The present invention relates to security systems, such as barrier moving operators, and more particularly, to security (or access) codes used for activating such systems.
Different types of moveable barrier operators have been sold over the years and these barrier operator systems have been used to actuate various types of moveable barriers. For example, garage door operators have been used to move garage doors and gate operators have been used to open and close gates.
A barrier moving operator usually comprises a barrier moving unit, or opener, such as a controlled motor, and intelligent activation and safety devices. The opener is typically activated in response to a security (or access) code transmitted from a remote transmitter. Radio Frequency (RF) signaling is the most common means of transmitting the security codes.
Many barrier moving operators use codes to activate the system which change after each transmission. Such varying codes, called rolling codes, are created by the transmitter and acted on by the receiver, both of which operate in accordance with the same method to predict a next security code to be sent and received. Some known rolling type security codes also include one or more fixed portions in addition to the rolling code portion. The fixed portion(s) stays the same, while the rolling portion is a number that changes every transmission in order to confirm that the transmission is not a recorded transmission.
The use of moveable barrier operators is common in gated communities which may include several, dozens, or even hundreds of condominiums, houses, town homes, apartments, etc. Such gated communities typically include one or more main entrance gates to which each community member's remote transmitter provides access. Once inside the community, some or all of the individual homes may include their own garage door(s) and/or gate(s) to which the community member's remote transmitter will also provides access. An administrator of the community's home owner association (HOA) is typically responsible for coordinating the programming and distribution of the remote transmitters to the community members.
Unfortunately, the administration of such systems can present numerous challenges and problems. It is of course fundamentally important that the security provided by such systems be respected and maintained. On the other hand, denying access to an otherwise authorized party can lead to frustrations and difficulties as well. It can be difficult enough to accommodate such divergent needs and requirements when the system administrator has a well populated support staff; these problems can become worse, however, when cost restraints or the like lead to an increased need to rely upon automated administration systems or the like.
One embodiment provides a method for use in relation to a security system, comprising: receiving one or more items of information that each identify things or users associated with the security system; forming a fixed portion of a security code using the one or more items of information; and storing the fixed portion of the security code in an apparatus that is configured to transmit the security code.
Another embodiment provides an apparatus for use in relation to a security system, comprising: a memory having a fixed portion of a security code stored therein, wherein the fixed portion of the security code is formed from one or more items of information that each identify things or users associated with the security system; and a transmitter operably coupled to the first memory and configured to transmit at least a part of the fixed portion of the security code.
Another embodiment provides a method for use in relation to a security system, comprising: receiving a transmitted code having a fixed portion, wherein the fixed portion of the transmitted code is formed from one or more items of information that each identify things or users associated with the security system; identifying a stored code having a fixed portion that matches the fixed portion of the transmitted code; and generating an authorization signal in response to the identification of a stored code having a fixed portion that matches the fixed portion of the transmitted code.
Another embodiment provides an apparatus for use in relation to a security system, comprising: a memory having one or more codes stored therein; a receiver configured to receive a transmitted code having a fixed portion, wherein the fixed portion of the transmitted code is formed from one or more items of information that each identify things or users associated with the security system; and a controller operably coupled to the memory and to the receiver and configured to identify a stored code having a fixed portion that matches the fixed portion of the transmitted code, and generate an authorization signal in response to the identification of a stored code having a fixed portion that matches the fixed portion of the transmitted code.
A better understanding of the features and advantages of various embodiments of the present invention will be obtained by reference to the following detailed description and accompanying drawings which set forth an illustrative embodiment in which principles of embodiments of the invention are utilized.
One embodiment provides a method for use in relation to a security system, comprising: generating a fixed portion of a security code; setting a value of the fixed portion of the security code to a value that has a relationship to a fixed portion of a previously learned security code, wherein the relationship indicates that the fixed portion of the security code is a replacement for the fixed portion of the previously learned security code; and storing the fixed portion of the security code in an apparatus that is configured to transmit the security code.
