RFID transponders 100 are fixed, the RFID reader 200can use longer integration times in its signal processing to increasethe reliability of the read signal, permitting successful reading atlonger distances and lower power when compared with RFID applicationswith mobile tags.

[0143] Furthermore, the RFID reader 200 can make changes in specificfrequency while remaining within the specified unlicensed frequencyband, in an attempt to find, for each RFID transponder 100, an optimalcenter frequency, given the manufacturing tolerances of the componentsin each RFID transponder 100 and any environment effects that may becreating more absorption or reflection at a particular frequency. In asimilar manner, the RFID reader 200 can learn the center frequencies ofthe marking and spacing bits modulated by each RFID transponder 100.While these center frequencies may be nominally known and designed intothe RFID transponder 100, there is likely a significant probability thatthe manufacturing process will result in a variation of actualmodulation frequencies. By matching its demodulation process to eachRFID transponder 100, the RFID reader 200 can improve its signalprocessing margin.

[0144] Because the multiple RFID readers 200 are controlled from asingle master controller, the controller function 250 can sequence theRFID readers 200 in time so that the RFID readers 200 do not interferewith each other.

[0145] Because there will typically be multiple RFID readers 200installed in each home, apartment, or other building, the controllerfunction 250 can use the excellent spatial diversity created by thedistributed nature of the RFID readers 200 to increase and improve thereliability of each read. That is, one RFID reader 200 can initiate thetransmission sequence 420, but multiple RFID readers 200 can tune andread the response 421 from the RFID transponder 100. Thus the multipleRFID readers 200 can operate as a network of receivers to demodulate andinterpret the response 421 from the RFID transponder 100.

[0146] Because the RFID transponders 100 are typically static, andbecause the events (such as intrusion) that affect the status of thesensors connected to RFID transponders 100 are relatively slow comparedto the speed of electronics in the RFID readers 200, the RFID readers200 have the opportunity to pick and choose moments of low quiescentinterference from other products in which to perform its reads withmaximum signal to noise ratio potential—all without missing the eventsthemselves.

[0147] Because the path lengths and path loss from each RFID transponder100 to the RFID reader 200 are relatively static, the RFID reader 200can use different power levels when communicating with each RFIDtransponder 100. Lower path losses require lower power to communicate;conversely the RFID reader 200 can step up the power, within thespecified limits of the FCC rules, to compensate for higher path losses.The RFID reader 200 can determine the lowest power level to use for eachRFID transponder 100 by sequentially stepping down its transmit power420 on successive reads until no return signal 421 can be detected. Thenthe power level can be increased one or two incremental levels. Thisdetermined level can then be used for successive reads. This use of thelowest necessary power level for each RFID transponder 100 can helpreduce the possibility of interference while ensuring that each RFIDtransponder 100 can always be read.

[0148] Finally, for the same static relationship reasons, the mastercontroller and RFID readers 200 can determine and store the typicalcharacteristics of transmission between each RFID transponder 100 andeach RFID reader 200 (such as signal power, signal to noise ratio, turnon time, modulation bit time, etc.), and determine from any change inthe characteristics of transmission whether a potential problem exists.Thus, the RFID reader 200 can immediately detect attempts to tamper withthe RFID transponder 100, such as partial or full shielding,deformation, destruction, or removal.

[0149] By taking advantage of the foregoing techniques, the RFID reader200 of the present invention has a demonstrated wireless range of up to30 meters when communicating with the RFID transponders 100, dependingupon the building construction materials, placement of the RFID reader200 in the room, and the furniture and other materials in the room whichmay have certain reflective or absorptive properties. This range is morethan sufficient for the majority of homes and other buildings in thetarget market of the present security system, whereby the system can beimplemented in a ratio of approximately one RFID reader 200 per majorroom (i.e. a hallway or foyer is not considered a major room for thepurposes of the present discussion, but a living room or bedroom is amajor room).

[0150] The RFID reader 200 is available with several options thatincrease both the level of security and functionality in the inventivesecurity system. One option enhances the RFID reader 200 to include anacoustic transducer 210 capable of both receiving and emitting soundwaves that enables a glass breakage detection capability in the RFIDreader 200. Glass breakage sensors have been widely available for yearsfor both wired and wireless prior art security systems. However, theyare available only as standalone sensors selling for $30 to $50 or more.Of course, in a hardwired system, there is also the additional laborcost of installing separate wires from the alarm panel to the sensor.The cost of the sensors generally limits their use to just a few roomsin a house or other building. The cost, of course, is due to the needfor circuits and processors dedicated to just analyzing the sound waves.

[0151] Since the RFID reader 200 already contains a power supply 207, aprocessor 203, and a controller function 250, the only incremental costof adding the glass breakage detection capability is the addition of theacoustic transducer 210 (shown in FIGS. 9 and 18A). With the addition ofthis option, glass breakage detection can be available in every room inwhich an RFID reader 200 has been installed. The acoustic transducer 210preferably supports both the reception of sounds waves and the emissionof sound wave such that the acoustic transducer 210 can also be used forother functions beyond just glass breakage detection, such as two-wayaudio, the sounding of tones and alerts, voice recognition, and voiceresponse (i.e. spoken word responses to commands). While shown as asingle block in FIGS. 9 and 18A, the acoustic transducer 210 can beimplemented with a single combined component or with a separate inputtransducer (i.e. microphone) and output transducer (i.e. speaker).

[0152] Glass breakage detection is performed by analyzing received soundwaves to look for certain sound patterns distinct in the breaking ofglass. These include certain high frequency sounds that occur during theimpact and breaking of the glass and low frequencies that occur as aresult of the glass flexing from the impact. The sound wave analysis canbe performed by any number of widely known signal processing techniquesthat permit the filtering of received signals and determination ofsignal peaks at various frequencies over time.

[0153] One advantage of the present invention over prior art standaloneglass breakage sensors is the ability to adjust parameters in the field.Because glass breakage sensors largely rely on the receipt of audiofrequencies, they are susceptible to false alarms from anything thatgenerates sounds at the right combination of audio frequencies.Therefore, there is sometimes a requirement that each glass breakagesensor be adjusted after installation to minimize the possibility offalse alarms. In some cases, no adjustment is possible in prior artglass breakage detection devices because algorithms are permanentlystored in firmware at the time of manufacture. Because the glassbreakage detection of the present invention is performed by the RFIDreaders 200, which include or are in communication with a controllerfunction 250, the controller function 250 can alter or adjust parametersused by the RFID reader 200 in glass breakage detection. For example,the controller function 250 can contain tables of parameters, each ofwhich applies to different building construction materials or windowtypes. The user can select the appropriate table entry during systemconfiguration, or select another table entry later after experience hasbeen gained with the installed security system. Furthermore, if agateway 300 has any of the modules 310 to 313, the controller function250 can contact an appropriate database via a gateway 300 that is, forexample, managed by the manufacturer of the security system to obtainupdated parameters. There is, therefore, significant advantage to thisimplementation of glass breakage detection, both in the cost of devicemanufacture and in the ability to make adjustments to the processingalgorithms used to analyze the sound waves.

[0154] The addition of the acoustic transducer 210, with both soundsinput and output capability, to the RFID reader 200 for the glassbreakage option also allows the RFID reader 200 to be used by anemergency response agency 460 as a distributed microphone to listen intothe activities of an intruder. Rather than analyzing the sound waves,the sound waves can be digitized and send to the gateway 300, and thenby the gateway 300 to the emergency response agency 460. After thegateway 300 has sent an alert message to the emergency response agency460, any of the installed modules 310 to 313 can be available for use inan audio link. This two-way audio capability through the acoustictransducer 210 can be useful for more than just listening by anemergency response agency 460. Parents who are not home can listen intothe activities of children who might be home. Similarly, a caregiver canuse the two-way audio to communicate with an elderly person who might beliving alone.

[0155] In a similar manner, the RFID reader 200 can contain optionalalgorithms for the sensing of motion in the room. Like glass breakagesensors, prior art motion sensors are widely available as standalonedevices. Prior art motion sensors suffer from the same disadvantagescited for standalone glass breakage sensors, that is they are standalonedevices requiring dedicated processors, circuits, and microwavegenerators. However, the RFID reader 200 already contains all ofhardware components necessary for generating and receiving the radiowave frequencies commonly using in detecting motion; therefore the RFIDreader 200 only requires the addition of algorithms to process thesignals for motion in addition to performing its reading of the RFIDtransponders 100. Different algorithms are available for motiondetection at microwave frequencies. One such algorithm is Doppleranalysis. It is a well known physical phenomenon that objects movingwith respect to a transmitter cause a reflection with a shift in thefrequency of the reflected wave. While the shift is not large relativeto the carrier frequency, it is easily detectable. Therefore, the RFIDreader 200 can perform as a Doppler radar by the rapid sending andreceiving of radio pulses, with the subsequent measurement of thereflected pulse relative to the transmitted pulse. People and animalswalking at normal speeds will typically generate Doppler shifts of 5 Hzto 100 Hz, depending on the speed and direction of movement relative tothe RFID reader 200 antenna 206. The implementation of this algorithm todetect the Doppler shift can be, at the discretion of the designer, beimplemented with a detection circuit or by performing signal analysisusing the processor of the RFID reader 200. In either case, the objectof the implementation is to discriminate any change in frequency of thereturn signal relative to the transmitted signal for the purpose ofdiscerning a Doppler shift. The RFID reader 200 is capable of alteringits transmitted power to vary the detection range of this motiondetection function.

[0156] These motion detection functions can occur simultaneously withthe reading of RFID transponders 100. Because the RFID transponders 100are fixed relative to the RFID readers 200, no unintended shift infrequency will occur in the reflected signal. Therefore, for eachtransmitted burst to an RFID transponder 100, the RFID reader 200 cananalyze the reflected signal for both receipt of data from the RFIDtransponder 100 as well as unintended shifts in frequency indicating thepotential presence of a person or animal in motion.

[0157] By combining the above functions, the RFID reader 200, in asingle integrated package can be capable of (i) communicating with otherRFID readers 200, gateways 300, and other devices 550 using active RFcommunications 422, power line communications 202 and/or hardwiredcommunications 209, (ii) communicating with RFID transponders 100 usingwireless communications 420, (iii) detecting motion via Doppler analysisat microwave frequencies, (iv) detecting glass breakage via sound waveanalysis of acoustic waves received via an audio transducer 210, and (v)providing a two-way audio link to an emergency response agency 460 viaan audio transducer 210 and via a gateway 300. This RFID reader 200achieves significant cost savings versus prior art security systemsthrough the avoidance of new wire installation and the sharing ofcommunicating and processing circuitry among the multiple functions.Furthermore, because the RFID readers 200 are under the control of asingle master controller, the performance of these functions can becoordinated to minimize interference, and provide spatial diversity andredundant confirmation of received signals.

