This invention relates generally to message transmission and reception techniques and more particularly to the relatively secure conveyance of message contents.
Various means of conveying messages are known in the art. In many cases an interest exists in preserving or otherwise maintaining at least some degree of security with respect to conveyance of the message. For example, in some cases it may be desired to prevent an eavesdropping party from gleaning the substantive content of the message. In other cases, as when the message comprises, at least in part, an instruction, command, or similar content it may be desirable to prevent an unauthorized party from effectively transmitting an unauthorized message in order to prevent instigation of unauthorized action by the receiving entity.
For example, movable barrier operators (such as but not limited to garage door openers) often respond to receipt of a wireless remote control signal. In particular, the movable barrier operator will often move a corresponding movable barrier between closed and opened positions in response to such remote control signals. In such a case it often behooves the system operator to seek to ensure that the movable barrier operator will not respond to a remote control signal when transmitted from an unauthorized transmission source.
In some cases the movable barrier operator expects to see a unique identifier or other code in conjunction with, or in lieu of, a specific remote control command. This approach provides at least some degree of security though a more sophisticated unauthorized party may be able to themselves receive such a transmission and co-opt the identifier/code for their own future unauthorized use. With this in mind, so-called rolling codes are often employed to frustrate this approach to breaching the security of such a system. With rolling codes, the code itself changes on a frequent basis pursuant to a plan (such as an implementing algorithm) known to both the transmitter and the receiver. Without knowledge of the underlying scheme by which a next code is selected, an unauthorized party who gains access to a presently used code or identifier will still remain unable to leverage that knowledge in support of effecting unauthorized control over the receiver.
There may be instances, however, when additional security may be desired or appropriate. For example, a given rolling code instantiation may be open to brute force attacks or other weaknesses due to local and/or otherwise unique circumstances.
The above needs are at least partially met through provision of the method and apparatus to facilitate message transmission and reception using multiple forms of message alteration described in the following detailed description, particularly when studied in conjunction with the drawings, wherein:
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions and/or relative positioning of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments of the present invention. Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of these various embodiments of the present invention. It will further be appreciated that certain actions and/or steps may be described or depicted in a particular order of occurrence while those skilled in the art will understand that such specificity with respect to sequence is not actually required. It will also be understood that the terms and expressions used herein have the ordinary meaning as is accorded to such terms and expressions with respect to their corresponding respective areas of inquiry and study except where specific meanings have otherwise been set forth herein.
Generally speaking, pursuant to these various embodiments, one provides message content comprising at least a first message content part and a second message content part. One then selects (at least) a first and second form of message alteration herein each form of message alteration has corresponding recovery content that can be used to facilitate recovering message content that has been altered using the respective form of message alteration. The first message content part, in combination with recovery content as corresponds to the second form of message alteration, are then converted into a first altered form using the first form of message alteration. In addition, one also preferably converts the second message content part into a second altered form using the second form of message alteration. The first and second altered forms, in addition to recovery content as corresponds to the first form of message alteration, are then transmitted as a joint message.
The joint message can assume any of a wide variety of forms. For example, depending upon needs and/or requirements, the joint message can comprise a single contiguous message or can comprise a plurality of discrete transmissions. The recovery identifier and the message content can be discrete with respect to one another or can, if desired, be at least partially integrated with one another.
These teachings are usable with a wide variety of different forms of message alteration and hence can provide benefits with a large number of platforms having transmission/reception and/or signal processing agility of various kinds. It will also be seen that these teachings can be employed in conjunction with more traditional identifier/code based techniques including specifically rolling code-based techniques. So configured, security can be increased and often dramatically so. In particular, an unauthorized party will face increased difficulty with respect to viably monitoring the communications of such a system. An unauthorized party will also likely face increased difficulty with respect to accommodating and matching the transmission/reception and/or signal processing agility of the resultant system.
These and other benefits may become clearer upon making a thorough review and study of the following detailed description. Referring now to the drawings, and in particular to
Referring now momentarily to
Referring again to
In a preferred approach each of these forms of message alteration has a corresponding (or at least partially corresponding) substantially unique recovery identifier (where, for example, a given recovery identifier correlates to and therefore essentially serves to identify a specific one of the forms of message alteration as was provided above). Accordingly, it will be understood that these recovery identifiers can comprise, but are not limited to:
The recovery identifier can comprise, for example, a simple code where a specific value, such as a binary value, corresponds to a particular form of message alteration. As a simplified example, when only two forms of message alteration are provided, a one-bit value will serve to identify and differentiate between these forms of message alteration. To illustrate, a value of “0” can correlate to a first form of message alteration while a value of “1” can correlate to the second form of message alteration. It would be possible, for example, for each recovery identifier to essentially point to a specific entry in a lookup table, where the specific entry itself defines the corresponding form of message alteration.
If desired, the recovery identifier can share functionality and meaning in support of other content or capability. As an illustration, all or part of a rolling code can also serve as a recovery identifier. For example, and to continue the simple example presented above, the least significant bit of a rolling code can also serve to identify each of two provided forms of message alteration.
Pursuant to this process 100, one then selects 103 a first and second form of message alteration. This selection step 103 can be carried out in any of a wide variety of ways with a specific approach likely being dictated by the needs and/or limitations inherent to a given application context. As one example, the particular forms of message alteration can be selected essentially at random. As another example the particular forms of message alteration can be selected pursuant to a pre-determined selection pattern. The selection itself can be the result of a specific selection process or can be a part of another process (as when the particular forms of message alteration selected are dependent upon the least significant bit (or bits) of a rolling code as is derived via its own derivation process).