Another embodiment provides an apparatus for use in relation to a security system, comprising: a memory having a fixed portion of a security code stored therein, wherein the fixed portion of the security code has a value that has a relationship to a fixed portion of a previously learned security code, and wherein the relationship indicates that the fixed portion of the security code is a replacement for the fixed portion of the previously learned security code; and a transmitter operably coupled to the memory and configured to transmit at least a part of the fixed portion of the security code.
Another embodiment provides a method for use in relation to a security system, comprising: storing one or more codes; receiving a transmitted code having a fixed portion with the fixed portion including a first part and a second part; identifying a stored code having a fixed portion with a first part thereof that matches the first part of the fixed portion of the transmitted code; determining whether the fixed portion of the transmitted code is a replacement for the fixed portion of the stored code by comparing the second part of the fixed portion of the transmitted code with a second part of the fixed portion of the stored code; and storing a representation of the fixed portion of the transmitted code in response to the determination that the fixed portion of the transmitted code is a replacement for the fixed portion of the stored code.
Another embodiment provides an apparatus for use in relation to a security system, comprising: a memory having one or more codes stored therein; a receiver configured to receive a transmitted code having a fixed portion with the fixed portion including a first part and a second part; and a controller operably coupled to the memory and to the receiver and configured to identify a stored code having a fixed portion with a first part thereof that matches the first part of the fixed portion of the transmitted code, determine whether the fixed portion of the transmitted code is a replacement for the fixed portion of the stored code by comparing the second part of the fixed portion of the transmitted code with a second part of the fixed portion of the stored code, and store a representation of the fixed portion of the transmitted code in response to the determination that the fixed portion of the transmitted code is a replacement for the fixed portion of the stored code.
A better understanding of the features and advantages of various embodiments of the present invention will be obtained by reference to the following detailed description and accompanying drawings which set forth an illustrative embodiment in which principles of embodiments of the invention are utilized.
The above and other aspects, features and advantages of embodiments of the present invention will be more apparent from the following more particular description thereof, presented in conjunction with the following drawings wherein:
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions and/or relative positioning of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments of the present invention. Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of these various embodiments of the present invention. It will further be appreciated that certain actions and/or steps may be described or depicted in a particular order of occurrence while those skilled in the art will understand that such specificity with respect to sequence is not actually required. It will also be understood that the terms and expressions used herein have the ordinary meaning as is accorded to such terms and expressions with respect to their corresponding respective areas of inquiry and study except where specific meanings have otherwise been set forth herein.
As mentioned above, in a gated community the administrator of the home owner association (HOA) is typically responsible for coordinating the programming and distribution of the remote transmitters to the community members (e.g. homeowners, tenants, residents, etc.). Unfortunately, this can be an overwhelming and complex task in a community having hundreds of homes with new members moving in, members moving out, and remote transmitters constantly getting lost or stolen.
One method presently used by some associations is to have every transmitter which enters the gate have the same value for the fixed portion of the security (or access) code. One disadvantage of this approach, however, is that when a transmitter is lost or stolen all the transmitters for the association have to be re-coded. This is a major problem for the administrator of the association since he or she must contact every member and change each member's fixed value to a new value. When the association is hundreds of people the logistics are very difficult and the usual method is to leave the gate open until all the transmitters are changed, which defeats the gate's purpose.
Another method presently used by some associations is to have a block of transmitters having sequential values for the fixed portion of the security code, with each sequential value allowing access to the gate. The administrator of the transmitters keeps a log showing each member and the corresponding value for that member's transmitter. This way, if a transmitter is lost or stolen, the administrator can block (disable) the lost transmitter and give the person who owned the lost transmitter the next one in the administrator's pile of transmitters as a replacement. Disadvantages of this approach, however, include that the administrator has the burden of keeping the log of all the transmitters used, and when a transmitter is lost or stolen, the administrator must look it up in the log and then physically go to the receiver and block it. Gaining access to the receiver can be a problem when the barrier is a garage door. Either the administrator has to have access to everyone's garage, which is a security problem, or the administrator has to wait for the home owner to return home to gain access to do the recoding.