[0158] The motion detector implemented in the RFID reader 200 is only asingle detection technology. Historically, single motion detectiontechnologies, whether microwave, ultrasonic, or passive infrared, allsuffer false positive indications. For example, a curtain being blown bya heating vent can occasionally be detected by a Doppler analysis motiondetector. Therefore, dual technology motion detectors are sometimes usedto increase reliability—for example by combining microwave Doppler withpassive infrared so that motion by a warm body is required to trigger analert. An existing embodiment of the RFID reader 200, which can bemounted high on a wall or on a ceiling, can incorporate a passiveinfrared sensor 570, if desired, to achieve manufacturing cost savingsfor the same reasons previously discussed for glass breakage.

[0159] However, because the self-install embodiment of the RFID reader200 will typically be mounted directly on power outlets 720, which arerelatively low on the wall in most rooms, incorporating an infraredsensor 570 in the RFID reader 200 is not a viable option. Passiveinfrared sensors 570 lose their discriminating ability when their lineof sight to a warm body is blocked. Because of the low mounting heightof the RFID reader 200, it is likely that various pieces of furniture inthe room will act to partially or fully block any view that a passiveinfrared sensor may have of the entire room. In order to overcome thispotential limitation, the inventive security system implements a noveltechnique to implement dual technology motion sensing in a room withoutthe requirement that both technologies be implemented into a singlepackage.

[0160] Existing dual technology sensors implement both technologies intoa single sensors because the sensors are only capable or reporting a“motion” or “no motion” condition to the alarm panel. This is fortunate,because present prior art alarm panels are only capable of receiving a“contact closed” or “contact open” indication. Therefore, all of theresponsibility for identifying motion must exist within the singlesensor package. The inventive controller function 250 can use active RFcommunications 422, power line carrier 202 protocols, or modulatedbackscatter 420 to communicate with a passive infrared sensor 570mounted separately from the RFID reader 200. Therefore, if in a singleroom, the RFID reader 200 is detecting motion via microwave Doppleranalysis and a passive infrared sensor 570 is detecting the presence ofa warm body 710 as shown in FIG. 4, the master controller can interpretthe combination of both of these indications in a single room as thelikely presence of a person.

[0161] One embodiment of this passive infrared sensor 570 is in the formof a light switch 730 with cover 731 as shown in FIG. 23A. Most majorrooms have at least one existing light switch 730, typically mounted atan average height of 55″ above the floor. This mounting height is abovethe majority of furniture in a room, thereby providing a generally clearview of the room. Passive infrared sensors have previously been combinedwith light switches 730 so as to automatically turn on the light whenpeople are in room. More importantly, these sensor/switches turn off thelights when everyone has left, thereby saving electricity that wouldotherwise be wasted by lighting an unoccupied room. Because the primarypurpose of these existing devices is to provide local switching, thedevices cannot communicate with central controllers such as existingalarm panels.

[0162] The passive infrared sensor 570 that operates with the inventivesecurity system includes a local power supply 207 and any of active RFcommunications 422, power line carrier 202 communications, or modulatedbackscatter communications 421 that permit the said passive infraredsensor 570 to communicate with one or more controller functions 250 inRFID readers 200 or gateways 300, and be under control of the mastercontroller. At the time of system installation, the master controller isconfigured by the user thereby identifying the rooms in which the RFIDreaders 200 are located and the rooms in which the passive infraredsensors 570 are located. The master controller can then associate eachpassive infrared sensor 570 with one or more RFID readers 200 containingmicrowave Doppler algorithms. The master controller can then require thesimultaneous or near simultaneous detection of motion and a warm body,such as a person 710, before interpreting the indications as a probableperson in the room.

[0163] Because each of the RFID readers 200 and passive infrared sensors570 are under control of the master controller, portions of thecircuitry in these devices can be shut down and placed into a sleep modeduring normal occupation of the building. Since prior art motion sensorsare essentially standalone devices, they are always on and are alwaysreporting a “motion” or “no motion” condition to the alarm panel.Obviously, if the alarm panel has been placed into a disarmed statebecause, for example, the building is being normally occupied, thenthese “motion” or “no motion” conditions are simply ignored by the alarmpanel. But the sensors continue to use power, which although the amountmay be small, it is still a waste of AC or battery power. Furthermore,it is well known in the study of reliability of electronic componentsthat “power on” states generate heat in electronic components, and it isheat that contributes to component aging and possible eventual failure.

[0164] Additionally, there are some people concerned with being the inpresence of microwave radiation. In reality, the amount of radiationgenerated by these devices is very small, and commonly believed to notbe harmful to humans. However, there is the perception among some peoplethat radiation of all types, however small, is still to be avoided. Thepresent security system can selectively shut down or at least slow downthe rate of the radiation from the RFID readers 200 when the securitysystem is in a disarmed mode, or if the homeowner or building ownerwants the security system to operate in a perimeter only mode withoutregard to the detection of motion. By shutting down the radiation andtransmissions used for motion detection, the security system isconserving power, extending the potential life of the components, andreducing the possibility of interference between the RFID reader 200 andother products that may be operating in the same unlicensed band. Thisis advantageous because, for example, while people are occupying thebuilding they may be using cordless telephones (or wireless LANs, etc.)and want to avoid possible interference from the RFID reader 200.Conversely, when the security system is armed, there are likely nopeople in the building, and therefore no use of cordless telephones, andthe RFID readers 200 can operate with reduced risk of interference fromthe transmissions from said cordless telephones.

[0165] The RFID transponder 100 of the present invention is shown isFIG. 11. One form may typically be provided with an adhesive backing toenable easy attachment to the frame of an opening such as, for example,a window 702 frame or door 701 frame. RFID transponder 100 designs basedupon modulated backscatter are widely known and the details oftransponder design are well understood by those skilled in the art. TheRFID transponder 100 will typically include energy management circuitssuch as an overvoltage clamp 101 for protection, a rectifier 105 andregulator 107 to produce proper voltages for use by the charge pump 109in charging the energy store 108 and powering the microprocessor 106.The RFID transponder 100 receives and interprets commands from the RFIDreader 200 by typically including circuits for clock extraction 103 anddata modulation 104. Furthermore, the microprocessor 106 can send dataand status back to the RFID reader 200 by typically using a modulator102 to control the impedance of the antenna 110. The impedance controlalternately causes the absorption or reflection of the RF energytransmitted by the RFID reader 200 thereby forming the response wirelesscommunications 421.

[0166] Low cost chipsets and related components are available from alarge number of manufacturers. In the present invention, the RFID reader200 to RFID transponder 100 radio link budget is designed to operate atan approximate range of up to 30 meters. In a typical installation, eachopening will have an RFID transponder 100 installed. The ratio of RFIDtransponders 100 to each RFID reader 200 will typically be 3 to 8 in anaverage residential home, although the technology of the presentinvention has no practical limit on this ratio. The choice of addressingrange is a designer's choice largely based on the desire to limit thetransmission of wasted bits. In order to increase the security of thetransmitted bits, the RFID transponders 100 can include an encryptionalgorithm. The tradeoff is that this will increase the number oftransmitted bits in each message. The key to be used for encryption canbe exchanged during enrollment, as explained later.

[0167] The RFID transponders 100 are typically based upon a modulatedbackscatter design. Each RFID transponder 100 in a room absorbs powerradiated 420 from one or more RFID readers 200 when the said RFIDtransponder 100 is being addressed, as well as when other RFIDtransponders 100 are being addressed. In addition, the RFID readers 200can radiate power 420 for the purpose of providing energy for absorptionby the RFID transponders 100 even when the RFID reader 200 is notinterrogating any RFID transponders 100. Therefore, unlike most RFIDapplications in which the RFID transponders or tags are mobile and inthe read zone of a prior art RFID reader briefly, the RFID transponders100 of the present invention are fixed relative to the RFID readers 200and therefore always in the read zone of at least one RFID reader 200.Therefore, the said RFID transponders 100 have extremely long periods oftime in which to absorb, integrate, and store transmitted energy.

[0168] In a typical day to day operation, the RFID reader 200 is makingperiodic transmissions. The master controller will typically sequencethe transmissions from the RFID readers 200 so as to preventinterference between the transmissions of any two RFID readers 200. Themaster controller will also control the rates and transmission lengths,depending upon various states of the system. For example, if thesecurity system is in a disarmed state during normal occupancy hours,the master controller may use a lower rate of transmissions since littleor no monitoring may be required. When the security system is in anarmed state, the rate of transmissions may be increased so as toincrease the rate of wireless communications between the RFID readers200 and the various sensors. The increased rate of wirelesscommunications will reduce the latency from any attempted intrusion tothe detection of the attempted intrusion. The purpose of the varioustransmissions will generally fall into several categories including:power transfer without information content, direct addressing of aparticular RFID transponder 100, addressing to a predetermined group ofRFID transponders 100, general addressing to all RFID transponders 100within the read range, and radiation for motion detection.

[0169] An RFID transponder 100 can typically only send a responsewireless communication 421 in reply to a transmission 420 from an RFIDreader 200. Furthermore, the RFID transponder 100 will only send aresponse wireless communication 421 if the RFID transponder 100 hasinformation that it desires to communicate. Therefore, if the RFIDreader 200 has made a globally addressed wireless communication 420 toall RFID transponders 100 asking if any RFID transponder 100 has achange in status, an RFID transponder 100 will not respond if in fact ithas no change in status to report. This communications architecturereduces the use of resources on multiple levels. On the other hand, ifan intrusion sensor 600 detects a probable intrusion attempt, it isdesirable to reduce the latency required to report the probableintrusion attempt. Therefore, the communications architecture alsoincludes a mechanism whereby an RFID transponder 100 can cause aninterrupt of the otherwise periodic transmissions of any category inorder to request a time in which the said RFID transponder 100 canprovide a response wireless communications with the details of theprobable intrusion attempt. The interrupt might be, for example, anextended change of state of the antenna (i.e. from terminate to shorted)or a sequence of bits that otherwise does not occur in normalcommunications messages (i.e. 01010101). An example sequence may be: (a)the RFID reader 200 may be transmitting power 420 without informationcontent, (b) a first RFID transponder 100 causes an interrupt, (c) theRFID reader 200 detects the interrupt and sends a globally addressedwireless communications 420, (d) the said first RFID transponder 100sends its response wireless communications 421. This example sequencemay also operate similarly even if in step (a) the RFID reader 200 hadbeen addressing a second RFID transponder 100; steps (b) through (d) mayotherwise remain the same.

[0170] Because of the passive nature of the RFID transponder 100, thetransfer of energy in which to power the RFID transponder 100 relies onthe buildup of electrostatic charge across the antenna elements 110 ofthe RFID transponder 100. As the distance increases between the RFIDreader 200 and the RFID transponder 100, the potential voltage that candevelop across the antenna elements declines. For example, under 47 CFR15.245 the RFID reader 200 can transmit up to 7.5 W power. At a distanceof 10 m, this transmitted power generates a field of 1500 mV/m and at adistance of 30 m, the field declines to 500 mV/m.

