This invention relates generally to message transmission and reception techniques and more particularly to the relatively secure conveyance of message contents.
Various means of conveying messages are known in the art. In many cases an interest exists in preserving or otherwise maintaining at least some degree of security with respect to conveyance of the message. For example, in some cases it may be desired to prevent an eavesdropping party from gleaning the substantive content of the message. In other cases, as when the message comprises, at least in part, an instruction, command, or similar content it may be desirable to prevent an unauthorized party from effectively transmitting an unauthorized message in order to prevent instigation of unauthorized action by the receiving entity.
For example, movable barrier operators (such as but not limited to garage door openers) often respond to receipt of a wireless remote control signal. In particular, the movable barrier operator will often move a corresponding movable barrier between closed and opened positions in response to such remote control signals. In such a case it often behooves the system operator to seek to ensure that the movable barrier operator will not respond to a remote control signal when transmitted from an unauthorized transmission source.
In some cases the movable barrier operator expects to see a unique identifier or other code in conjunction with, or in lieu of, a specific remote control command. This approach provides at least some degree of security though a more sophisticated unauthorized party may be able to themselves receive such a transmission and co-opt the identifier/code for their own future unauthorized use. With this in mind, so-called rolling codes are often employed to frustrate this approach to breaching the security of such a system. With rolling codes, the code itself changes on a frequent basis pursuant to a plan (such as an implementing algorithm) known to both the transmitter and the receiver. Without knowledge of the underlying scheme by which a next code is selected, an unauthorized party who gains access to a presently used code or identifier will still remain unable to leverage that knowledge in support of effecting unauthorized control over the receiver.
There may be instances, however, when additional security may be desired or appropriate. For example, a given rolling code instantiation may be open to brute force attacks or other weaknesses due to local and/or otherwise unique circumstances.
The above needs are at least partially met through provision of the method and apparatus to facilitate message transmission and reception using different transmission characteristics described in the following detailed description, particularly when studied in conjunction with the drawings, wherein:
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions and/or relative positioning of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments of the present invention. Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of these various embodiments of the present invention. It will further be appreciated that certain actions and/or steps may be described or depicted in a particular order of occurrence while those skilled in the art will understand that such specificity with respect to sequence is not actually required. It will also be understood that the terms and expressions used herein have the ordinary meaning as is accorded to such terms and expressions with respect to their corresponding respective areas of inquiry and study except where specific meanings have otherwise been set forth herein.
Generally speaking, pursuant to these various embodiments, one provides a plurality of different transmission characteristics as each corresponds, for example, to various selectable types of transmission techniques or means. When message content exists to be transmitted (such as, but not limited to, a remote control signal) a particular one of the transmission characteristics is selected and a corresponding recovery identifier that correlates to the selected transmission characteristic is selected as well. One then transmits a joint message comprising both the message content as is transmitted using the selected transmission characteristic and the recovery identifier as uniquely corresponds to the selected transmission characteristic.
Upon reception of the recovery identifier, and pursuant to a preferred approach, a particular way of receiving the transmission of the message content portion of the joint message is selected as a function thereof and then used to facilitate reception of that message content portion.
The joint message can assume any of a wide variety of forms. For example, depending upon needs and/or requirements, the joint message can comprise a single contiguous message or can comprise a plurality of discrete transmissions. The recovery identifier and the message content can be discrete with respect to one another or can, if desired, be at least partially integrated with one another.
These teachings are usable with a wide variety of different transmission characteristics and hence can provide benefits with a large number of platforms having transmission/reception agility of various kinds. It will also be seen that these teachings can be employed in conjunction with more traditional identifier/code based techniques including specifically rolling code-based techniques. So configured, security can be increased and often dramatically so. In particular, an unauthorized party will face increased difficulty with respect to viably monitoring the communications of such a system. An unauthorized party will also likely face increased difficulty with respect to accommodating and matching the transmission/reception agility of the resultant system.