Additional disadvantages of this approach include that when all of the known transmitters are depleted the administrator must procure another block of codes. Furthermore, this system also reduces the security since the units are sequentially coded, which means an intelligent thief can discover a number of transmitter values that will allow access. Also reducing the security is the fact that any transmitter in the block of codes will activate the gate.
Some of the embodiments of the present invention provide a method of controlling automatic learning of a replacement remote transmitter, which provides a simple way for the administrator to replace a remote transmitter that is lost or stolen. For example, in some embodiments the administrator programs a replacement transmitter and then simply gives it to the member. The programming may be performed in a convenient location for the administrator, such as in the HOA office, or elsewhere. When the member uses the replacement transmitter for the first time a new or revised security code is automatically “learned” by the receiver and the old security code in the receiver is automatically erased. Because these actions occur automatically, the administrator is spared the burden of having to physically go the receiver to erase the old security code and place the unit in learn mode to learn a new security code. This ultimately may provide a better system for the association administrator and overcome one or more disadvantages of current systems.
Referring to
The remote transmitter 30 includes one or more push buttons 32 which signal to a controller 34 that a security code is to be transmitted. The controller 34 assembles the security code by retrieving a fixed code portion from a transmitter memory 36 and adding a rolling code portion. The controller 34 then controls a transmitter 38 to send the security code. Radio frequency signals that carry the security code are launched into the airwaves via an antenna 40.
Referring to
In some embodiments, the relationship between the value of the fixed portion 52 of the transmitted security code 50 and the value of the fixed portion of the previously learned security code is such that it signifies to the barrier movement operator that the values for all previously learned security codes should be erased before learning the new value. This feature may be used by the administrator for the scenario where an entire family that utilized several remote transmitters (and thus several different security codes) moves out of the community and a new member moves into the same house. By simply giving the new remote transmitter to the new member, all of the previous family's security codes are automatically erased and the new value is learned the first time the new member uses the transmitter.
The fixed portion 52 of the transmitted security code 50 may be generated by a programmer 42 (
During its operation, the programmer 42 may prompt the administrator or other user to enter certain information. In some embodiments of the present invention, the user is prompted to enter information regarding whether or not the value of the fixed portion of one or more previously learned security codes in the barrier movement operator should be erased. For example, in some embodiments the user is prompted to designate whether the remote transmitter being programmed is a replacement without erase, a replacement with erase, or a replacement with full erase. A replacement without erase means that no codes in the receiver will be erased. A replacement with erase means that only the fixed portion of the one corresponding security code will be erased. And a replacement with full erase means that the fixed portions of all previously learned security codes in the receiver will be erased as described above. In response to the user's designation, the programmer 42 will generate the fixed portion of the security code with an appropriate value that will signify the user's requested erase instructions to the receiver.
An example of a process flow that may be used by the programmer 42 in some embodiments is illustrated in
In some embodiments, the above-described relationship between the fixed portion 52 (
The second part 58 of the fixed portion 52 of the security code 50 is used to hold a transmitter version value. The transmitter version value in the second part 58 is used to indicate whether the fixed portion 52 should be stored in the barrier movement operator as a replacement for a previously learned code. Namely, when the first part 56 matches the corresponding first part of a code stored in the barrier movement operator, the transmitter version value in the second part 58 is examined to determine whether it indicates that the fixed portion 52 is a new version of the previously learned code. If so, then the stored part of the previously learned code is replaced with the fixed portion 52.
Thus, a version value in the fixed code portion is changed in order to automatically update the barrier movement operator on the first receipt of the code. That is, upon the first receipt of a previously learned fixed code portion having a new version value, the barrier movement operator automatically updates the previously learned fixed code portion to the received fixed code portion.