[0171] The RFID transponder 100 may therefore include a charge pump 109in which to incrementally add the voltages developed across severalcapacitors together to produce higher voltages necessary to charge theenergy store 108 and/or power the various circuits contained within theRFID transponder 100. Charge pump circuits for boosting voltage are wellunderstood by those skilled in the art. For example, U.S. Pat. Nos.5,300,875 and 6,275,681 contain descriptions of some examples.

[0172] One form of the RFID transponder 100 can contain a battery 111,such as a button battery (most familiar use is as a watch battery) or athin film battery. Batteries of these shapes can be based upon variouslithium compounds that provide very long life. For example, Cymbet hasdeveloped a thin film battery that is both long life and can berecharged at least 70,000 times. Therefore, rather than relying solelyon a limited energy store 108 such as a capacitor, the RFID transponder100 can be assured of always having sufficient energy through a longerlife battery 111 component. If order to preserve charge in the battery111, the processor 106 of the RFID transponder 100 can place some of thecircuits in the RFID transponder 100 into temporary sleep mode duringperiods of inactivity.

[0173] The use of the battery 111 in the RFID transponder 100 typicallydoesn't change the use the passive modulated backscatter techniques asthe communications means. Rather, the battery 111 is typically used toenhance and assist in the powering of the various circuits in the RFIDtransponder 100. However, an enhanced form of the RFID transponder 100can contain an active amplifier stage 113 which is shown in FIG. 12.This amplifier stage 113 is used to extend the possible range betweenthe RFID reader 200 and the RFID transponder 100 by amplifying thereturn modulated signal 421 normally sent by backscatter modulationalone. Depending on the specific design, a duplexor 112 may also berequired with the amplifier 113.

[0174] The use of this amplifying stage is particularly useful when theRFID transponder 100 replies to the RFID reader 200 using a modulationsuch as On-Off Keyed (OOK) amplitude modulation. The OOK operates byreceiving a carrier wave from the RFID reader 200 at a center frequencyselected by the RFID reader 200, or a master controller directing theRFID reader 200, and modulating marking (i.e. a “one”) and spacing (i.e.a “zero”) bits onto the carrier wave at shifted frequencies. The markingand spacing bits obviously use two different shifted frequencies, andideally the shifted frequencies are selected so that neither createsharmonics that can confuse the interpretation of the marking and spacingbits. In this example, the OOK is not purely on and off, but rather twodifferent frequency shifts nominally interpreted in the same manner as apure on-off might normally be interpreted. The purpose is to activelysend bits rather that using the absence of modulation to represent abit. The use of OOK, and in particular amplified OOK, makes thedetection and interpretation of the return signal 421 at the RFID reader200 simpler than with some other modulation schemes.

[0175] As mentioned above, the RFID transponder 100 contains a chargepump 109 with which the RFID transponder 100 can build up voltages andstored energy with which to regularly recharge the battery 111, ifpresent. If the battery 111 were to be recharged once per day, a batterycapable of being recharged 70,000 times provides a life of over 190years. This is in stark contrast with the battery powered transmittersused in prior art wireless security systems, which have a typical lifeof only 1 to 2 years.

[0176] In addition to the charge pump 109 for recharging the battery111, the RFID transponder 100 contains circuits for monitoring thecharged state of the battery 111. If the battery 111 is alreadysufficiently charged, the RFID transponder 100 can signal the RFIDreader 200 using one or more bits in a communications message. Likewise,if the battery 111 is less than fully charged, the RFID transponder 100can signal the RFID reader 200 using one or more bits in a wirelesscommunications message. Using the receipt of these messages regardingthe state of the battery 111, if present, in each RFID transponder 100,the RFID reader 200 can take actions to continue with the transmissionof radiated power, increase the amount of power radiated (obviouslywhile remaining within prescribed FCC limits), or even suspend thetransmission of radiated power if no RFID transponder 100 requires powerfor battery charging. By suspending unnecessary transmissions, the RFIDreader 200 can conserve wasted power and reduce the likelihood ofcausing unwanted interference.

[0177] One form of the RFID transponder 100, excluding those designed becarried by a person or animal, is typically connected to at least oneintrusion sensor 600. From a packaging standpoint, the present inventionalso includes the ability to combine the intrusion sensors 600 and theRFID transponder 100 into a single package, although this is not arequirement of the invention.

[0178] The intrusion sensor 600 is typically used to detect the passage,or attempted passage, of an intruder through an opening in a building,such as window 702 or door 701. Thus the intrusion sensor 600 is capableof being in at least two states, indicating the status of the window 702or door 701 such as “open” or “closed”. Intrusion sensors 600 can alsobe designed under this invention to report more that two states. Forexample, an intrusion sensor 600 may have 4 states, corresponding towindow 702 “closed”, window 702 “open 2 inches”, window 702 “openhalfway”, and window 702 “open fully”.

[0179] In a typical form, the intrusion sensor 600 may simply detect themovement of a portion of a window 702 or door 701 in order to determineits current state. This may be accomplished, for example, by the use ofone or more miniature magnets, which may be based upon rare earthmetals, on the movable portion of the window 702 or door 701, and theuse of one or more magnetically actuated miniature reed switches onvarious fixed portions of the window 702 or door 701 frame. Other formsare also possible. For example, pressure sensitive contacts may be usedwhereby the movement of the window 702 or door 701 causes or relievesthe pressure on the contact, changing its state. The pressure sensitivecontact may be mechanical or electro-mechanical such as a MEMS device.Alternately various types of Hall effect sensors may also be used toconstruct a multi-state intrusion sensor 600.

[0180] In any of these cases, the input/output leads of the intrusionsensor 600 are connected to, or incorporated into, the RFID transponder100 such that the state of the intrusion sensor 600 can be determined byand then transmitted by the RFID transponder 100 in a message to theRFID reader 200.

[0181] Because the RFID transponder 100 is a powered device (without orwithout the battery 111, the RFID transponder 100 can receive and storepower), and the RFID reader 200 makes radiated power available to anydevice within its read zone capable of receiving its power, other formsof intrusion sensor 600 design are also available. For example, theintrusion sensor 600 can itself be a circuit capable of limitedradiation reflection. Under normally closed circumstances, the closelocation of this intrusion sensor 600 to the RFID transponder 100 andthe simultaneous reflection of RF energy can cause the generation ofharmonics detectable by the RFID reader 200. When the intrusion sensor600 is moved due to the opening of the window 702 or door 701, the gapbetween the intrusion sensor 600 and the RFID transponder 100 willincrease, thereby reducing or ceasing the generation of harmonics.Alternately, the intrusion sensor 600 can contain metal or magneticcomponents that act to tune the antenna 110 or frequency generatingcomponents of the RFID transponder 100 through coupling between theantenna 110 and the metal components, or the switching in/out ofcapacitors or inductors in the tuning circuit. When the intrusion sensor600 is closely located next to the RFID transponder 100, one form oftuning is created and detected by the RFID reader 200. When theintrusion sensor 600 is moved due to the opening of the window 702 ordoor 701, the gap between the intrusion sensor 600 and the RFIDtransponder 100 will increase, thereby creating a different form oftuning within the RFID transponder 100 which can also be detected by theRFID reader 200. The intrusion sensor 600 can also be an RF receiver,absorbing energy from the RF reader 200, and building an electrostaticcharge upon a capacitor using a charge pump, for example. The increasingelectrostatic charge will create a electric field that is small, butdetectable by a circuit in the closely located RFID transponder 100.Again, when the intrusion sensor 600 is moved, the gap between theintrusion sensor 600 and the RFID transponder 100 will increase, causingthe RFID transponder 100 to no longer detect the electric field createdby the intrusion sensor 600.

[0182] Another form of intrusion sensor 600 may be implemented withlight emitting diode (LED) generators and detectors. Two forms ofLED-based intrusion sensor 600 are available. In the first form, shownin FIG. 25A, the LED generator 601 and detector 602 are incorporatedinto the fixed portion of the intrusion sensor 600 that is typicallymounted on the window 702 or door 701 frame. It is immaterial to thepresent invention whether a designer chooses to implement the LEDgenerator 601 and detector 602 as two separate components or a singlecomponent. Then a reflective material, typically in the form of a tape603 can be attached to the moving portion of the window 702 or door 701.If the LED detector 602 receives an expected reflection from the LEDgenerator 601, then no alarm condition is present. If the LED detector602 receives a different reflection (such as from the paint of thewindow rather than the installed reflector) or no reflection from theLED generator 601, then an intrusion is likely being attempted. Thereflective tape 603 can have an interference pattern 604 embedded intothe material such that the movement of the window 702 or door 701 causesthe interference pattern 604 to move past the LED generator 601 anddetector 602 that are incorporated into the fixed portion of theintrusion sensor 600. In this case, the movement itself signals that anintrusion is likely being attempted without waiting further for the LEDdetector 602 to receive a different reflection or no reflection from theLED generator 601. The speed of movement is not critical, as it is thedata encoded into the interference pattern 604 and not the data ratethat is important. The use of such an interference pattern 604 canprevent easy defeat of the LED-based intrusion sensor 600 by the simpleuse of tin foil, for example. A different interference pattern 604,incorporating a different code, can be used for each separate window 702or door 701, whereby the code is stored into the master controller andassociated with each particular window 702 or door 701. This furtherprevents defeat of the LED-based intrusion sensor 600 by the use ofanother piece of reflective material containing any other interferencepattern 604. This use of the LED-based intrusion sensor 600 is madeparticularly attractive by its connection with an RFID transponder 100containing a battery 111. The LED generator 601 and detector 602 will,of course, consume energy in their regular use. Since the battery 111 ofthe RFID transponder 100 can be recharged as discussed elsewhere, thisLED-based intrusion sensor 600 receives the same benefit of long lifewithout changing batteries.

[0183] A second form of LED-based intrusion sensor 600 is alsoavailable. In this form, the LED generator 601 and LED detector 602 areseparated so as to provide a beam of light across an opening as shown inFIG. 25B. This beam of light will typically be invisible to the nakedeye such that an intruder cannot easily see the presence of the beam oflight. The LED detector 602 will typically be associated with theLED-based intrusion sensor 600, and the LED generator 601 will typicallybe located across the opening from the LED detector 602. In this form,the purpose of the LED-based intrusion sensor 600 is not to detect themovement of the window 702 or door 701, but rather to detect a breakageof the beam caused by the passage of the intruder through the beam. Thisform is particularly attractive if a user would like to leave a window702 open for air, but still have the window 702 protected in case anintruder attempts to enter through the window 353. As before, it wouldbe preferred to modulate the beam generated by the LED generator 601 soare to prevent easy defeat of the LED detector 602 by simply shining aseparate light source into the LED detector 602. Each LED generator 601can be provided with a unique code to use for modulation of the lightbeam, whereby the code is stored into the master controller andassociated with each particular window 702 or door 701. The LEDgenerator 601 can be powered by a replaceable battery or can be attachedto an RFID transponder 100 containing a battery 111 so that the LEDgenerator 601 is powered by the battery 111 of the RFID transponder 100,and the battery 111 is recharged as discussed elsewhere. In this lattercase, the purpose of the RFID transponder 100 associated with the LEDgenerator 601 would not be report intrusion, but rather only to act toabsorb RF energy provided by the RFID reader 200 and charge the battery111. In each of the cases, the RFID transponder 100 is acting with aconnected or associated intrusion sensor 600 to provide an indication tothe RFID reader 200 that an intrusion has been detected. The indicationcan be in the form of message from the RFID transponder 100 to the RFIDreader 200, or in the form of a changed characteristic of thetransmissions from the RFID transponder 100 such that the RFID reader200 can detect the changes in the characteristics of the saidtransmission. It is impossible to know which form of intrusion sensor600 will become most popular with users of the inventive securitysystem, and therefore the capability for multiple forms has beenincorporated into the invention. Therefore, the inventive nature of thesecurity system and the embodiments disclosed herein is not limited toany single combination of intrusion sensor 600 technique and RFIDtransponder 100.