As noted above, these first and second forms of message alteration will each have a corresponding recovery identifier associated therewith. Accordingly (and referring momentarily to
Returning again to
Referring now momentarily to
Returning again to
Referring again to
If desired, the joint message can comprise transmission of a contiguous aggregation of the first recovery content, the first altered form, and the second altered form (i.e., a transmission of an aggregation of these elements such as that which is illustrative depicted in
Referring now to
This process 900 then provides for use 903 of the recovered second recovery content to effect recovery of the second message content part. Again, this may be done by using the second recovery content to identify which form of message alteration had been used to alter the second message content part into the second altered form as comprises a part of the received joint message and then using that information to effect an appropriate return of that altered content back into its original form (i.e., the second message content part).
In an optional though preferred approach, this process 900 can then provide for use 904 of the recovered first message content part and the second message content part to reconstruct the original message. For example, when the first and second message content parts were formed by a simple severing of the original message, the original message can be restored by simply rejoining the first and second message content parts in the correct order. Subsequent processing will then depend, of course, upon the nature and substance of the original message. For example, when the original message comprises remote control signaling, that recovered remote control signaling can then be processed as desired to identify, verify, and/or act upon the instruction represented thereby.
So configured, a considerable increase in security occurs. In particular, it becomes increasingly difficult for an unauthorized party to spoof the receiver as mere data alone is insufficient to cause proper reception of the message content. Instead, considerable agility and flexibility with respect to types of transmission/reception and/or signal processing must also be supported.
Those skilled in the art will appreciate that the above-described processes are readily enabled using any of a wide variety of available and/or readily configured platforms, including partially or wholly programmable platforms as are known in the art or dedicated purpose platforms as may be desired for some applications. Referring now to
This transmission platform 1000 comprises a memory 1001 that contains the above described message content (comprising, in particular, message content having at least a first and a second message content part). This transmission platform 1000 further preferably comprises a plurality of selectable forms of message alteration 1002 (such as those described above and as represented here by a first through an Nth form of message alteration where “N” comprises an integer greater than “1”). As described above, at least some of these selectable forms of message alteration have corresponding recovery content associated therewith, which recovery content can be used to facilitate recovering message content that has been altered as per a selected one of the selectable forms of message alteration. This transmission platform 1000 also preferably comprises a message alteration form selector 1003 which serves to automatically select at least a first and a second form of message alteration that are different from one another as per the teachings set forth above.
Each of these components then operably couples to a first and a second converter 1004 and 1006. These converters are responsive to these components and are more particularly configured and arranged to convert incoming message content portions (and recovery content where provided) into corresponding altered forms using selected forms of message alteration. For example, and as per the teachings set forth herein, the first converter 1004 can serve to use a first form of message alteration as is selected by the message alteration form selector 1003 to alter a first message content portion as is provided by the memory 1001 and a first recovery content as corresponds to a second form of message alteration as is also selected by the message alteration form selector 1003 into a first altered form. The second converter 1005 can serve to use the second form of message alteration to alter a second message content portion as is provided by the memory 1001 into a second altered form.
These altered form outputs of the first and second converter 1004 and 1005 are then provided to a transmitter 1006 which effects their transmission, along with the first recovery content, as a joint message as described above. In a preferred approach a single dynamically configurable transmitter serves this purpose. If desired, however, the transmitter 1006 can comprise a plurality of discrete transmitters that differ from one another as necessary to support the intended functionality of the resultant platform. In a preferred embodiment this transmitter 1006 comprises a wireless transmitter though other configurations are possible.
The above-described elements can comprise discrete components if desired. It is also possible, however, to view the transmission platform 1000 presented in
Referring now to
This joint message receiver 1101 operably couples to a recovery content extractor 1102 that serves to recover the first recovery content as comprises a part of the joint message and to provide that information via a first recovery content output. The latter couples to a first signal processor 1103 that also receives at least relevant portions of the joint message from the joint message receiver 1101 and that serves to use the first recovery content as is provided by the recovery content extractor 1102 to recover from the joint message the first message content part and the second recovery content as were both converted into a first altered form using the first form of message alteration as was described above.
A second signal processor 1104 receives the second recovery content from the first signal processor 1103 and also at least relevant portions of the joint message from the joint message receiver 1101. This second signal processor 1104 then uses the second recovery content to recover from the joint message the second message content as had previously been converted into the second altered form using the second form of message alteration as was also described above. So configured, the receiving platform 1100 is able to successfully recover both the first and second message content parts. If desired, and referring now to
So configured, a transmitter and a corresponding receiver can each readily support the teachings set forth herein. In particular, a plurality of differing forms of message alteration are selectively usable to effectively encode (in a manner of speaking) message content to be conveyed between the transmitter and the receiver (which message content may comprise, for example, an instruction to be carried out via the receiver). The receiver determines the particular types of information recovery technique to employ when receiving the transmission of the message content based, at least in part, upon the first recovery content and also the second recovery content (wherein the first recovery content is employed to facilitate recovery of the second recovery content).
Those skilled in the art will recognize that a wide variety of modifications, alterations, and combinations can be made with respect to the above described embodiments without departing from the spirit and scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the ambit of the inventive concept. For example, for the sake of clarity, only a first and second message part has, for the most part been referred to in the detailed description. This, in turn, prompted discussion of only a first and second form of message alteration to be used therewith. These teachings are readily scalable, however, to accommodate a greater number of message concept parts and corresponding forms of message alteration as will be evident to those skilled in the art.