In some embodiments, the transmitter version value in the second part 58 is automatically generated by the programmer 42 (
When the transmitter is requested as a replacement with full erase, the value of the first part 56 of the fixed portion 52 of the security code 50 is also made equal to the first part of the previously learned code that is to be replaced. Then, the transmitter version value in the second part 58 is changed to indicate a full erase. By way of example, another one or more bits in the second part 58 may be used to indicate a replacement with full erase. The setting of such bit(s) will indicate to the barrier movement operator to erase all codes except the newly stored value from the fixed portion 52 of the security code 50.
When the transmitter is requested as a replacement without erase, the value of the first part 56 of the fixed portion 52 of the security code 50 is made equal to the corresponding first part of the previously learned code that is to be replaced. In this case, however, the transmitter version value in the second part 58 is not changed or incremented. Instead, it is made equal the corresponding second part of the previously learned code that is to be replaced. This means that the value of the fixed portion of the code in the new transmitter will be exactly the same as the value of the code in the transmitter being replaced. The unchanged transmitter version value will indicate to the barrier movement operator that the previously stored code should not be erased. There is no reason to erase it when the fixed portion of the new code in the new transmitter is exactly the same. This option may be acceptable for the scenario where the transmitter being replaced has been destroyed or it is otherwise certain that it cannot be used by a thief, intruder, or other unauthorized person.
Once the fixed portion 52 of the security code 50 is generated, the rolling portion 54 is added or combined with the fixed portion 52 and the security code 50 is transmitted by the remote transmitter 30 (
After the security code 50 is transmitted by the remote transmitter 30, it is received by a barrier movement operator. Referring to
The controller 96 receives the digits and digit portions from the receiver 92 and analyzes them to determine from the received format whether a security code portion is in fact being received. The controller 96 then continues to accumulate the digits of a received security code. A received security code is then compared with one or more approved security codes which are stored in a memory 98 to determine whether approval should be given to the received security code. If such approval is given a motor 100 is energized to move a barrier 102 in a manner determined by the controller 96. In some embodiments, other actions such as unlocking a barrier may also be initiated by the controller 96.
In accordance with an embodiment of the present invention, the controller 96 also analyzes the received security code to determine whether or not the value of the fixed portion thereof is a replacement for the fixed portion of one of the security codes stored in the memory 98. This analysis is accomplished by determining whether the value of the fixed portion of the received security code has the above-described relationship to the fixed portion of one of the security codes stored in the memory 98. As described above, such a relationship may signify to the barrier movement operator 90 that the value of the fixed portion of the transmitted security code should be overwritten into the location of the fixed portion of the previously learned security code. This automatic “learning” of the new value and automatic removing of the old value may be used for accomplishing the task of replacing a lost remote transmitter.
An example of a process flow that may be used by the barrier movement operator 90 in some embodiments is illustrated in
In step 118, it is determined whether the fixed portion of the transmitted code is a replacement for the fixed portion of the identified stored code. This determination may be made by comparing the second part of the fixed portion of the transmitted code with a second part of the fixed portion of the identified stored code. Stated differently, the version values of the two fixed code portions are compared. If it is found that the transmitted code includes a changed version value such that it is a replacement code, then the comparison may further involve deciphering any included erase instructions for the previously learned security codes. Then in step 120, a representation of the fixed portion of the transmitted code is stored, or “learned,” in response to the determination that the fixed portion of the transmitted code is a replacement code. And finally, in step 122 the fixed portion of the identified stored code, or previously “learned” code, is removed from storage if any included erase instructions indicated that the replacement was with erase or with full erase. The removing of the code from storage may be accomplished by erasing it or overwriting it with the replacement code. If any included erase instructions indicated that the replacement was with full erase, then all of the previously learned codes would be erased (with the exception of the newly learned code).
Thus, upon the first receipt of a previously learned (or stored) fixed code portion having a new version value, the barrier movement operator automatically updates the previously learned fixed code portion to the received fixed code portion.