[0184] Other embodiments of RFID transponders 100 may exist under thepresent invention. Two other forms of passive infrared sensors 570 canbe created by combining a passive infrared sensor 570 with the circuitsof the RFID transponder 100. In this manner, the master controller cancommunicate with the passive infrared sensor 570 without the size, formfactor, and cost of the power line communications 202 interface andassociated circuits. As shown in FIG. 24A, in one embodiment the passiveinfrared sensor 570 with its power supply 207 is integrated into thepackaging of a light switch 730. Within this same packaging, an RFIDtransponder 100 is also integrated. The passive infrared sensor 570operates as before, sensing the presence of a warm body 710. The outputof the passive infrared sensor 570 circuits are connected to the RFIDtransponder 100 whereby the RFID transponder 100 can relay the status ofthe passive infrared sensor 570 (i.e. presence or no presence of a warmbody 710 detected) to the RFID reader 200, and then to the mastercontroller. At the time of system installation, the master controller isconfigured by the user thereby identifying the rooms in which the RFIDreaders 200 are located and the rooms in which the passive infraredsensors 570 are located. The master controller can then associate eachpassive infrared sensor 570 with one or more RFID readers 200 containingmicrowave Doppler algorithms. The master controller can then require thesimultaneous or near simultaneous detection of motion and a warm body,such as a person 710, before interpreting the indications as a probableperson in the room.

[0185] It is not a requirement that the passive infrared sensor 570 bepackaged into a light switch 730 housing. As shown in FIG. 24B, inanother embodiment the passive infrared sensor 570 is implemented into astandalone packaging. In this embodiment, both the passive infraredsensor 570 and the RFID transponder 100 are battery 208 powered so thatthis sensor/transponder combination can be located anywhere within aroom. So, for example, this embodiment allows the mounting of thisstandalone packaging on the ceiling, for a look down on the coveredroom, or the mounting of this standalone packaging high on a wall.

[0186] The present invention also includes a novel method of enrollingRFID transponders 100 with the master controller. The process ofenrolling refers to identifying the RFID transponders 100 that areassociated with each security system. Each RFID transponder 100 containsa unique serial number to distinguish that RFID transponder 100 fromothers that may be located in the same building as well as other RFIDtransponders 100 that may be located in other buildings. The process ofenrolling must prevent the unintentional enrollment of RFID transponders100 that are not intended to be associated with a given security system,without regard to whether the unintentional enrollment would beaccidental or malicious. Furthermore, during the process of enrollment,the RFID transponder 100 exchanges more detailed information aboutitself than would otherwise be transmitted during normal routinetransmissions. This more detailed information (for example, theencryption key) allows the RFID transponder 100 and RFID reader 200 tomutually encrypt communications, if necessary, between themselves sothat intruders or other interlopers may be prevented from interpretingor spoofing the routine communications between the RFID transponder 100and RFID reader 200. Spoofing refers to the generation of falsecommunications that attempts to trick a security system into reportingnormal conditions when in fact an intrusion is being attempted and thesecurity system would be causing an alert in the absence of thespoofing. Therefore, during enrollment, it would be advantage to ensureto the greatest degree possible that the more detailed information isnot intercepted.

[0187] In prior art security systems using transmitters operating under47 CFR 15.231, the transmitters frequently require programming toassociate them with the security system. In some cases, this programmingrequires the attachment of a special programming console to thetransmitter. This is generally not an operation that can be performed bya homeowner. Alternately, the transmitter is identified by a serialnumber, which then must be manually typed into the keypad. Given thesize of the typical keypad and LCD display, and the number oftransmitters in a home, this manual process can be quite arduous.

[0188] In the present invention, the RFID reader 200 is capable ofaltering its transmitted power so as to vary the range of its read zone(that is, the distance and shape of the area in which the RFID reader200 can communicate with an RFID transponder 100). 47 CFR 15.245 permitsa maximum average transmit power of 75 mW, but there is no restrictionon how low the power can be set. Therefore, using the present invention,when the user desires to enroll with the master controller of a givensecurity system, the following process is followed. The mastercontroller is placed into an enrollment mode. During the enrollmentmode, one or more RFID readers 200 are instructed to prepare forenrollment, which entails setting its power level to a low level,thereby creating only a small read zone near to said RFID reader 200.The RFID reader 200 may command all known RFID transponders 100, that isthose RFID transponders 100 already enrolled with the master controller,to not respond to the RFID reader, thereby allowing the RFID reader 200to receive responses only from new RFID transponders 100 not alreadyenrolled. The user of the system brings an unenrolled RFID transponder100 near to the RFID reader 200. Near in this case will typically bewithin 20 to 30 centimeters of the RFID reader 200. Once the RFID reader200 can detect the RFID transponder 100, the RFID reader 200 willsequentially step its power down in incremental steps to verify that theRFID transponder 100 is in fact very near to the RFID reader 200. Eachincremental step down in power further reduces the size and shape of theread zone. As the power is reduced, all other RFID transponders 100 inthe vicinity of the RFID reader 200 should no longer be detectable, andonly the RFID transponder 100 being enrolled will be detectable. TheRFID reader 200 will reduce its power to a predetermined threshold, atwhich point the RFID reader 200 can be reasonably certain that the RFIDtransponder 100 is physically close to the RFID reader 200. At thispoint of physical closeness and low power, it is highly unlikely thatthe communications between the two devices can be intercepted. At thispoint, the RFID transponder 100 provides its unique serial numberincluding the detailed information required for the RFID reader 200 andRFID transponder 100 to engage in encrypted communications. After thisparticular exchange, the RFID transponder 100 is enrolled, and themaster controller may provide some form of feedback, such as audible orvisual, to the user indicating that the RFID transponder 100 has beenenrolled. Now the RFID transponder 100 may be installed.

[0189] In a similarly novel manner, RFID readers 200, gateways 300, andother devices 550 may be enrolled with each other and therefore with themaster controller. The same type of issues related in the foregoingapply to this enrollment process. The goal is to enable the network ofdevices within the inventive security system to exchange communicationsthat may be encrypted without sharing certain identity or encryptioninformation in the open where it can be intercepted. The automaticmethod of the present invention proceeds as follows.

[0190] The installer of the system may first install and power on atleast one RFID reader 200. Each gateway 300 or other device 550, exceptRFID readers 200, is provided with an associated master key RFIDtransponder 265. This will typically be either in a small form factorthat is portable or can in fact be embedded into the packaging of thegateway 300 or other device 550. In a sense, it is like a key for entryto the system. The master controller, which is likely to initially bethe first RFID reader 200 powered on, is placed into an enrollment mode.During the enrollment mode, one or more RFID readers 200 are instructedto prepare for enrollment, which entails setting its power level to alow level, thereby creating only a small read zone near to said RFIDreader 200. The user of the system brings the master key RFIDtransponder 265 (which may be separate or embedded into the packaging ofa gateway 300 or other device) near to the RFID reader 200. Near in thiscase will typically be within 20 to 30 centimeters of the RFID reader200. Once the RFID reader 200 can detect the master key RFID transponder265, the RFID reader 200 will sequentially step its power down inincremental steps to verify that the master key RFID transponder 265 isin fact very near to the RFID reader 200. Each incremental step down inpower further reduces the size and shape of the read zone. As the poweris reduced, all other RFID transponders 100 in the vicinity of the RFIDreader 200 should no longer be detectable, and only the master key RFIDtransponder 265 will be detectable. The RFID reader 200 will reduce itspower to a predetermined threshold, at which point the RFID reader 200can be certain that the master key RFID transponder 265 is physicallyclose to the RFID reader 200. At this point of physical closeness andlow power, it is highly unlikely that the communications between the twodevices can be intercepted. The master controller commands the RFIDreader 200 to read the master key RFID transponder 265, and verifies thecontent of the master key RFID transponder 265. If the master key RFIDtransponder 265 is properly verified, the master controller enrolls theRFID reader 200 by receiving its unique identity codes. If desired forhigher security, the master key RFID transponder 265 can contain a codeused for encrypting communications. This code, once received by the RFIDreader 200, can be used to encrypt all communications between the mastercontroller and the RFID reader 200. The code remains secret because itis only transmitted over the short air gap between the RFID reader 200and the master key RFID transponder 265 during enrollment, and neverover the power lines 250, or at high enough power that it is detectableoutside of the immediate physical vicinity of the RFID reader 200 oruser during enrollment. It is not a requirement that the code is everuser readable or user accessible.

[0191] In a larger security system with many RFID readers 200, gateways300, and other devices 550, the above process may entail the exchange ofmultiple master keys 265. For example, gateway A is registered using keyA with RFID reader C and RFID reader D, and then gateway B is registeredusing key B with RFID reader C. RFID reader C can provide key B to bothgateway A and reader D using key A. Eventually, the entire network ofdevices within the security system has the full set of master keys 265necessary for any device to communicate with any other device, whetherthe communications is active RF 422 or power line carrier 202.Furthermore, once the keys 265 are known to all the devices, the mastercontroller may command all device to shift to a single new key. Theimportant aspects of the above process are that (i) the user is notrequired to type codes of any kind into a programming terminal of anytype, and (ii) the unique keys 265 are never compromised by being openlysent at power levels and over distances capable of being intercepted.

[0192] Because the RFID reader 200 and RFID transponder 100 operate inone of the shared frequency bands allocated by the FCC, these devices,as do all Part 15 devices, are required to accept interference fromother Part 15 devices. It is primarily the, responsibility of the RFIDreader 200 to manage communications with the RFID transponder 100, andtherefore the following are some of the capabilities that may beincluded in the RFID to mitigate interference. First, the RFID reader200 can support the use of multiple modulation schemes. For example, 47CFR 15.245 rules has a bandwidth of 26 MHz in the 902 to 928 MHz bandand 30 MHz in the 2435 to 2465 MHz band, with no restrictions onmodulation scheme or duty cycle. The other devices operating in thesebands will typically be frequency hopping devices that have dividedtheir allowable spectrum into channels, where each channel may typicallybe 250 KHz, 500 KHz, 1 MHz, or similar. The specific channels used byother devices may or may not overlap with the spectrum used by thepresent invention. The most typical case is a partial overlap. Forexample, some wireless LAN devices follow a standard known as 802.11,which uses the spectrum 2400 to 2483.5 MHz, and employs 75 channels,each with a bandwidth of 1 MHz. These devices only partially overlap the2435 to 2465 MHz spectrum that may be used by the present invention. Allfrequency hopping devices operating under 47 CFR 15.247 will typicallyoccupy each of their channels for no more than 400 milliseconds.Therefore, 802.11 devices, in this example, have the potential forcausing only transitory interference and only for a small proportion ofthe time (no more than {fraction (30/75)}^(th) probability, or 40%).

