Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD FOR AUGMENTING AN ACCESS TO A LEGACY CONTROL SYSTEM AND RF RECEIVER FOR SAME
Document Type and Number:
WIPO Patent Application WO/2016/142790
Kind Code:
A1
Abstract:
A method and a system are disclosed for augmenting an access to a legacy access control system to a plurality of users, the method comprising providing an RF receiver, the RF receiver being capable of identifying a corresponding portable RF transceiver carried out by one of a plurality of users and providing a corresponding signal at a corresponding output; providing a legacy access control system comprising an ID reader, the ID reader comprising an output; connecting the output of the RF receiver to the output of the ID reader; and programming the legacy access control system to ensure authorized users are recognized by the legacy access control system when in proximity to the RF receiver.

Inventors:
HANASH NORM (CA)
DIMOV LYUBOMIR (CA)
Application Number:
PCT/IB2016/050033
Publication Date:
September 15, 2016
Filing Date:
January 05, 2016
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
VISTATECH TECH INC (CA)
International Classes:
G07C9/00; H04B7/26
Foreign References:
US20070043954A12007-02-22
US20140070003A12014-03-13
US20110164509A12011-07-07
Attorney, Agent or Firm:
FASKEN MARTINEAU DUMOULIN LLP (Suite 3700P.O. Box 242, Stock Exchange Towe, Montréal Québec H4Z 1E9, CA)
Download PDF:
Claims:
CLAIMS:

1. A method for augmenting an access to a legacy access control system to a plurality of users, the method comprising:

providing an RF receiver, the RF receiver being capable of identifying a corresponding portable RF transceiver carried out by one of a plurality of users and providing a corresponding signal at a corresponding output;

providing a legacy access control system comprising an ID reader, the ID reader comprising an output;

connecting the output of the RF receiver to the output of the ID reader; and programming the legacy access control system to ensure authorized users are recognized by the legacy access control system when in proximity of the RF receiver, the programming comprising for each authorized user, adding a corresponding identification of a corresponding portable RF transceiver to a database.

2. The method as claimed in claim 1 , wherein the ID reader is selected from a group consisting of tag readers, keypads, biometric readers and magnetic strip readers.

3. The method as claimed in any one of claims 1 to 2, wherein the output of the ID reader generates a data packet according to a communication protocol.

4. The method as claimed in any one of claims 1 to 3, wherein the programming of the legacy access control system further comprises accessing a programming mode of the legacy access control system.

5. The method as claimed in claim 3, wherein the communication protocol is selected from a group consisting of Wiegant and serial communication RS485 standard.

6. An RF receiver to be used for augmenting an access to a plurality of users to a legacy access control system comprising an ID reader, the RF receiver comprising:

an RF antenna for receiving an RF signal;

an LF antenna for transmitting an LF signal;

a data providing unit adapted to be connected to an output of the ID reader of the legacy access control system;

a processing unit operatively connected to the RF antenna, to the LF antenna and to the data providing unit, the processing unit for receiving an RF signal from the RF antenna and for providing a signal indicative of the RF signal to the data providing unit; wherein the RF signal received from the RF antenna is transmitted by an RF transmitter following a reception of the LF signal.

7. The RF receiver as claimed in claim 6, wherein the RF antenna operates on a frequency range of 433 MHz.

8. The RF receiver as claimed in claim 6, wherein the LF antenna operates on a frequency range of 135 kHz.

9. The RF receiver as claimed in claim 6, further comprising a microwave sensor operatively connected to the processing unit; the microwave sensor for providing a signal indicative of a location of a corresponding portable RF transceiver transmitting an RF signal to the RF antenna to the processing unit; wherein the processing unit provides the signal indicative of the RF signal to the data providing unit if the signal indicative of a location matches a predetermined value.

10. The RF receiver as claimed in claim 9, wherein the microwave sensor operates on a frequency range of 2.4 GHz.

1 1. The RF receiver as claimed in any one of claims 9 to 10, wherein the signal indicative of the RF signal comprises an identification of the corresponding portable RF transceiver transmitting the RF signal to the RF antenna.

12. The RF receiver as claimed in claim 1 1 , further wherein the RF receiver comprises a memory unit operatively coupled to the processing unit, the memory unit for storing an indication of at least one authorized RF transceiver, further wherein the processing unit determines if the identification of the corresponding portable RF transceiver is located in said memory unit; further wherein the processing unit transmits an unlock signal to the data providing unit if the identification of the corresponding portable RF transceiver is located in said memory to the data providing unit and if said signal indication of a location matches a predetermined value.