An example application of the method shown in the flow chart 110 is illustrated in
The first part 56 of the fixed portion 52 is compared to the corresponding first parts 132 of the stored (or previously learned) security codes 130 that are stored in the memory 98. This comparison is performed in order to identify a stored code having a first part 132 that matches the first part 56 of the fixed portion 52 of the transmitted security code 50. In this example it will be assumed that the stored code 134 is identified as having a matching first part.
Then, the second part 58 of the fixed portion 52 of the transmitted security code 50 is compared to the second part 136 of the identified stored code 134 to determine whether the fixed portion 52 is a replacement for the identified stored code 134. If so, the second part 58 is also examined to determine whether the replacement is without erase, with erase, or with full erase.
If it is determined that the fixed portion 52 of the transmitted security code 50 is a replacement with erase for the fixed portion of the identified stored code 134, then at least a representation of the fixed portion 52 is stored in the memory 98. Furthermore, the fixed portion of the previously learned stored code 134 is removed from storage either by being erased or by being overwritten by the representation of the fixed portion 52 of the transmitted security code 50. If it is determined that the fixed portion 52 of the transmitted security code 50 is a replacement with full erase, then the fixed portions of all of the other previously learned stored codes 130 are also removed from storage by being erased (with the exception of the newly stored fixed portion 52).
If it is determined that the fixed portion 52 of the transmitted security code 50 is a replacement without erase for the identified stored code 134, then no codes are stored or removed. This is because the value of the fixed portion 52 of the code in the replacement remote transmitter is the same as the value of the fixed portion of the identified stored code 134 being replaced.
Thus, the above-described techniques provide a method of programming a replacement remote transmitter so that when it is used the new or revised security code is automatically learned by the barrier movement operator and specific locations in the memory are automatically erased. For example, as described when a barrier movement operator receives a code with an incremented version value for one of its previously learned codes, the barrier movement operator knows to erase the old code or simply to overwrite the value. This eliminates the need for the administrator to physically go to the barrier movement operator to reprogram it.
Some embodiments of the present invention provide an optional technique for coding identification (ID) information into the transmission. In general, the technique involves generating a value for the fixed portion of a security code that includes ID information. The technique may be used to generate a value for the fixed portion of a security code that either includes, or does not include, the above-described relationship to a previously learned code.
In some embodiments, the programmer 42 (
For example, when the administrator needs to program a new remote transmitter, such as for a new family moving into the community, the administrator enters characterization or other identifying information into the programmer. By way of example, the information may include a house ID, street ID, vehicle ID, user ID, garage door ID, user's initials, user's birthday etc., associated with the security system. Each ID may be a simple number. As one example, the following IDs may be used: street ID (1=Main St., 2=Maple St., 3=Grape St., 4=State St. . . . ); user ID (1=dad, 2=mom, 3=daughter, 4=son . . . ); vehicle ID (1=sedan, 2=SUV . . . ). Additional examples include that the items of information may relate to one or more of a structure, building, location, community, address, street, vehicle, user, and/or door associated with the security system. Thus, the items of information that are received by the programmer may include any items of information that identify any things or users associated with the security system.
As mentioned above, the present technique may be used to generate a value for the fixed portion of a security code that either includes, or does not include, the above-described relationship to a previously learned code. If such a relationship is to be included, then optional steps 154 and 156 may be executed by the programmer. Specifically, in optional step 154, the programmer receives erase instructions from the administrator. As described above, the erase instructions may indicate whether the transmitter is a replacement without erase, a replacement with erase, or a replacement with full erase. Then, in optional step 156, the programmer automatically generates the transmitter version value based on the received erase instructions. As described above, the transmitter version value may be used for determining whether the fixed portion of the security code is a replacement for a fixed portion of a code stored in a barrier movement operator.