These and other benefits may become clearer upon making a thorough review and study of the following detailed description. Referring now to the drawings, and in particular to
This process 100 also provides for provision 102 of a plurality of different transmission characteristics. These transmission characteristics pertain to different types of transmission. Relevant examples comprise, but are not limited to:
In a similar fashion this process 100 then further provides 103 for a correlated (or at least partially correlated) plurality of recovery identifiers (where, for example, a given recovery identifier correlates to and therefore essentially serves to identify a specific one of the transmission characteristics as was provided above). Accordingly, it will be understood that these recovery identifiers can comprise, but are not limited to:
The recovery identifier can comprise, for example, a simple code where a specific value, such as a binary value, corresponds to a particular transmission characteristic. As a simplified example, when only two transmission characteristics are provided then a one-bit value will serve to identify these transmission characteristics. To illustrate, a value of “0” can correlate to a first transmission characteristic while a value of “1” can correlate to the second transmission characteristic. It would be possible, for example, for each recovery identifier to essentially point to a specific entry in a lookup table, where the specific entry itself defines the corresponding transmission characteristic.
If desired, the recovery identifier can share functionality and meaning in support of other content or capability. As an illustration, all or part of a rolling code can also serve as a recovery identifier. For example, and to continue the simple example presented above, the least significant bit of a rolling code can also serve to identify each of two provided transmission characteristics.
Pursuant to this process 100, one then selects 104 a particular one of the different transmission characteristics to thereby provide a selected transmission characteristic. This selection step 104 can be carried out in any of a wide variety of ways with a specific approach likely being dictated by the needs and/or limitations inherent to a given application context. As one example, the particular transmission characteristic can be selected essentially at random. As another example the particular transmission characteristic can be selected pursuant to a pre-selected selection pattern. The selection itself can be the result of a specific selection process or can be a part of another process (as when the particular transmission characteristic selected is dependent upon the least significant bit (or bits) of a rolling code as is derived via its own derivation process).
This process 100 then facilitates the transmission 105 of a joint message that comprises at least the recovery identifier as uniquely corresponds to the selected transmission characteristic and the previously provided message content. In a preferred approach, at least the message content portion of the joint message is transmitted using the selected transmission characteristic 106.
There are various useful ways to deploy these teachings. For example, and referring now to
In the illustrative examples provided above, the recovery identifier and the message content are aggregated with one another. It is also possible, however, for the joint message 200 to comprise a plurality of discrete messages as is suggested by the schematic depiction of
The approaches described above can be further parsed and combined in various ways if desired. As but one illustration of many possibilities, and referring now to
Referring now to
In a preferred approach this selection 602 occurs as a function, at least in part, of the recovery content as has already been received. To illustrate, when the recovery content comprises data that correlates to a first transmission characteristic (as was described above) then a way of receiving as corresponds to that first transmission characteristic can be selected. Similarly, when the recovery content comprises data that correlates to a second transmission characteristic then another way of receiving, which corresponds to that second transmission characteristic, can be selected. This process 600 then uses 603 that selected particular way of receiving to facilitate proper reception of that portion of the joint message as comprises at least a portion of the message content.
Upon receiving that portion of the joint message 704 as comprises the recovery identifier “A*” 705, the receiver can employ that information to identify and select the appropriate reception settings that permit compatible reception of that portion of the joint message 704 as comprises, at least in part, at least a part of the message content “X” 706.
So configured, a considerable increase in security occurs. In particular, it becomes increasingly difficult for an unauthorized party to spoof the receiver as mere data alone is insufficient to cause proper reception of the message content. Instead, considerable agility and flexibility with respect to types of transmission must also be supported.
Those skilled in the art will appreciate that the above-described processes are readily enabled using any of a wide variety of available and/or readily configured platforms, including partially or wholly programmable platforms as are known in the art or dedicated purpose platforms as may be desired for some applications. Referring now to
This transmission platform 800 comprises a transmitter 801 that is preferably capable of various selectable types of transmission where, as described above, these various selectable types of transmission differ from one another as a function, at least in part, of corresponding transmission characteristics. In a preferred approach a single dynamically configurable transmitter serves this purpose. If desired, however, the transmitter 801 can comprise a plurality of discrete transmitters that differ from one another in the indicated manner. In a preferred embodiment this transmitter 801 comprises a wireless transmitter.