13. A method for augmenting an access to a plurality of users to a legacy access control system comprising an ID reader, the ID reader comprising an output, the method comprising:

providing an RF receiver as claimed in any one of claims 6 to 12,

connecting the data providing unit of the RF receiver to the output of the ID reader; and

programming the legacy access control system to ensure authorized users are recognized by the legacy access control system when in proximity of the RF receiver, the programming comprising for each authorized user, adding a corresponding identification of a corresponding portable RF transceiver to a database.

14. A method for augmenting an access to a plurality of users to a legacy access control system comprising an ID reader, the ID reader comprising an output, the method comprising:

providing an RF receiver as claimed in claim 12, connecting the data providing unit of the RF receiver to the output of the ID reader; and

programming the RF receiver to ensure authorized users are recognized by the RF receiver when in proximity of the RF receiver, the programming comprising for each authorized user, adding a corresponding identification of a corresponding portable RF transceiver to the memory unit of the RF receiver.

15. The RF receiver as claimed in claim 12, wherein the LF antenna and the microwave sensor are integrated in an antenna board assembly; further wherein the RF antenna, the processing unit, the memory unit and the data providing unit are integrated in a base board assembly; further wherein the antenna board assembly may be mounted on the base board assembly.

Description:
METHOD FOR AUGMENTING AN ACCESS TO A LEGACY CONTROL SYSTEM

AND RF RECEIVER FOR SAME

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority on U.S. provisional patent application No. 62/131 ,470, filed on March 1 1 , 2015, entitled "Method for Augmenting an Access to a Legacy Control System and RF Receiver for Same," the specification of which is hereby incorporated by reference.

FIELD

The invention relates to access control systems. More precisely, the invention pertains to a method for augmenting an access to a legacy control system and an RF receiver for same.

BACKGROUND

Access control systems are widely used for controlling an access to a given location.

In fact, they have been around for decades. As a consequence, some operate in a very simple way. For instance, some access control systems only operate using a keypad.

More modern access control systems use more complex schemes to authenticate a user, such as biometrics, for instance.

The skilled addressee will appreciate that a lot of work is required in the case where an upgrade of the access control system is sought by the owner, for instance.

Not only an ID reader may have to be removed, but all other components will have to be replaced by components of the new access control system.

In addition, the new access control system will have to be reprogrammed for all users, which can be cumbersome.

There is a need for a method that will overcome at least one of the above- identified drawbacks. Features of the invention will be apparent from review of the disclosure, drawings and description of the invention below.

BRIEF SUMMARY

According to a broad aspect, there is disclosed a method for augmenting an access to a legacy access control system to a plurality of users, the method comprising providing an RF receiver, the RF receiver being capable of identifying a corresponding portable RF transceiver carried out by one of a plurality of users and providing a corresponding signal at a corresponding output; providing a legacy access control system comprising an ID reader, the ID reader comprising an output; connecting the output of the RF receiver to the output of the ID reader; and programming the legacy access control system to ensure authorized users are recognized by the legacy access control system when in proximity of the RF receiver, the programming comprising for each authorized user, adding a corresponding identification of a corresponding portable RF transceiver to a database.

According to a broad aspect, there is disclosed a method for augmenting an access to a legacy access control system to a plurality of users, the method comprising providing an RF receiver, the RF receiver being capable of identifying a corresponding portable RF transceiver carried out by one of a plurality of users and providing a corresponding signal at a corresponding output; providing a legacy access control system comprising an ID reader, the ID reader comprising an output; connecting the output of the RF receiver to the output of the ID reader; and programming the legacy access control system to ensure authorized users are recognized by the legacy access control system when in proximity of the RF receiver, the programming comprising for each authorized user, adding a corresponding identification of a corresponding portable RF transceiver to a database.

According to an embodiment, the ID reader is selected from a group consisting of tag readers, keypads, biometric readers and magnetic strip readers. According to an embodiment, the output of the ID reader generates a data packet according to a communication protocol.

According to an embodiment, the programming of the legacy access control system further comprises accessing a programming mode of the legacy access control system.

According to an embodiment, the communication protocol is selected from a group consisting of Wiegant and serial communication RS485 standard.

According to another broad aspect, there is disclosed an RF receiver to be used for augmenting an access to a legacy access control system comprising an ID reader to a plurality of users, the RF receiver comprising an RF antenna for receiving an RF signal; an LF antenna for transmitting an LF signal; a data providing unit adapted to be connected to an output of the ID reader of the legacy access control system and a processing unit operatively connected to the RF antenna, to the LF antenna and to the data providing unit, the processing unit for receiving an RF signal from the RF antenna and for providing a signal indicative of the RF signal to the data providing unit; wherein the RF signal received from the RF antenna is transmitted by an RF transmitter following a reception of the LF signal.