In step 158, a fixed portion of a security code is formed using the received one or more items of information and the transmitter version value (if any). The fixed portion of the code may be formed by combing the received items of information and the transmitter version value (if any). By combining all the information to form the fixed portion of the security code, the identification information is coded into the transmission. The combining may be done in any way. For example, in some embodiments the items are combined at the programmer by an encryption method. That is, the items are encrypted into a fixed code value. Each programmer device may have a unique type of encryption to further enhance security. This may be implemented by having each programmer device use a unique encryption key. With such an implementation, the programmer devices may be common devices with only the encryption keys being different. Thus, different gated communities can use the same programmer devices but with different encryption keys.
Finally, in step 160, the fixed portion of the security code is stored in an apparatus that is configured to transmit a security code, such as a remote transmitter device.
An example application of the method shown in the flow chart 150 is illustrated in
In addition, a transmitter version value 182 is also included. In this example, the transmitter version value 182 has been incremented by the programmer from “1” to “2”. This indicates that the remote transmitter is a replacement with erase. Again, the transmitter version value may comprise any type of number or indication, such as for example 1, 2, 3, 4, 5, 6, 7, 8 . . . . As mentioned above, the inclusion of a transmitter version value is optional.
The fixed portion 172 is formed by combining all of the information. That is, the house number 174, street ID 176, user ID 178, garage door ID 180, as well as the transmitter version value 182, are combined together. The items of information may be combined in an orderly manner as shown, or they may be combined in some other manner. For example, combining the items in a unique manner known only to a few may enhance security. It is believed that security will be further enhanced if the data making up the items of information is scrambled or encrypted, as mentioned above. That is, all of the items of information, as well as the transmitter version value, may be combined at the programmer by an encryption method to encode all of the information into the transmission. Where the encoding of the characteristic information is encrypted, the information is believed to be more secure. Of course, once the information is encrypted, it will not appear as orderly as it does in
In some embodiments, a rolling code portion 184 is eventually added or combined with the fixed code portion 172 to implement a rolling code transmission. The rolling code portion 184 may be added or combined with the fixed code portion 172 in accordance with the teachings of the aforementioned U.S. Pat. No. 6,154,544, incorporated herein by reference. The rolling portion 184 may be generated by the remote transmitter, or the rolling portion 184 may be generated by the programmer device and then stored in the remote transmitter. In addition, the rolling code portion 184 may be encrypted along with the fixed code portion 172, or it may be encrypted separately, or it may not be encrypted.
Generating a fixed code portion using the above-described type of ID information results in a predictable fixed code, which makes the codes easier for an HOA administrator to manage. For example, programming a remote transmitter so that the above-described type of ID information is included in the fixed portion of the security code means that the transmitter can be related to the user, dwelling, etc. This makes loss and replacement identification easier because the transmitter's security code value is known to the association's administrator without having to look it up. Namely, if a remote transmitter is found, the security code that is stored in the transmitter can be read to obtain the ID information. The characteristics of the ID information may be used to identify the person to which the transmitter should be returned. In some embodiments, the programmer device may be configured to read and decipher the ID information from the remote transmitter.
While the invention herein disclosed has been described by means of specific embodiments and applications thereof, numerous modifications and variations could be made thereto by those skilled in the art without departing from the scope of the invention set forth in the claims.
Number | Name | Date | Kind |
---|---|---|---|
4558175 | Genest et al. | Dec 1985 | A |
4992785 | Lewiner et al. | Feb 1991 | A |
5422632 | Bucholtz et al. | Jun 1995 | A |
5422634 | Okubo | Jun 1995 | A |
5477041 | Miron et al. | Dec 1995 | A |
5933090 | Christenson | Aug 1999 | A |
6154544 | Farris et al. | Nov 2000 | A |
Number | Date | Country |
---|---|---|
WO 2005086832 | Sep 2005 | WO |
Number | Date | Country | |
---|---|---|---|
20090113541 A1 | Apr 2009 | US |