This transmission platform 800 preferably further comprises a joint message formatter 802 having an input that operably couples to receive message content 803 (as may be stored, for example, in a memory) and another input that operably couples to receive a selected recover content indicator 804 (as may be stored, for example, in another memory). So configured, the joint message formatter 802 serves to format and otherwise provide the joint message described above. If desired, this transmission platform 800 can further comprise a transmission type selector 805 that operably couples to both the recovery content indicators 804 (to facilitate selection of a particular one of the stored indicators) and the transmitter 801 (to facilitate selection of a particular type of transmission to be used when conveying the message content portion of the joint message).
The above-described elements can comprise discrete components if desired. It is also possible, however, to view the transmission platform 800 presented in
Referring now to
This receiver 901 operably couples to a joint message processor 902 which extracts the recovery content and message content as described above from a received joint message. The recovery content, in turn, is provided to a transmission characteristic selector 903 which in turn selects, in this embodiment, a particular transmission characteristic and hence a particular type of reception technique to be employed to facilitate compatible reception of the message content portion of the joint message.
So configured, a transmitter and a corresponding receiver can each readily support the teachings set forth herein. In particular, a plurality of differing types of transmission are selectively usable to effectively encode (in a manner of speaking) message content to be conveyed between the transmitter and the receiver (which message content may comprise, for example, an instruction to be carried out via the receiver). The receiver determines a particular type of reception to employ when receiving the transmission of the message content based, at least in part, upon a recovery indicator that also comprises a part of the overall message.
Those skilled in the art will recognize that a wide variety of modifications, alterations, and combinations can be made with respect to the above described embodiments without departing from the spirit and scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the ambit of the inventive concept.
Number | Name | Date | Kind |
---|---|---|---|
3906348 | Willmott | Sep 1975 | A |
4097859 | Looschen | Jun 1978 | A |
4178549 | Ledenbach et al. | Dec 1979 | A |
4243976 | Warner et al. | Jan 1981 | A |
4255742 | Gable et al. | Mar 1981 | A |
4387455 | Schwartz | Jun 1983 | A |
4387460 | Boutmy et al. | Jun 1983 | A |
4468787 | Keiper, Jr. | Aug 1984 | A |
4566044 | Langdon et al. | Jan 1986 | A |
4677284 | Genest | Jun 1987 | A |
4750118 | Heitschel et al. | Jun 1988 | A |
4808995 | Clark et al. | Feb 1989 | A |
4829296 | Clark et al. | May 1989 | A |
4893338 | Pastor | Jan 1990 | A |
4910750 | Fisher | Mar 1990 | A |
4988992 | Heitschel et al. | Jan 1991 | A |
5021776 | Anderson et al. | Jun 1991 | A |
5136548 | Claar et al. | Aug 1992 | A |
5150464 | Sidhu et al. | Sep 1992 | A |
5197061 | Halbert-Lassalle et al. | Mar 1993 | A |
5252960 | Duhame | Oct 1993 | A |
5420925 | Michaels | May 1995 | A |
5442340 | Dykema | Aug 1995 | A |
5517187 | Bruwer et al. | May 1996 | A |
5565812 | Soenen | Oct 1996 | A |