According to an embodiment, the RF antenna operates on a frequency range of 433 MHz.

According to an embodiment, the LF antenna operates on a frequency range of 135 kHz.

According to an embodiment, the RF receiver further comprises a microwave sensor operatively connected to the processing unit; the microwave sensor for providing a signal indicative of a location of a corresponding portable RF transceiver to the processing unit; wherein the processing unit provides the signal indicative of the RF signal to the data providing unit if the signal indicative of a location matches a predetermined value.

According to an embodiment, the microwave sensor operates on a frequency range of 2.4 GHz. According to an embodiment, the signal indicative of the RF signal comprises an identification of the corresponding portable RF transceiver transmitting the RF signal to the RF antenna.

According to an embodiment, the RF receiver comprises a memory unit operatively coupled to the processing unit, the memory unit for storing an indication of at least one authorized RF transceiver, further wherein the processing unit determines if the identification of the corresponding portable RF transceiver is located in said memory unit; further wherein the processing unit transmits an unlock signal to the data providing unit if the identification of the corresponding portable RF transceiver is located in said memory to the data providing unit.

According to a broad aspect, there is disclosed a method for augmenting an access to a plurality of users to a legacy access control system comprising an ID reader, the ID reader comprising an output, the method comprising providing an RF receiver, connecting the data providing unit of the RF receiver to the output of the ID reader and programming the legacy access control system to ensure authorized users are recognized by the legacy access control system when in proximity of the RF receiver, the programming comprising for each authorized user, adding a corresponding identification of a corresponding portable RF transceiver to a database.

According to another broad aspect, there is disclosed a method for augmenting an access to a plurality of users to a legacy access control system comprising an ID reader, the ID reader comprising an output, the method comprising providing an RF receiver, connecting the data providing unit of the RF receiver to the output of the ID reader and programming the RF receiver to ensure authorized users are recognized by the RF receiver when in proximity of the RF receiver, the programming comprising for each authorized user, adding a corresponding identification of a corresponding portable RF transceiver to the memory unit of the RF receiver. According to an embodiment, the LF antenna and the microwave sensor are integrated in an antenna board assembly; the RF antenna, the processing unit, the memory unit and the data providing unit are integrated in a base board assembly; and the antenna board assembly may be mounted on the base board assembly.

An advantage of the method disclosed herein is that it is possible to add an RF receiver to an existing legacy access control system using the method.

Another advantage of the method disclosed herein is that there is no need to remove an existing component of the legacy access control system.

BRIEF DESCRIPTION OF THE DRAWINGS

In order that the invention may be readily understood, embodiments of the invention are illustrated by way of example in the accompanying drawings.

Figure 1 is a flowchart which shows an embodiment of a method for augmenting an access to a legacy control system.

Figure 2 is a diagram which illustrates how an RF receiver is connected to an existing legacy control system.

Figure 3 is a flowchart which shows an embodiment for programming the legacy access control.

Figure 4 is a diagram which shows an embodiment of an RF receiver which may be used.

Figure 5 shows a front elevation and a top plan view of respectively three devices; a first device is an antenna board assembly; a second device is a base board assembly and a third device is a RF receiver assembly integrating the antenna board assembly and the base board assembly.

Figure 6 shows a front elevation view, a side elevation view, a top view, a back perspective view, a cross-sectioned view and an exploded view of the antenna board assembly.

Figure 7 shows a front elevation view, a side elevation view, a top view, a back perspective view, a cross-sectioned view and an exploded view of the base board assembly. Figure 8 shows a front elevation view, a side elevation view, a top view, a back perspective view, a cross-sectioned view and an exploded view of the RF receiver assembly integrating the antenna board assembly and the base board assembly.

Further details of the invention and its advantages will be apparent from the detailed description included below.

DETAILED DESCRIPTION

In the following description of the embodiments, references to the accompanying drawings are by way of illustration of an example by which the invention may be practiced.

Terms

The term "invention" and the like mean "the one or more inventions disclosed in this application," unless expressly specified otherwise.

The terms "an aspect," "an embodiment," "embodiment," "embodiments," "the embodiment," "the embodiments," "one or more embodiments," "some embodiments," "certain embodiments," "one embodiment," "another embodiment" and the like mean "one or more (but not all) embodiments of the disclosed invention(s)," unless expressly specified otherwise.

A reference to "another embodiment" or "another aspect" in describing an embodiment does not imply that the referenced embodiment is mutually exclusive with another embodiment (e.g., an embodiment described before the referenced embodiment), unless expressly specified otherwise.

The terms "including," "comprising" and variations thereof mean "including but not limited to," unless expressly specified otherwise.

The terms "a," "an" and "the" mean "one or more," unless expressly specified otherwise.