[0193] The RFID reader 200 can vary its modulation scheme, under commandof the master controller. The RFID transponder 100 uses backscattermodulation, which alternately reflects or absorbs the signal radiated bythe RFID reader 200 in order to send its own data back. Therefore, theRFID transponder 100 will automatically follow, by design, the specificfrequency and modulation used by the RFID reader 200. This is asignificant advantage versus prior art wireless security systemtransmitters, which can only transmit at a single modulation scheme withits carrier centered at a single frequency. If interference isencountered at or near that single frequency, these transmitters ofprior art wireless security system have no ability to alter theirtransmission characteristics to avoid or mitigate the interference.

[0194] An RFID reader 200 can be implemented to support any of thefollowing modulation schemes, though the present invention is notlimited to just these modulation schemes. As is well known in the art,there are many modulation techniques and variations within any onemodulation technique, and designers have great flexibility in makingchoices in this area. The simplest is a carrier wave (CW) signal, at avariety of frequency choices within the allowable bandwidth. The CWconveys no information from the RFID reader 200 to the RFID transponder,but still allows the RFID transponder 100 to backscatter modulate 421the signal on the return path as described earlier. The RFID reader 200would typically use another modulation scheme such as Binary Phase ShiftKeyed (BPSK), Gaussian Minimum Shift Keyed (GMSK), Gaussian FrequencyShift Keyed (GFSK) or even on-off keyed (OOK) AM, when sending data tothe RFID transponder 100, but can use CW when expecting a return signal421. The RFID reader 200 can concentrate its transmitted power into thisCW, permitting this narrowband signal to overpower a portion of thespread spectrum signal typically used by other devices operating in theunlicensed bands. If the RFID reader 200 is unsuccessful with CW at aparticular frequency, the RFID reader 200 can shift frequency within thepermitted band. As stated, under the present invention the RFIDtransponder 100 will automatically follow the shift in frequency bydesign. Rather than repeatedly generating CW at a single frequency, theRFID reader 200 can also frequency hop according to any prescribedpattern. The pattern may be predetermined or pseudorandom. This patterncan be adaptive and can be varied, as needed to avoid interference.

[0195] If the success rate with frequency hopping is, in itself,insufficient to overcome interference, the RFID reader 200 can use amulticarrier modulation scheme, whereby the signal content in now spreadinto multiple frequencies within a predetermined bandwidth. Since theanticipated interference will likely be coming from frequency hoppingdevices (based upon the profiles of devices registered in the FCCequipment database for these frequency bands), and only for briefperiods of time (less than 400 milliseconds, which is a requirement ofmost devices operating under 47 CFR 15.247), if the RFID reader 200spreads its signal out across multiple frequencies in the permitted bandthen only a portion of the signal will be interfered with at any onepoint in time. The remaining portion of the signal will likely retainits fidelity. The multicarrier modulation scheme may be spread spectrumor another appropriate scheme. Finally, the RFID reader 200 can combinea multicarrier modulation scheme with frequency hopping so as to bothspread its energy within a predetermined channel and also periodicallychange the channel within the permitted band in which it is operated.There are some devices, such as microwave ovens, which may bleed energyinto one of the unlicensed bands. This will typically cause interferencein only a region of the band, and will not be moving (as in channelhopping). Therefore the RFID reader 200 can detect repeated failures inthe interfered region of the band, and avoid that region for a period oftime. The availability of 47 CFR 15.245 as the rule basis in addition to47 CFR 15.247 permits the RFID reader 200 great flexibility inresponding the environmental conditions experienced in eachinstallation, and at each point in time. Very few other devices havesuch operating flexibility.

[0196] There may be times when the interference experienced by the RFIDreader 200 is not unintentional and not coming from another Part 15device. One means by which a very technically knowledgeable intruder mayattempt to defeat the security system, or any wireless system, of thepresent invention is by intentional jamming. Jamming is an operation bywhich a malicious intruder independently generates a set of radiotransmissions intended to overpower or confuse legitimate transmissions.In this case, the intruder would likely be trying to prevent one or moreRFID transponders 100 from reporting a detected intrusion to the RFIDreader 200, and then to the master controller. Jamming, is of course,illegal under the FCC rules; however intrusion itself is also illegal.In all likelihood, a person about to perpetrate a crime may not give anyconsideration to the FCC rules. Therefore, the RFID reader 200 alsocontains algorithms that can determine within a reasonable probabilitythat the RFID reader 200 is being subjected to jamming. If one or moreRFID readers 200 detect a change in the radio environment, in arelatively short predetermined period of time, wherein attempted changesin modulation schemes, power levels, and other parameters are unable toovercome the interference, the master controller can cause an alertindicating that it is out of communications with one or more RFIDtransponders 100 with the likely cause being jamming. This condition canbe distinguished from the failure of a single RFID transponder 100 by asimultaneous and parallel occurrence of the change in RF environment,caused by signals not following known FCC transmission rules for power,duty cycle, bandwidth, modulation, or other related parameters andcharacteristics. The alert can allow the building owner or emergencyresponse agency 460 to decide upon an appropriate response to theprobable jamming.

[0197] In addition to its support of multiple modulation schemes, theRFID reader 200 is available in an embodiment with multiple antennasthat enables the RFID reader 200 to subdivide the space into which theRFID reader 200 transmits and/or receives. It is well known in antennadesign that it desirable to control the radiation pattern of antennas toboth minimize the reception of noise and maximize the reception ofdesired signals. An antenna that radiates equally in all directions istermed isotropic. An antenna that limits its radiation into a largedonut shape can achieve a gain of 2 dBi. By limiting the radiation tothe half of a sphere above a ground place, an antenna can achieve a gaina 3 dBi. By combining the two previous concepts, the gain can be furtherincreased. By expanding upon these simple concepts to create antennasthat further limit radiation patterns, various directional gains can beachieved. The RFID reader 200 circuit design permit the construction ofembodiments with more than one antenna, whereby the transceiver circuitscan be switched from one antenna to another. In one example, theself-installed embodiment of the RFID reader 200 will typically beplugged into an outlet 720. Therefore, the necessary coverage zone ofthe RFID reader 200 is logically bounded by the planes created by thefloor below the reader and the wall behind the reader. Therefore,relative to an isotropic antenna, the read zone of the RFID reader 200should normally be required to cover the space contained within onlyone-quarter of a sphere. Therefore, a single antenna configured with theRFID reader 200 should typically be designed a gain of approximately 6dBi. By comparison, the antennas of most centralized transceivers ofprior art wireless security systems are isotropic or have a gain of only2 to 3 dBi because the wireless transmitters of these prior art systemscan be located in any direction from the one centralized transceiver.This design limitation detracts from their receive sensitivity.

[0198] However, it may be desirable to further subdivide this space intomultiple subspaces, for example a “left” and a “right” space, withantenna lobes that overlap in the middle. Each antenna lobe may be thenable to increase its design gain to approximately 9 dBi or more. Sincethe RFID readers 200 and RFID transponders 100 are fixed, the RFIDreader 200 can “learn” in this example “left”/“right” configurationwhich RFID transponders 100 have a higher received signal strength ineach of the “left” and “right” antennas 206. The simplest method bywhich this can be achieved is with two separate antennas 206, with thetransceiver circuits of the RFID reader 200 switching between theantennas 206 as appropriate for each RFID transponder 100. This enablesthe RFID reader 200 to increase its receiver sensitivity to thereflected signal returning from each RFID transponder 100 whileimproving its rejection to interference originating from a particulardirection. This example of two antennas 206 can be expanded to three orfour antennas 206. Each subdivision of the covered space results canallow a designer to design an increase in the gain of the antenna 206 ina particular direction. Because the physical packaging of the RFIDreader 200 has physical depth proportionally similar to its width, threeantenna 206 patterns is a logical configuration in which to offer thisproduct, where one antenna 206 looks forward, one looks left, and theother looks right. An alternate configuration which is equally logical,can employ four antennas 206, one antenna 206 looks forward, the secondlooks left, the third looks right, and the fourth looks up. Theseexample configurations are demonstrated in FIGS. 20A and 20B.

[0199] There are multiple manufacturing techniques available whereby theantennas can be easily printed onto circuit boards or the housing of theRFID reader 200 thereby creating antennas known as patch antennas ormicrostrip antennas. The reader is directed to Compact and BroadbandMicrostrip Antennas, by Kin-Lu Wong, published by Wiley, 2002 as onesource for a description of the design and performance of thesemicrostrip antennas. This present specification is not recommending thechoice of any one specific antenna design, because so much relies on thedesigner's preference and resultant manufacturing costs. However, whenconsidering the choice for antenna design for both the RFID reader 200and the RFID transponder 100, the following should be taken intoconsideration. Backscatter modulation relies in part upon the Friistransmission equation and the radar range equation. The power P_(r) thatthe receiving RFID reader 200 can be expected to receive back from theRFID transponder 100 can be estimated from the power P_(t) transmittedfrom the transmitting RFID reader 200, the gain G_(t) of thetransmitting RFID reader 200 antenna, gain G_(r) of the receiving RFIDreader 200 antenna, the wavelength λ of the carrier frequency, the radarcross section σ of the RFID transponder 100 antenna, and the distancesR₁ from the transmitting RFID reader 200 to the RFID transponder 100 andR₂ from the RFID transponder 100 to the receiving RFID reader 200.(Since more than one RFID reader 200 can receive a wirelesscommunications from the RFID transponder 100, the general case isconsidered here.) The radar range equation is then:

P _(r) =P _(t) ·σ·[G _(t) ·G _(r)/4π]·[λ/4πR ₁ R ₂]²

[0200] Therefore, the designer should consider antenna choices for theRFID readers 200 and RFID transponders 100 that maximize, in particular,G_(r) and σ. The combination of P_(t) and G_(t) cannot result in a fieldstrength that exceeds the prescribed FCC rules. The foregoing discussionof microstrip antennas does not preclude the designer from consideringother antenna designs. For example, dipoles, folded dipoles, and logperiodic antennas may also be considered. Various patents such as U.S.Pat. Nos. 6,147,606, 6,366,260, 6,388,628, 6,400,274, among others showexamples of other antennas that can be considered. Unlike otherapplications for RFID, the security system of the present invention usesRFID principles in a primarily static relationship. Furthermore, therelationship between the RFID reader 200 antennas and RFID transponder100 antennas will typically be orthogonal since most buildings and homeshave a square or rectangular layout with largely flat walls. This priorknowledge of the generally static orthogonal layout should present anadvantage in the design of antennas for this RFID application versus allother RFID applications.