5576701 | Heitschel et al. | Nov 1996 | A |
5578999 | Matsuzawa et al. | Nov 1996 | A |
5600653 | Chitre et al. | Feb 1997 | A |
5635913 | Willmott et al. | Jun 1997 | A |
5673017 | Dery et al. | Sep 1997 | A |
5686904 | Bruwer | Nov 1997 | A |
5699065 | Murray | Dec 1997 | A |
5774065 | Mabuchi et al. | Jun 1998 | A |
5838747 | Matsumoto | Nov 1998 | A |
5942985 | Chin | Aug 1999 | A |
5949349 | Farris et al. | Sep 1999 | A |
6012144 | Pickett | Jan 2000 | A |
6049289 | Waggamon et al. | Apr 2000 | A |
6052408 | Trompower et al. | Apr 2000 | A |
6070154 | Tavor et al. | May 2000 | A |
6154544 | Farris et al. | Nov 2000 | A |
6157719 | Wasilewski et al. | Dec 2000 | A |
6175312 | Bruwer et al. | Jan 2001 | B1 |
6181255 | Crimmins et al. | Jan 2001 | B1 |
6414587 | Fitzgibbon | Jul 2002 | B1 |
6456726 | Yu et al. | Sep 2002 | B1 |
6496477 | Perkins et al. | Dec 2002 | B1 |
6535544 | Partyka | Mar 2003 | B1 |
6688518 | Valencia et al. | Feb 2004 | B1 |
6690796 | Farris | Feb 2004 | B1 |
6697379 | Jacquet et al. | Feb 2004 | B1 |
6754266 | Bahl et al. | Jun 2004 | B2 |
6810123 | Farris et al. | Oct 2004 | B2 |
6829357 | Alrabady et al. | Dec 2004 | B1 |
6850910 | Yu et al. | Feb 2005 | B1 |
6930983 | Perkins et al. | Aug 2005 | B2 |
6963561 | Lahat | Nov 2005 | B1 |
6980518 | Sun et al. | Dec 2005 | B1 |
6980655 | Farris et al. | Dec 2005 | B2 |
6998977 | Gregori | Feb 2006 | B2 |
7002490 | Lablans | Feb 2006 | B2 |
7039809 | Wankmueller | May 2006 | B1 |
7042363 | Katrak | May 2006 | B2 |
7050479 | Kim | May 2006 | B1 |
7071850 | Fitzgibbon et al. | Jul 2006 | B1 |
7139398 | Candelore et al. | Nov 2006 | B2 |
7301900 | Laksono | Nov 2007 | B1 |
7333615 | Jarboe et al. | Feb 2008 | B1 |
7336787 | Unger et al. | Feb 2008 | B2 |
7346163 | Pedlow et al. | Mar 2008 | B2 |
7353499 | de Jong | Apr 2008 | B2 |
7412056 | Farris et al. | Aug 2008 | B2 |
7415618 | de Jong | Aug 2008 | B2 |
7429898 | Akiyama et al. | Sep 2008 | B2 |
7492905 | Fitzgibbon | Feb 2009 | B2 |
7535926 | Deshpande et al. | May 2009 | B1 |
7561075 | Fitzgibbon et al. | Jul 2009 | B2 |
7623663 | Farris et al. | Nov 2009 | B2 |
7668125 | Kadous | Feb 2010 | B2 |
7757021 | Wenzel | Jul 2010 | B2 |
7786843 | Witkowski | Aug 2010 | B2 |
8194856 | Farris et al. | Jun 2012 | B2 |
8233625 | Farris et al. | Jul 2012 | B2 |
8422667 | Fitzgibbon | Apr 2013 | B2 |
20010023483 | Kiyomoto | Sep 2001 | A1 |
20020034303 | Farris | Mar 2002 | A1 |
20020184504 | Hughes | Dec 2002 | A1 |
20020191785 | McBrearty et al. | Dec 2002 | A1 |
20020191794 | Farris et al. | Dec 2002 | A1 |
20030056001 | Mate et al. | Mar 2003 | A1 |
20030070092 | Hawkes et al. | Apr 2003 | A1 |
20030072445 | Kuhlman et al. | Apr 2003 | A1 |
20030147536 | Andivahis et al. | Aug 2003 | A1 |
20030177237 | Stebbings | Sep 2003 | A1 |
20040019783 | Hawkes et al. | Jan 2004 | A1 |
20040081075 | Tsukakoshi | Apr 2004 | A1 |
20040174856 | Brouet et al. | Sep 2004 | A1 |
20040181569 | Attar et al. | Sep 2004 | A1 |
20050053022 | Zettwoch | Mar 2005 | A1 |
20050058153 | Santhoff et al. | Mar 2005 | A1 |
20060109978 | Farris et al. | May 2006 | A1 |
20060176171 | Fitzgibbon et al. | Aug 2006 | A1 |
20070005806 | Fitzgibbon | Jan 2007 | A1 |
20070006319 | Fitzgibbon et al. | Jan 2007 | A1 |
20070018861 | Fitzgibbon et al. | Jan 2007 | A1 |
20070058811 | Fitzgibbon et al. | Mar 2007 | A1 |
20080229400 | Burke | Sep 2008 | A1 |
20080297370 | Farris et al. | Dec 2008 | A1 |
20090016530 | Farris et al. | Jan 2009 | A1 |