The term "plurality" means "two or more," unless expressly specified otherwise. The term "herein" means "in the present application, including anything which may be incorporated by reference," unless expressly specified otherwise.

The term "whereby" is used herein only to precede a clause or other set of words that express only the intended result, objective or consequence of something that is previously and explicitly recited. Thus, when the term "whereby" is used in a claim, the clause or other words that the term "whereby" modifies do not establish specific further limitations of the claim or otherwise restricts the meaning or scope of the claim.

The term "e.g." and like terms mean "for example," and thus do not limit the terms or phrases they explain. For example, in a sentence "the computer sends data (e.g., instructions, a data structure) over the Internet," the term "e.g." explains that "instructions" are an example of "data" that the computer may send over the Internet, and also explains that "a data structure" is an example of "data" that the computer may send over the Internet. However, both "instructions" and "a data structure" are merely examples of "data," and other things besides "instructions" and "a data structure" can be "data."

The term "i.e." and like terms mean "that is," and thus limit the terms or phrases they explain.

The term "legacy control system" and like terms mean an access control system that has already been installed at a given location. The installation may have occurred at any time in the past.

Neither the Title nor the Abstract is to be taken as limiting in any way as the scope of the disclosed invention(s). The title of the present application and headings of sections provided in the present application are for convenience only, and are not to be taken as limiting the disclosure in any way.

Numerous embodiments are described in the present application, and are presented for illustrative purposes only. The described embodiments are not, and are not intended to be, limiting in any sense. The presently disclosed invention(s) are widely applicable to numerous embodiments, as is readily apparent from the disclosure. One of ordinary skill in the art will recognize that the disclosed invention(s) may be practiced with various modifications and alterations, such as structural and logical modifications. Although particular features of the disclosed invention(s) may be described with reference to one or more particular embodiments and/or drawings, it should be understood that such features are not limited to usage in the one or more particular embodiments or drawings with reference to which they are described, unless expressly specified otherwise.

With all this in mind, the present invention is directed to a method for augmenting an access to a legacy access control system to a plurality of users and a RF receiver for same.

It will be appreciated that the legacy access control may be of various types. In one embodiment, the legacy access control is PowerSeries Control Panel PC1616 manufactured by DSC.

An embodiment of a legacy access control is shown in Fig. 2.

The purpose of the legacy access control is to control an access to an asset using, for instance, an electrical latch 28, shown in Fig. 2. It will be appreciated that elements other than the electrical latch 28 may be used to grant access to the asset.

The skilled addressee will appreciate that the electrical latch 28 may be of various types. For instance, the electrical latch 28 is 7131 Electric Strikes manufactured by Adams Rite.

Now referring to Fig. 1 , there is shown an embodiment of a method for augmenting an access to a legacy access control system to a plurality of users.

According to processing step 10, an RF receiver is provided.

While this is not illustrated in Fig. 2, it will be appreciated that the RF receiver 24 is capable of identifying a corresponding portable RF transceiver carried out by one of a plurality of users and of providing a corresponding signal at a corresponding output. The corresponding signal is referred to as ID signal in Fig. 2.

It will be appreciated that the RF receiver 24 may be of various types. In one embodiment, the RF receiver 24 is MICRF21 1 manufactured by Micrel (TM) . In an alternative embodiment, the RF receiver is MAX1473 manufactured by Maxim Integrated™.

It will be appreciated that, alternatively, the RF receiver 24 may be MICRF21 1 manufactured by Micrel (TM) .

According to processing step 12, a legacy access control system 21 is provided.

As shown in Fig. 2 and in one embodiment, the legacy access control system 21 comprises an ID reader 22, a processing unit 26 and a processing device 30.

It will be appreciated that the ID reader 22 has, inter alia, an output.

In fact, it will be appreciated that the purpose of the ID reader 22 is to read a corresponding ID and to output a corresponding result, referred to as ID legacy signal in Fig. 2.

In one embodiment, the ID reader 22 is a proximity tag reader or a tag reader.

In another embodiment, the ID reader 22 is a keypad.

In another embodiment, the ID reader 22 is a biometric reader.

In another embodiment, the ID reader 22 is a magnetic strip reader.

Typically the corresponding result from the reading of the ID reader 22 is a data packet. The skilled addressee will appreciate that the content of the data packet depends on a communication standard used. For instance and in one embodiment, the communication standard is Wiegand, designed by John R. Wiegand.

Alternatively the communication standard is a serial communication RS485 standard.

The legacy control system 21 comprises the processing unit 26.

The processing unit 26 is operatively connected to the ID reader 22, to the RF receiver 24, as further explained below, to an electrical latch 28 and to the processing device 30. The processing unit 26 receives an ID signal from the RF receiver 24 and an ID (legacy) signal from the ID reader 22.