[0201] Some example antenna designs are shown in FIG. 26. One form ofthe RFID transponder 100 will typically be used in residential homes.The windows 702 and doors 701 of most residential homes are surroundedby a type of moulding known as casing 703. Many shapes of casing 703 areavailable, but they all share the two important features of width anddepth. Typically, the minimum width is 2.25 inches and the minimum depthof the side furthest from the window 702 or door 701 is 0.5 inches. Bytaking advantage of these known minimum dimensions and the orthogonallayout of most residential homes, wraparound corner antenna design suchas 271 or 272 are possible as shown that provide a reflective surface intwo directions and increases the antenna surface area and the radarcross section σ of the resultant antenna 206 even when viewed frommultiple directions. The corner reflector design for the RFIDtransponder 100 antenna 271 or 272 increases the layout flexibility ofthe RFID transponders 100 and the RFID readers 200 in any given room.Alternately, an antenna can be designed to be inserted under themoulding such that the antenna is between the moulding and theunderlying drywall. This permits a hidden antenna that can be relativelylarge in surface area.

[0202] Many commercial buildings do not use moulding around theirwindows 702, however the wall thickness is frequently much more than thewindow 702 depth, giving rise to right angle drywall surface as shown inFIG. 26. This is also advantageous for another wraparound corner antennadesign such as 273, and in fact provides more flexibility is designingthe physical dimensions because commercial building owners are lesssensitive about aesthetics than homeowners. The reflective surface ofthe antenna designs 271-273 can be covered with a plastic housingcapable of accepting paint so that the RFID transponder 100 can bepainted after installation so as to blend in with the wall decor.

[0203] As with several other features of the present invention,designers can make preferred choices on configuration without deductingfrom the intentions of the present invention, and therefore nolimitation should be construed by the choice of any specific number ofantennas or type of antenna design.

[0204] The architecture of the security system of the present inventionprovides an advantage to the physical design of antennas for the RFIDreaders 200. The concepts of directional antenna gain have been appliedto various wireless systems, such as cellular systems. However, thesesystems suffer from the design constraint of multiple sectored antennassimultaneously transmitting. Therefore, in order to achieve the types ofgains stated above, these antennas must be designed with large front toback signal rejection ratios, for example. The present security systemis under command, at all times, of a central master controller, whichcan sequence the transmissions of each of the RFID readers 200 installedin each system. Therefore, the antenna design parameters are relaxed byknowing that the system is not self-interfering whereby the antenna ofone RFID reader 200 must be designed to reject the signalssimultaneously generated by another RFID reader 200. This centralizedcontrol and simplified antenna design parameters permit the presentsystem to be manufactured at lower cost.

[0205] The range of the present security system can be extended, ifnecessary in certain installations, in the following manner. FCC rulesection 47 CFR 15.249 permits the construction of transmitters in thebands 902 to 928 MHz and 2400 to 2483.5 MHz with a field strength of 50mV/m at 3 meters (equivalent to approximately 750 microwatts). Unlikethe RFID transponders 100, transmitters under this rule section must nowbe active transmitters 560. These active transmitters 560 require morecomponents, and therefore will be more expensive to manufacture than theRFID transponders 100. They will also likely suffer from some of thesame disadvantages of the transmitters of prior art wireless securitysystems such as reduced battery life, with the following exceptions. 47CFR 15.249 does not have the duty cycle restrictions of 47 CFR 15.231.The field strength limits of 47 CFR 15.249 are greater than the fieldstrength limits of 47 CFR 15.231. The RFID reader 200 can confirmreceipt of a transmissions from an active transmitter 560 so that thetransmitter 560 knows its message has been received. If the message hasnot been received, the transmitter 560 can shift frequency. Finally, thepresent security system is not based around a single centraltransceiver; distributed RFID readers 200 are still used with all of theaforementioned advantages. If the building owner has are area too largein which to operate using the lower cost RFID transponders 100,transmitters 560 may be used in place of the RFID transponders 100. Inthe manner previously discussed, the transmitters 560 will now beconnected to an intrusion sensor 600. A single RFID reader 200 cancommunicate with both RFID transponders 100 and transmitters 560, andthe RFID reader 200 remains in control of communications with both theRFID transponders 100 and transmitters 560 to avoid systemself-interference and collisions. In addition to covering larger areas,these active transmitters 560 can be used to monitor objects that havetheir own battery power source, such as automobiles, tractors, orwatercraft. Thus, the security system enables the coverage of more thanjust the perimeter and interior of a home or other building.

[0206] One additional form of an active transmitter 560 is a handhelddevice known as a keyfob 561. Keyfobs 561 are widely used today forlocking and unlocking cars, and a number of prior art wireless alarmpanels also support keyfobs 561. The present security system alsoincludes support for keyfobs 561, whose signals can be received byeither RFID readers 200 or gateways 300. Typically, the security systemwould be programmed such that the function keys on the keyfob 561 willbe used to place the system into either armed or disarmed mode. Thebatteries on keyfobs 561 will typically last for years because thekeyfobs 561 only transmit when a button is pressed.

[0207] The RFID reader 200 is not limited to reading just the RFIDtransponders 100 installed in the openings of the building. The RFIDreader 200 can also read RFID transponders 100 that may be carried byindividuals 710 or animals 711, or placed on objects of high value. Byplacing an RFID transponder 100 on an animal 711, for example, thecontroller function 250 can optionally ignore indications received fromthe motion sensors if the animal 711 is in the room where the motion wasdetected. By placing an RFID transponder 100 on a child, the controllerfunction 250 can use any of the modules 310 to 313 installed in agateway 300, to send an message to a parent at work when the child hasarrived home or equally important, if the child was home and then leavesthe home. The RFID transponder 100 can also include a button than can beused, for example, by an elderly or invalid person to call for help inthe event of a medical emergency or other panic condition. When usedwith a button, the RFID transponder 100 is capable of reporting twostates: one state where the RFID transponder 100 simply registers itspresence, and the second state in which the RFID transponder 100communicates the “button pressed” state. It can be a choice of thesystem user of how to interpret the pressing of the button, such ascausing an alert, sending a message to a relative, or calling formedical help. Because the RFID readers 200 will typically be distributedthroughout a house, this form of panic button can provide a morereliable radio link than prior art systems with only a singlecentralized receiver.

[0208] Earlier, the X-10 power line protocol was mentioned and thendismissed as a contender for use in the power line communications of thedisclosed invention. The X-10 protocol is far too simple and lacking inreliability features for use in a security system. However, there isreportedly over 100 million lighting and appliance control devices thathave shipped with the X-10 protocol. These devices are typically usedonly to turn on, turn off, or variably dim lights or appliances. Becausethe RFID reader 200 and gateway 300 are already coupled to the powerlines 250, these devices are also capable of generating the 120 KHzpulses necessary to send X-10 based commands to X-10 devices that may beinstalled in the building or home. The controller function 250 can beconfigured, for example, to turn on certain lights when an intrusion hasbeen detected and when the system has been disarmed. The support forthis protocol is only as a convenience for these legacy devices.

[0209] The security system also includes an optional legacy interfacemodule 580 shown in FIG. 16. This interface module 580 can be used bybuilding owners or homeowners that already have certain parts of a priorart wired security system installed, and would like to continue to usethese parts in conjunction with the inventive security system disclosedherein. Older wired security systems operate on the contact “closed” or“open” principle. That is, each sensor, whether magnetic/reed switchwindow/door contact, motion sensor, glass breakage sensor, heat sensor,etc., is in one state (generally contact “closed”) when normal, and thenis the other state (generally contact “open”) when in the detectionstate (i.e. intrusion, motion, heat, etc.). The interface module 580allows these legacy devices to be monitored by the controller 300. Theinterface module 580 provides active RF 422 or power line communications202 to the controller function 250, terminal interfaces 581 for thewires associated with the sensors, DC power 582 to powered devices, andbattery 583 backup in the case of loss of primary power. The controllerfunction 250 must be configured by the user to interpret the inputs fromthese legacy devices. The interface module 580 also implements the busprotocol supported by the legacy keypads 500 currently used with priorart wired security systems. This bus protocol is separate from thecontact “closed” or “open” interfaces described in the foregoing; it istypically a 4-wire interface whereby commands and responses can bemodulated onto the wires. Because of the large numbers of these keypads500 installed into the marketplace, there is a high degree offamiliarity in the home security user base for the form factor andfunction of these keypads 500. One example of such a keypad 500supported by the interface module 580 is shown in design patentD389,762, issued Jan. 27, 1998 to Yorkey, and assigned to Brinks HomeSecurity.

[0210] The inventive security system provides a number of mechanisms forusers and operators to interface with the security system. On a day today basis, it is expected that most security systems will include akeypad 500 similar to one shown in FIG. 21 since it is a convenientmeans by which authorized persons can arm or disarm the system and viewthe status of various zones. There are a number of keypad options thatcan be made available for the security system, derived from permutationsof the following possibilities: (i) active RF communications 422,backscatter modulation 421, or power line carrier communications 202with the RFID readers 200, gateways 300, and other devices 550, (ii) ACpowered or battery powered, and if battery powered, rechargeable fromthe RFID readers 200 in the manner discussed earlier for RFIDtransponders 100, and (iii) inclusion, or not, of sufficient processing261 and memory 266 capability to also support a controller function 250.In smaller systems, it may be useful for the keypad 500 to be capable ofsupporting a controller function 250. In larger systems, there willalready be a number of RFID readers 200 (and probably gateways 300) withcontroller functions 250 such that adding one more will not increase thereliability of the system. The choice of communications means by thekeypad 500 sends and receives commands to the network of devices in thesystem will largely be driven by the communications choice used by andbetween the RFID readers 200 and gateways 300. The choice of power meanswill largely be a designer choice.

[0211] One example keypad 500 may be mounted, for example, onto the typeof electrical box 243 used for light switches 730. One form of packagingthat is particularly suited to mounting onto electrical boxes 732 usedfor light switches 730 is shown in FIG. 22. In this figure, the keypad500 is packaged with a light switch 730 so that the installation of thepresent security system does not result in the loss of an accessiblelight switch 730. The power supply 308 and, power line communicationsinterface circuits 202 if included, are packaged with a light switch 730into an AC interface unit 733 and installed into electrical box 732. Awire connection 734 protrudes from this AC interface unit 733 forconnection to the keypad 500. The keypad 500 is then mounted onto thewall in such a manner that the light switch 730 portion of the ACinterface unit 733 protrudes through the housing of the keypad 500,thereby enabling both the light switch 730 to be accessible and thekeypad 500 to access AC power through an existing electrical box 732.