20090021348 | Farris et al. | Jan 2009 | A1 |
20110316668 | Laird et al. | Dec 2011 | A1 |
20110316688 | Ranjan | Dec 2011 | A1 |
20110317835 | Laird | Dec 2011 | A1 |
20130170639 | Fitzgibbon | Jul 2013 | A1 |
Number | Date | Country |
---|---|---|
1223700 | Jul 2002 | EP |
1313260 | Nov 2004 | EP |
1760985 | Mar 2007 | EP |
2737373 | Jan 1997 | FR |
2288261 | Oct 1995 | GB |
2 430 115 | Mar 2007 | GB |
2440816 | Feb 2008 | GB |
09322274 | Dec 1997 | JP |
0010301 | Feb 2000 | WO |
WO 0010302 | Feb 2000 | WO |
Entry |
---|
Search Report Under Section 17; Application No. GB0613068.6: Date of Search: Aug. 23, 2006. |
Search Report Under Section 17, Application No. GB0715089.9; Date of Search: Nov. 27, 2007. |
Search Report Under Section 17, Application No. GB0601795.8; Date of Search: May 22, 2006. |
GB Examination Report; Gareth Griffiths; dated Nov. 26, 2010; 1 page. |
Examination Report Under Section 18(3) Dated Apr. 11, 2011 from British Application No. GB0715089.9. |
Combined Search and Examination Report Under Sections 17 and 18(3) Dated Apr. 11, 2011 from British Application No. GB1104752.9. |
British Application No. GB1110709.1; Combined Search and Examination Report Under Sections 17 and 18(3); Date of Search: Sep. 29, 2011. |
British Application No. GB1110710.9; Combined Search and Examination Report Under Sections 17 and 18(3); Date of Search: Sep. 30, 2011. |
U.S. Appl. No. 11/172,524; Office Action Dated Apr. 9, 2009. |
British Examination Report Under Section 18(3); British Patent Application No. GB0601795.8; Dated: Apr. 22, 2009. |
British Examination Report Under Section 18(3); British Patent Application No. GB0613068.6; Dated Nov. 26, 2010. |
Canadian Patent Application No. 2,551,295; Office Action Dated May 6, 2013. |
Search Report Under Section 17; British Patent Application No. GB0715089.9; Date of Search: May 9, 2008. |
U.S. Office Action Dated Mar. 21, 2011 from U.S. Appl. No. 11/172,525. |
Combined Search and Examination Report Under Sections 17 and 18(3) From British Patent Application No. GB0920612.9; Date of Search: Dec. 16, 2009. |
Combined Search and Examination Report Under Sections 17 and 18(3) From British Patent Application No. GB1000541.1; Date of Search: Jan. 28, 2010. |
Examination Report Under Section 17 From British Patent Application No. GB0601795.8; Date of Search: Jan. 28, 2010. |
Examination Report Under Section 17 From British Patent Application No. GB0601795.8; Date of Search: Sep. 25, 2009. |
Examination Report Under Section 17 From British Patent Application No. GB0613068.6; Date of Search: Jan. 31, 2011. |
Examination Report Under Section 17 From British Patent Application No. GB0715089.9; Date of Search: Sep. 30, 2010. |
Examination Report Under Section 17 From British Patent Application No. GB0920612.9; Date of Search: Jan. 28, 2010. |
Examiner's First Report from Australian Patent Application No. 2006202850; Date of Search: Feb. 25, 2010. |
Office Action Dated Mar. 21, 2011 from U.S. Patent Application No. 11/172,524. |
Search Report Under Section 17 From British Patent Application No. GB0601795.8; Date of Search: Apr. 22, 2009. |
Search Report Under Section 17 From British Patent Application No. GB0613068.6; Date of Search: Oct. 12, 2006. |
Examination Report Under Section 18(3) dated May 6, 2010 from British Patent Application No. GB061068.6. |
Search Report Under Section 17; Application No. GB0715089.9: Date of Search: May 8, 2008. |
Number | Date | Country | |
---|---|---|---|
20070005806 A1 | Jan 2007 | US |