The processing unit 26 further provides a signal to the processing device 30 and obtains from the processing device 30 a signal. It will be appreciated that the processing unit 26 is operatively connected to the processing device 30 according to various embodiments. In one embodiment, the processing unit 26 is operatively connected to the processing device 30 using RS232 communication protocol. Depending on certain conditions, a signal, referred to as an unlock signal, is provided by the processing unit 26 to the electrical latch 28. Upon receipt of the unlock signal, the electrical latch 28 unlocks a latch.

It will be appreciated that the processing unit 26 may be of various types. In one embodiment, the processing unit 26 is a controller such as PIC16LF916 manufactured by Microchip Technology Inc.

In an alternative embodiment, the processing unit 26 is selected from a group consisting of FPGA and microcontrollers such as PIC16 or PIC18 family manufactured by Microchip Technology Inc.

The processing device 30 is used for receiving a signal from the processing unit 26. The processing device 30 is further capable of providing a signal to the processing unit 26.

In fact, it will be appreciated that the processing device 30 is typically used for maintaining a list of authorized users and for informing the processing unit as to whether a typical user is allowed or not. Various parameters may be used for determining if a user is allowed or not in addition to the ID of the user such as for instance time of the day, etc.

In addition, the processing device 30 is used also for adding users to the system.

In one embodiment, the processing device 30 is a microcontroller such as PIC16 or PIC18 Family manufactured by Microchip Technology Inc. Now referring back to Fig. 1 and according to processing step 14, the output of the RF receiver 24 is connected to the output of the ID reader 22.

It will be appreciated that the connecting may involve various steps not disclosed, such as opening a panel for accessing at the output of the ID reader 22, etc., known to the skilled addressee and which will not be disclosed for the sake of conciseness.

As shown in Fig. 2, the output of the RF receiver 24 is connected to the output of the ID reader 22.

Moreover, it will be appreciated that the connecting may be performed according to various embodiments such as using serial computer bus I2C.

It will be appreciated that the RF receiver 24 operates using a protocol similar to the protocol used by the ID reader 22 to communicate with the processing unit 26.

Referring back to Fig. 1 and according to processing step 16, the legacy access control system is programmed to ensure that authorized users are recognized by the legacy access control system when in proximity of the RF receiver 24.

The programming comprises, for each authorized user, adding a corresponding identification of a corresponding portable RF transceiver to a database.

It will be appreciated by the skilled addressee that the programming may be performed according to various embodiments.

Now referring to Fig. 3, there is shown an embodiment for programming the legacy access control.

According to processing step 32, a programming mode of the legacy access control system is accessed.

In one embodiment, the programming mode is accessed by an operator interacting with the processing device 30.

The skilled addressee will appreciate that the manner in which the programming mode is entered depends highly on the type of legacy access control system used. In one embodiment a keypad programming terminal is used. In an alternative embodiment, the programming mode is entered using a PC with specialized software.

Still referring to Fig. 3 and according to processing step 34, an identification associated with a given user is entered in the programming mode.

The identification may be, for instance, a number, a combination of letters and numbers, etc.

In fact, the identification is associated with authorizing a given user.

More precisely, the identification is associated with the hardware used by the user when interacting with the RF receiver 24.

While this has not been disclosed, and depending also on the processing device 30, it will be appreciated that additional rules may be inputted for authorizing the given user.

It will be appreciated that the legacy access control system is upgraded with an RF functionality for a portion or all of the users once every additional user is added.

While this has not been disclosed in Fig. 2, it will be appreciated that an optional connection may be further provided between the RF receiver 24 and the processing unit 26.

In one embodiment, the optional connection between the RF receiver 24 and the processing unit 26 operates according to the standard R485. The skilled addressee will appreciate that various alternative embodiments may be possible for the communication standard such as serial computer bus I2C. In fact, it will be appreciated that the purpose of the optional connection between the RF receiver 24 and the processing unit 26 is to transmit additional data pertinent for the processing unit 26.

Now referring to Fig. 4, there is shown another alternative embodiment which illustrates a particular embodiment for an RF receiver 40 which may be used in the method disclosed herein. It will be appreciated that the RF receiver 40 is used for detecting a corresponding token 48. The corresponding token 48 will also be referred to as a portable RF transceiver.

The RF receiver 40 comprises an LF antenna 42, an RF antenna 44, an optional microwave sensor 46, a processing unit 48, a data providing unit 50 and an optional memory unit 52.

The LF antenna 40, the RF antenna 44, the optional microwave sensor 46, the data providing unit 50 and the optional memory unit 52 are connected to the processing unit 48. The skilled addressee will appreciate that various types of connection may be performed.