[0212] Another interface mechanism available for use with the securitysystem is voice recognition and voice response. When an RFID reader 200is manufactured with an acoustic transducer 210, the RFID reader 200 canalso include software based functionality in the program code 251 tointerpret spoken words as commands to the security system. Similarly,the security system can respond to spoken word commands with spoken wordresponses or tones. Software to perform voice recognition and voiceresponse is widely available and known to those skilled in the art,though most existing software must be modified to support the relativenoisy environment of the typical home. U.S. Pat. No. 6,574,596, Issuedto Bi, et al, Provides One Example Description of Voice recognition, asdoes several well known textbooks. With the voice recognition and voiceresponse as the primary interface mechanism, it is possible to implementa version of the inventive security system with no keypad 500 at all.The RFID readers 200 with acoustic transducers 210 can be used byauthorized users to perform various functions, including the day to dayfunctions such as arming and disarming the system. One attractiveadvantage of incorporating voice recognition and voice response into thesecurity system via the acoustic transducer 210 in the RFID reader 200is that the security system can be armed or disarmed from any room inthe house in which an RFID reader 200 is installed. The voice commandsreceived at a single RFID reader 200 can be communicated to thecontroller functions 250 of all other devices in the security system.

[0213] Another interface mechanism available for use with the securitysystem is a USB gateway 510 that enables a desktop or laptop computer tobe used for downloading, uploading, or editing the configuration storedin the controller functions 250. The USB gateway 510 connects to and canobtain power from the Universal Serial Bus (USB) port commonly installedin most computers 450 today. The USB gateway device 510 then convertssignals from the USB port to backscatter modulation or active RFcommunications 422 with an RFID reader 200 or gateway 300, therebyproviding access to the configuration data stored by the controllerfunctions 250. A software program provided with the USB gateway 510enables the user to access the USB gateway 510 via the USB port, anddisplay, edit, or convert the configuration data. In this manner,authorized users have an easy mechanism to create labels for each of theRFID readers 200, gateways 300, RFID transponders 100, and other devices550. For example, a particular RFID transponder 100 may be labeled“Living Room Window” so that any alert generated by the security systemcan identify by label the room in which the intrusion has occurred. Thelabels created for the various devices can also be displayed on thekeypad 500 to show, for example, which zones are in an open or closedstate.

[0214] Though most homes obtain internet access via a broadband or modemconnection, the USB gateway 510 can also be used to send or receiveemail on the PC 450 via the modules 310 to 313 installed in a gateway300. This therefore expands the capability and cost effectiveness of theinventive security system, and expands its use beyond just security.

[0215] In a similar manner, the security systems also supports an emaildevice 530 that uses active RF communications 422, backscattermodulation 421, or power line carrier communications 202 to communicatewith the RFID readers 200 and gateways 300. This email device 530, whichcan take the form of a palm-type organizer or other forms, willtypically be used to send and receive email via the modules 310 to 313installed in a gateway 300. As described earlier, the various devices inthe security system self form a network, thereby enables messages tooriginate on any device and terminate on any capable device. Therefore,it is not necessary that the email device 530 be near a gateway 300. Ifnecessary, messages can be received via the modules 310 to 313 installedin a gateway 300, be routed through multiple RFID readers 200 and thenterminate at the email device 530. The primary advantage of including anemail device 530 in the security system is to provide the homeowner adevice that it always on and available for viewing. There are a greaternumber of wireless phones in use today capable of sending and receivingSMS messages. The email device 530 provides a convenient always ondevice whereby family members can sent short messages to each other.Alternately, in another example, one spouse can leave a message foranother spouse before leaving work.

[0216] As an alternative to using a USB gateway 510, the security systemalso supports a WiFi gateway 520. WiFi, also known as 802.11b, isbecoming a more prevalent form of networking computers. Recently, Intelmade available a new chip called Centrino by which most new computerswill automatically come equipped with WiFi support. Therefore, ratherthan using a USB gateway 510 that connects to a port on the computer450, a gateway 300 can have a WiFi module 520 installed in the PCMCIA orCF slot 330. WiFi modules with these form factors are available from anumber of manufacturers, such as Bromax. The gateway 300 with WiFimodule 520 can provide either local access from a local PC 450 (assumingthat the local PC supports WiFi) to the security system, or alternatelyfrom the security system to a public WiFi network 404. It is expectedthat in the near future, some neighborhoods will be wired with publicWiFi networks 404. These public WiFi networks 404 will provide anotheralternative access means to the internet from homes (in addition tocable modems 440 and DSL 441, for example). There may be users,therefore, that may prefer the security system to provide alerts throughthis network rather than a PSTN 403 or CMRS 402 network. In the eventthese public WiFi networks 404 become prevalent, then the securitysystem can offer the email access described above through these networksas well. The gateway 300 with WiFi module 520 primarily acts as aprotocol converter between the chosen modulation and protocol usedwithin the security system and the 802.11b standard. In addition to theprotocol conversion, the gateway 300 with WiFi module 520 also providesa software based security barrier similar to a firewall to preventunauthorized access to the security system. Any application accessingthe security system, whether on a local PC 450 or remote through apublic WiFi network 404, must possess and use one of the master keys 265provided by the one of the gateways 300 or RFID readers 200.

[0217] Through one or more of the gateways 300, the security system canaccess external networks 410 as well as be accessed through these samenetworks. Some users may find it useful to be able to visually oraudibly monitor their home or building remotely. Therefore, the securitysystem also supports camera devices 540 and audio devices 540, as wellas combination camera/audio devices 540 that enable a user to remotelysee and/or hear what it occurring in a home or building. Each of thedevices can be individually addressed, since like the RFID readers 200and gateways 300, since each is provided with a unique identity. Thecamera device 540 can be implemented as an RFID reader 200 with a cameracomponent or the camera device can be manufactured without RFID readingcapability, an the option of the designer. When a security system causesan alert, an emergency response agency 460 or an authorized user can becontacted. In addition to reporting the alert, as well as the device(i.e. identity of the RFID transponder 100) causing the alert, thesecurity system can be configured to provide pictures and/or audio clipsof the activity occurring within the security system. Low cost miniaturecameras are widely available for PC and wireless phone use, and formatsfor transmitting pictures taken by these miniature cameras is alsowidely known. In the inventive security system, cameras and/ormicrophones are packaged in a manner similar to RFID readers 200. Thesedevices 540 are powered locally and support active RF communications 422or power line carrier communications 202 so as to transfer picturesand/or audio to the appropriate gateway 300. These devices will beparticularly useful in communities in which the emergency responseagency 460 requires confirmation of intrusion prior to dispatchingpolice.

[0218] There are multiple uses for the audio and camera support in thesecurity system in addition to alarm verification by an emergencyresponse agency 460. A caregiver can check in on the status of anelderly person living alone using the audio and/or camera capabilitiesof the security system. A family on a trip can check in on theactivities of a pet left at home. The owner of a vacation home canperiodically check in on the property during the winter months when thevacation home is otherwise unoccupied. By combining the audio and/orcamera capability with the USB gateway 510 and a local PC 450, a use canstore picture and audio files on the PC 450 to provide a continuousrecord of activities in the home. As an alternative to storing pictureson a local PC 450, a device 550 can be provided with a large enoughmemory 266 to contain a file system wherein the file system storespictures periodically taken by one or more cameras in the securitysystem. The pictures in the file system can be accessed later toretrieve pictures taken at particular times.

[0219] One advantageous device in which a camera can be included is another device 550 with smoke detection capability. Since smoke detectorsare generally mounted on ceilings, the inclusion of camera capabilityinto a ceiling mounted smoke detector will provide the camera with awide angle of view with little likely viewing obstruction. A smokedetection device with AC power provided will already include many or allof the elements shown in FIG. 5A; therefore it is only an incrementalcost to add the camera capability as a further device specificcapability 263.

[0220] The inventive security system does not require all smokedetectors installed in a home to be devices 550 as defined in thisspecification. Certain manufacturers, such as a Firex, already providefamilies of low cost smoke detectors that have a wired communicationscapability; that is, if one smoke detector detects smoke and causes anaudible alert, all smoke detectors that are wired to the detecting smokedetector also cause an audible alert. Using the present invention, oneof the example Firex smoke detectors can be replaced with a smokedetection device 550 of the inventive security system, and if any of theFirex family of smoke detectors causes an alert and sends acommunications via the standard Firex wired communications, the smokedetection device 550 of the inventive security system will receive thesame communications as all Firex smoke detectors on the same circuit,and the inventive security system can cause its own alert using its ownaudible capability and/or any gateway devices 300 installed in theinventive security system. This ability to convert the wiredcommunications from an existing Firex network of smoke detectors into anappropriate communications within the inventive security system obviatesthe need for a user to replace all of the smoke detectors in a home wheninstalling an inventive security system. Note that while smoke detectorsand Firex have been used as examples, other types of sensors and otherbrands/manufacturers can be substituted into this specification withoutdetracting from the inventive nature.

[0221] In addition to detecting intrusion, the security system canmonitor the status of other environmental quantities such as fire,smoke, heat, water, gases, temperature, vibration, motion, as well asother measurable events or items, whether environmental or not (i.e.presence, range, location). The list of sensor possibilities is notmeant to be exhaustive, and many types of sensors already exist today.The inventive nature of this security system is enabling the reading andmonitoring of various other sensor types 620 by an RFID based securitysystem using backscatter modulation 421 or active RF communications 422,whereby the monitoring of intrusion is combined with the monitoring ofother measurable quantities, and placed under the control of a commonmaster controller. For each of these sensor types 620, the securitysystem can be configured to report an alert based upon a change in thecondition or quantity being measured, or by said condition or quantityreaching a particular relationship to a predetermined threshold, wherethe relationship can be, for example, one or more of less than, equalto, or more than (i.e. a monitored temperature is less than or equal toa predetermined threshold such as the freezing point).

[0222] These detection devices can be created in at least two forms,depending upon the designer's preference. In one example embodiment, anappropriate sensor can be connected to an RFID transponder 100, in amanner similar to that by which an intrusion sensor 600 is connected tothe RFID transponder 100. All of the previous discussion relating to thepowering of an LED generator 601 by the RFID transponder 100 applies tothe powering of appropriate sensors as well. This embodiment enables thecreation of low cost sensors, as long as the sensors are within thereader range of RFID readers 200.

[0223] In a second example embodiment, these sensor devices may beindependently powered, much as RFID readers 200 and gateways 300 areindependently powered. Each of these detection devices are created bycombining an sensor appropriate for the quantity being measured andmonitored with a local power supply 264, processor 261, and acommunications means 262 that may include any of active RF 422,backscatter modulation 421, or power line carrier communications 202. Ineither of these example embodiments, the detection devices must beregistered using the same means as discussed for RFID readers 200,gateways 300, and other devices 550. These sensor devices may find greatuse in monitoring the status of unoccupied buildings, such as vacationhomes. A temperature sensor may be useful in alerting a remote buildingowner if the heating system and failed and the building plumbing is indanger of freezing. Similarly, a flood prone building can be monitoringfor rising water while otherwise unoccupied.