In fact, the LF antenna 40 may be of various types. In one embodiment, the LF antenna 42 is 3D LF antenna manufactured by Primo. The LF antenna 40 typically operates on a frequency range of 125 kHz.

The skilled addressee will appreciate that various alternative embodiments may be possible for the LF antenna 40.

The RF antenna 44 typically operates on a frequency range of 433 MHz.

In fact, the RF antenna 44 may be of various types. In one embodiment, the RF antenna 42 is a chip antenna manufactured by Wurth Electronics Inc.

The skilled addressee will appreciate that various alternative embodiments may be possible for the RF antenna 44.

The optional microwave sensor 46 typically operates on a frequency range of 2.4 GHz.

In fact, the optional microwave sensor 46 may be of various types.

In one embodiment, the optional microwave sensor 46 is S Band microwave sensor module manufactured by Dnet.

The skilled addressee will appreciate that various alternative embodiments may be possible.

The optional memory unit 52 is used for storing an indication of at least one authorized portable RF transceiver. The optional memory unit 52 may be used in the case where the legacy control system does not comprise an indication of authorized users in a database. For instance, this may be the case if the legacy control system comprises an ID reader and an electrical latch. In such case the ID reader will provide an unlock signal to the electrical latch when a given ID is used.

It will be appreciated that the optional memory unit 52 may be of various types. In one embodiment, the optional memory unit 52 is selected from a group consisting of SD cards and EEPROMs.

The processing unit 48 may be of various types. In one embodiment, the processing unit 48 is PIC16LF916 manufactured by Microchip Technology Inc. The skilled addressee will appreciate that various alternative embodiments may be possible for the processing unit 48.

The processing unit 48 provides an LF signal to transmit to the LF antenna 42. The LF signal may be adjusted depending on the range sought for the operation of the token 49.

In the case where the token 49 receives the LF signal transmitted by the LF antenna 42, an RF signal is generated and transmitted by the token 49. The RF signal generated by the token 49 may be generated according to various embodiments. The signal may comprise, inter alia, an indication of the token 49. The RF signal generated by the token 49 is then received by the RF antenna 44 and provided to the processing unit 48.

It will be appreciated that an optional microwave sensor 46 may be used to advantageously ascertain the location of the token 49 and to make sure that it is precisely where it should be located.

A specific signal is generated by the processing unit 48 and is provided to the output of the ID reader 22 by the processing unit 48 via the data providing unit 50 if the optional microwave sensor 46 is used and if the token 49 is located at a given location. The specific signal comprises an identification of the token 49.

In the case where there is no optional microwave sensor 46, a specific signal is generated by the processing unit 48 and is provided to the output of the ID reader 22 by the processing unit 48. The specific signal comprises in one embodiment an identification of the token 49.

It will be appreciated that in the case where the optional memory unit 52 is used, the processing unit 48 determines if the identification of the corresponding portable RF transceiver is located in the optional memory unit 52. In the case where the identification of the corresponding portable RF transceiver is located in the optional memory unit 52, an unlock signal is transmitted by the processing unit 48 to the data providing unit 50.

Now referring to Fig. 5, there is shown respectively three devices.

A first device is an antenna board assembly 60. A second device is a base board assembly 64 and a third device is a RF receiver assembly 62 integrating the antenna board assembly and the base board assembly as further explained below.

Each of the antenna board assembly 60, the RF receiver assembly 62 and the base board assembly 64 may be secured to a wall 66.

In one embodiment, the antenna board assembly 60 comprises the LF antenna 42 and the optional microwave sensor 46.

Still in one embodiment, the base board assembly 64 comprises the RF antenna 44, the processing unit 48, the data providing unit 50 and the optional memory unit 52.

In one embodiment, the RF receiver assembly 62 comprises the LF antenna 42, the RF antenna 44, the optional microwave sensor 46, the processing unit 48, the data providing unit 50 and the optional memory unit 52.

It will be appreciated that the antenna board assembly 60 may be located a first side of the wall 66 while the base board assembly 64 may be located or not on the second side of the wall 66. It will be appreciated by the skilled addressee that having the base board assembly 64 located on the second side of the wall 66 may be advantageous in order to restrict physical access to the base board assembly 64 to users located on the first side of the wall 66. Such configuration could enhance the security of the system. Now referring to Fig. 6, there is shown an embodiment of the antenna board assembly 60.

As mentioned above, the antenna board assembly 60 comprises the LF antenna 42 and the optional microwave sensor 46.

While the antenna board assembly 60 is shown with a particular shape, it will be appreciated by the skilled addressee many alternative embodiments may be provided for the shape of the antenna board assembly 60.