[0224] In addition to performing the functions described herein within asingle building or home, the security system in one building can alsooperate in concert with an inventive security system installed in one ormore other buildings through a networking capability. There are twolevels of networking supported by the security system: local andserver-based. Local networking operates using active RF communications422 between security systems installed in two different buildings.Because of the power levels supported during active RF communications422, the distance between the security systems in the two buildings canbe a mile or greater, depending upon terrain. Each of the securitysystems remain under the control of their respective master controllers,and the controller function 250, including both the program code 251 andconfiguration data 252, of each device remains dedicated to its ownsecurity system. However, an authorized user of one security system andan authorized user of a second security system can command theirrespective systems to permit communications between the two saidsecurity systems, thereby creating a network between the two systems.This network can exist between more than just two systems; for example,an entire neighborhood of homes, each with an inventive security system,can permit their respective security systems to network with othersecurity systems in the neighborhood.

[0225] When two or more security systems are networked using active RFcommunications 422, various capabilities of each security system can beshared. For example, a first security system in a first home can accessa gateway 300 associated with a second security system in a second home.This may be advantageous if, for example, an intruder were to cut thephone line associated with the first home, thereby rendering useless agateway 300 with modem module 310 installed in the first securitysystem. It is unlikely that an intruder would know to cut the phonelines associated with multiple homes. In another example, if a childwearing an RFID transponder 100 associated with the first securitysystem is present in the second home, the second security system canread the RFID transponder 100 on the child and provide the read data tothe first security system, thereby enabling a parent to locate a childat either the first home or the second home. In yet another example, ifthe first security system in the first home causes an alert, and theoccupants are away on travel, the first security system can request thesecond security system to also cause an alert thereby notifying theneighbors at the second home of the alert and enabling them toinvestigate the cause of the alert at the first home.

[0226] When two security systems are beyond the range of communicationsvia active RF communications 422, the security systems may still form anetwork through their respective gateways 300. The security systems mayeither network through direct connection between their respectivegateways 300 or may network through an intermediate server. The use ofan intermediate server can enable the first security system and thesecond security system to have different types of modules 310 to 313installed in the gateway 300 of each respective security system. Since acommercial emergency response agency will likely already have serversequipped to supported the various types of modules 310 to 313 installedin various gateways 300, the provision of an intermediate server fornetworking security systems may present an expanded businessopportunity.

[0227] Networking through intermediate servers expands the applicationsand usefulness of the inventive security system. For example, there maybe a caregiver that would like to monitor an elderly parent living alonein another city. Using the networking feature, the caregiver can monitorthe armed/disarmed status of the security system in the home of theelderly parent, use two-way audio and/or the camera of the securitysystem to check on the elderly parent, and monitor any RFID transponder100 worn by the elderly parent. This may be equally useful for parentsto monitor a student living away at college, and other similar familysituations.

[0228] In either form of networking, the security system can provide anauthentication mechanism to ensure that networking is not inadvertentlyenabled with another unintended security system. The authenticationmechanism may consist of the mutual entering of an agreed security codein each of the two security systems which are to network. In theircommunications with each other, the two security systems may send andverify that the security codes properly match before permitting variousoperations between the two systems. Other authentication mechanisms mayalso be used, such as the shared used of a designated master key RFIDtransponder 265. In this example, rather that requiring the mutualentering of an agreed security code, each of the security systems whichare to network can be required to first read the same designated masterkey RFID transponder 265. As described earlier, the reading of masterkey RFID transponders 265 requires a close physical proximity generallyattainable only by authorized users.

[0229] In addition to the physical embodiments described herein, variouscomponents of the security system can be manufactured in other physicalembodiments. For example, modern outlet boxes used for both outlets andlight switches are available in sizes of 20 cubic inches or more. Infact, many modern electrical codes require the use of the these largerboxes. Within an enclosure of 20 cubic inches or more, an RFID reader200 can be manufactured and mounted in a form integrated with an outletor a light switch as shown in FIG. 18B. The installation of thisintegrated RFID reader 200 would require the removal of a currentoutlet, and the connection of the AC power lines to the integrated RFIDreader 200/outlet. The AC power lines would power both the RFID reader200 and the outlet. In addition to a cleaner physical appearance, thisintegrated RFID reader 200/outlet would provide the same two outletconnection points as standard outlets and provide a concealed RFIDreader 200 capability. In a similar manner, an integrated RFID reader200/light switch can also be manufactured for mounting within an outletbox.

[0230] The true scope of the present invention is not limited to thepresently preferred embodiments disclosed herein. As will be understoodby those skilled in the art, for example, different components, such asprocessors or chipsets, can be chosen in the design, packaging, andmanufacture of the various elements of the present invention. Thediscussed embodiments of the present invention have generally relied onthe availability of commercial chipsets, however many of the functionsdisclosed herein can also be implemented by a designer using discretecircuits and components. As a further example, the RFID reader 200 andRFID transponder 100 can operate at different frequencies than thosediscussed herein, or the gateways 300 and RFID readers 200 can usealternate RF or power line communications protocols. Also, certainfunctions which have been discussed as optional may be incorporated aspart of the standard product offering if customer purchase patternsdictate certain preferred forms. Finally, this document generallyreferences US standards, customs, and FCC rules. Various parameters,such as input power or output power for example, can be adjusted toconform with international standards. According, except as they may beexpressly so limited, the scope of protection of the following claims isnot intended to be limited to the specific embodiments described above.

I claim:
 1. A first RFID reader for use in a security network,containing: a processor, memory for storing program code andconfiguration data, a control function contained within the programcode, and at least a first antenna for use in wireless communications.2. The RFID reader of claim 1, wherein the security network can be usedin a building with at least one opening to be monitored for intrusion.3. The RFID reader of claim 1, wherein the security network can be usedin a building to be monitored for smoke or fire.
 4. The RFID reader ofclaim 1, wherein the security network also contains at least a firstRFID transponder, and wherein the first RFID reader can receive wirelesscommunications from at least the said first RFID transponder.
 5. TheRFID reader of claim 1, wherein the security network also contains asecond RFID reader, and wherein the said first RFID reader can receivewireless communications from the said second RFID reader.
 6. The RFIDreader of claim 1, wherein the security network also contains at least afirst RFID transponder and a second RFID reader, and wherein the saidfirst RFID reader can receive a wireless communications from the saidfirst RFID transponder to the said second RFID reader.
 7. The RFIDreader of claim 1, wherein the said first RFID reader further contains asecond antenna for use in wireless communications.
 8. The RFID reader ofclaim 7, wherein the said first RFID reader uses only one of the saidfirst antenna or the said second antenna in each wirelesscommunications.
 9. The RFID reader of claim 8, wherein the configurationdata contains parameters that predetermine which of the said firstantenna or the said second antenna to use in each wirelesscommunications.
 10. The RFID reader of claim 1, wherein the said firstRFID reader further contains a battery backup.
 11. The RFID reader ofclaim 1, wherein the said first RFID reader supports more than onemodulation technique.
 12. The RFID reader of claim 11, wherein at leastone modulation technique is continuous wave.
 13. The RFID reader ofclaim 11, wherein at least one modulation technique is GaussianFrequency Shift Keying.
 14. The RFID reader of claim 1, wherein the saidfirst RFID reader supports multiple transmit power levels.
 15. The RFIDreader of claim 1, wherein the said first RFID reader can vary its rateof transmitting RF energy.
 16. The RFID reader of claim 1, wherein thesaid first RFID reader further contains algorithms for using microwaveDoppler analysis to detect motion.
 17. The RFID reader of claim 16,wherein the said first RFID reader applies the said algorithms for usingmicrowave Doppler analysis to detect motion to the response wirelesscommunications from a first RFID transponder.
 18. The RFID reader ofclaim 1, wherein the said first RFID reader further contains an acoustictransducer.
 19. The RFID reader of claim 18, wherein the said first RFIDreader further contains algorithms to process audio waves received bythe acoustic transducer, and wherein the algorithms are designed todetect glass breakage.
 20. The RFID reader of claim 18, wherein the saidfirst RFID reader further contains algorithms to process audio wavesreceived by the acoustic transducer, and wherein the algorithms aredesigned to perform voice recognition.
 21. The RFID reader of claim 19,wherein the control function contained within the said first RFID readeraccepts commands received via voice recognition.
 22. The RFID reader ofclaim 18, wherein the said first RFID reader further contains algorithmsto digitize the audio waves received by the acoustic transducer, andretransmit the digitized audio waves via wireless communications. 23.The RFID reader of claim 1, wherein the said first RFID reader furthercontains a sensor that can monitor an environmental parameter in atleast one portion of the building.
 24. The RFID reader of claim 23,wherein the said environmental parameter is the presence of smoke. 25.The RFID reader of claim 23, wherein the said environmental parameter istemperature.
 26. The RFID reader of claim 23, wherein the saidenvironmental parameter is the presence of water.
 27. The RFID reader ofclaim 1, wherein the said first RFID reader further contains a camera.28. The RFID reader of claim 27, wherein the said first RFID readerfurther contains algorithms to digitize pictures recorded by the camera,and transmit the digitized pictures via wireless communications.
 29. TheRFID reader of claim 1, wherein at least one operation of the said firstRFID reader is under the control of a master controller contained withinthe security network.
 30. The RFID reader of claim 29, wherein the saidmaster controller is contained within a device in the security networkother than the said first REID reader.
 31. The RFID reader of claim 29,wherein the said master controller is contained with the said first RFIDreader.
 32. The RFID reader of claim 31, wherein the said mastercontroller can send a command controlling at least one operation ofanother device contained within the security network.
 33. The RFIDreader of claim 1, wherein the configuration data contained with thesaid first RFID reader can be changed under the control of a mastercontroller or control function contained within the security network.34. The RFID reader of claim 1, wherein the program code contained withthe said first RFID reader can be updated under the control of a mastercontroller or control function contained within the security network.35. The RFID reader of claim 1, wherein the said first RFID readerfurther contains an RFID transponder within the physical packaging ofthe said first RFID reader.
 36. The RFID reader of claim 1, wherein thesaid first RFID reader further contains an interface to a prior artsecurity system.
 37. The RFID reader of claim 36, wherein the said firstRFID reader can receive power via the interface to the said prior artsecurity system.
 38. The RFID reader of claim 36, wherein the said firstRFID reader can receive commands via the interface to the said prior artsecurity system.
 39. The RFID reader of claim 1, wherein the said firstRFID reader is mechanically mounted to a plate, and wherein the platecan be mechanically mounted to an outlet.
 40. The RFID reader of claim1, wherein the said first RFID reader is integrated with an outlet, andthe physical packaging of the integrated RFID reader and outlet can beinstalled within a standard outlet box approved for use withinbuildings.
 41. The RFID reader of claim 1, wherein the said first RFIDreader is integrated with a light switch, and the physical packaging ofthe integrated RFID reader and light switch can be installed within astandard outlet box approved for use within buildings.