Still referring to Fig. 6, the antenna board assembly 60 comprises a cover 70, an antenna base 74 and an antenna PCB 76.

The cover 70, the antenna base 74 and the antenna PCB 76 are secured together using securing means 72, an example of which is a screw. The skilled addressee will appreciate that various alternative embodiments may be provided for the securing means 72.

In one embodiment, the cover 70 is made of polypropylene. The skilled addressee will appreciate that various alternative embodiments may be provided for the cover 70. For instance, the cover 70 may have a different shape or a metalized surface connected to a touch sensor.

In one embodiment, the antenna base 74 is made of PCB copper field. The skilled addressee will appreciate that various alternative embodiments may be provided for the antenna base 74. For instance, the antenna base 74 may have a different copper area on the PCB for a better sensitivity.

Now referring to Fig. 7, there is shown an embodiment of the base board assembly 64.

As mentioned above, the base board assembly 64 comprises the RF antenna 44, the processing unit 48, the data providing unit 50 and the optional memory unit 52.

While the base board assembly 64 is shown with a particular shape, it will be appreciated by the skilled addressee many alternative embodiments may be provided for the shape of the base board assembly 64. Still referring to Fig. 7, the base board assembly 64 comprises a cover 80, a main PCB 82 and main base 86.

The cover 80, the main PCB 82 and the main base 86 are secured together using securing means 84, an example of which is a screw. The skilled addressee will appreciate that various alternative embodiments may be provided for the securing means 84.

In one embodiment, the cover 80 is made of polypropylene. The skilled addressee will appreciate that various alternative embodiments may be provided for the cover 80. For instance the cover may have a different shape or metalized surface connected to touch sensor for instance.

In one embodiment, the main base 86 is made of polypropylene. The skilled addressee will appreciate that various alternative embodiments may be provided for the main base 86. For instance, the main base 86 may have a different configuration for the opening or for the mounting of it.

Now referring to Fig. 8, there is shown an embodiment of the RF receiver assembly 62.

As mentioned above, the RF receiver assembly 62 comprises the LF antenna 42, the RF antenna 44, the optional microwave sensor 46, the processing unit 48, the data providing unit 50 and the optional memory unit 52.

While the RF receiver assembly 62 is shown with a particular shape, it will be appreciated by the skilled addressee many alternative embodiments may be provided for the shape of the RF receiver assembly 62.

Still referring to Fig. 8, the RF receiver assembly 62 comprises the cover 70, the antenna base 74, the antenna PCB 76, the main PCB 82 and the main base 86.

The cover 70, the antenna base 74, the antenna PCB 76, the main PCB 82 and the main base 86 are secured together using securing means 90, an example of which is a screw. The skilled addressee will appreciate that various alternative embodiments may be provided for the securing means 90. In such embodiment, it will be appreciated that the antenna PCB 76 is operatively connected to the main PCB 82 using corresponding male and female connectors, not shown. In one embodiment, the connectors are board to board header connectors. The skilled addressee will appreciate that the antenna PCB 76 may be operatively connected to the main PCB 82 using various alternative embodiments such as using different board to board connectors.

It will be appreciated that a method for augmenting an access to a plurality of users to a legacy access control system comprising an ID reader, the ID reader comprising an output, is further disclosed. In this embodiment, the method comprises providing an RF receiver as disclosed above. The method further comprises connecting the data providing unit of the RF receiver to the output of the ID reader. The method further comprises programming the legacy access control system to ensure authorized users are recognized by the legacy access control system when in proximity of the RF receiver, the programming comprising for each authorized user, adding a corresponding identification of a corresponding portable RF transceiver to a database.

It will be appreciated that another method for augmenting an access to a plurality of users to a legacy access control system comprising an ID reader is disclosed. In this embodiment, the method comprises providing an RF receiver as disclosed above. The method further comprises connecting the data providing unit of the RF receiver to the output of the ID reader. The method further comprises programming the RF receiver to ensure authorized users are recognized by the RF receiver when in proximity of the RF receiver, the programming comprising for each authorized user, adding a corresponding identification of a corresponding portable RF transceiver to the memory unit of the RF receiver.

It will be appreciated that the methods disclosed herein are of great advantage for various reasons. In fact, a first advantage of the methods disclosed herein is that it is possible to add an RF functionality to an existing legacy access control system that does not have it.

Another advantage of the methods disclosed herein is that there is no need to remove an existing component of the legacy access control system. In particular, the ID reader does not have to be modified or upgraded.

Another advantage of the methods disclosed herein is that the programming of the legacy access control does not have to be redone for the existing users. Only new users using the RF functionality will have to be added to the legacy access control.

Although the above description relates to a specific preferred embodiment as presently contemplated by the inventor, it will be understood that the invention in its broad aspect includes functional equivalents of the elements described herein.

Clause 1. A method for augmenting an access to a legacy access control system to a plurality of users, the method comprising:

providing an RF receiver, the RF receiver being capable of identifying a corresponding portable RF transceiver carried out by one of a plurality of users and providing a corresponding signal at a corresponding output;

providing a legacy access control system comprising an ID reader, the ID reader comprising an output;

connecting the output of the RF receiver to the output of the ID reader; and programming the legacy access control system to ensure authorized users are recognized by the legacy access control system when in proximity of the RF receiver, the programming comprising for each authorized user, adding a corresponding identification of a corresponding portable RF transceiver to a database. Clause 2. The method as claimed in clause 1 , wherein the ID reader is selected from a group consisting of tag readers, keypads, biometric readers and magnetic strip readers.

Clause 3. The method as claimed in any one of clauses 1 to 2, wherein the output of the ID reader generates a data packet according to a communication protocol.

Clause 4. The method as claimed in any one of clauses 1 to 3, wherein the programming of the legacy access control system further comprises accessing a programming mode of the legacy access control system.

Clause 5. The method as claimed in clause 3, wherein the communication protocol is selected from a group consisting of Wiegant and serial communication RS485 standard.

Clause 6. An RF receiver to be used for augmenting an access to a plurality of users to a legacy access control system comprising an ID reader, the RF receiver comprising:

an RF antenna for receiving an RF signal;

an LF antenna for transmitting an LF signal;

a data providing unit adapted to be connected to an output of the ID reader of the legacy access control system;

a processing unit operatively connected to the RF antenna, to the LF antenna and to the data providing unit, the processing unit for receiving an RF signal from the RF antenna and for providing a signal indicative of the RF signal to the data providing unit; wherein the RF signal received from the RF antenna is transmitted by an RF transmitter following a reception of the LF signal.

Clause 7. The RF receiver as claimed in clause 6, wherein the RF antenna operates on a frequency range of 433 MHz. Clause 8. The RF receiver as claimed in clause 6, wherein the LF antenna operates on a frequency range of 135 kHz.

Clause 9. The RF receiver as claimed in clause 6, further comprising a microwave sensor operatively connected to the processing unit; the microwave sensor for providing a signal indicative of a location of a corresponding portable RF transceiver transmitting an RF signal to the RF antenna to the processing unit; wherein the processing unit provides the signal indicative of the RF signal to the data providing unit if the signal indicative of a location matches a predetermined value.

Clause 10. The RF receiver as claimed in clause 9, wherein the microwave sensor operates on a frequency range of 2.4 GHz.

Clause 1 1. The RF receiver as claimed in any one of clauses 9 to 10, wherein the signal indicative of the RF signal comprises an identification of the corresponding portable RF transceiver transmitting the RF signal to the RF antenna.

Clause 12. The RF receiver as claimed in clause 1 1 , further wherein the RF receiver comprises a memory unit operatively coupled to the processing unit, the memory unit for storing an indication of at least one authorized RF transceiver, further wherein the processing unit determines if the identification of the corresponding portable RF transceiver is located in said memory unit; further wherein the processing unit transmits an unlock signal to the data providing unit if the identification of the corresponding portable RF transceiver is located in said memory to the data providing unit and if said signal indication of a location matches a predetermined value.

Clause 13. A method for augmenting an access to a plurality of users to a legacy access control system comprising an ID reader, the ID reader comprising an output, the method comprising: providing an RF receiver as claimed in any one of clauses 6 to 12,

connecting the data providing unit of the RF receiver to the output of the ID reader; and

programming the legacy access control system to ensure authorized users are recognized by the legacy access control system when in proximity of the RF receiver, the programming comprising for each authorized user, adding a corresponding identification of a corresponding portable RF transceiver to a database.

Clause 14. A method for augmenting an access to a plurality of users to a legacy access control system comprising an ID reader, the ID reader comprising an output, the method comprising:

providing an RF receiver as claimed in clause 12,

connecting the data providing unit of the RF receiver to the output of the ID reader; and

programming the RF receiver to ensure authorized users are recognized by the RF receiver when in proximity of the RF receiver, the programming comprising for each authorized user, adding a corresponding identification of a corresponding portable RF transceiver to the memory unit of the RF receiver.

Clause 15. The RF receiver as claimed in clause 12, wherein the LF antenna and the microwave sensor are integrated in an antenna board assembly; further wherein the RF antenna, the processing unit, the memory unit and the data providing unit are integrated in a base board assembly; further wherein the antenna board assembly may be mounted on the base board assembly.