Referring to
Referring to
The non-encrypted portion 34 of the transmission 18 is utilized by the vehicle controller 14 to replicate the encrypted portion 32 of the transmission 18. The replicated encrypted transmission 38 is then compared to the received encrypted transmission 32 to verify that the transmission is from an authorized transmitter 16 and that the received commands should be implemented.
Referring to
The transmitter 16 also includes an identification code 24 that is unique to the specific transmitter 16. A rolling count 26 is stored within the transmitter 16 and is incremented with each press of a button of the transmitter 16. The rolling count 26 provides a variable value that generates a continuously changing value that inhibits unauthorized regeneration of transmissions from the transmitter 16. A button code 28 communicates a desired command to the vehicle controller. The button code 28 is the transmission that the vehicle receives and provides instructions for operation of the vehicle.
In the example transmitter 16, the transmission 18 includes an encrypted portion 32 and a non-encrypted portion 34. The transmitter 16 includes an encryption algorithm 30 that receives inputs from the secret key 20, the transmitter identification code 24, the rolling count 26 and the button code 28. The encryption algorithm 30 processes the input data to generate the encrypted portion 32. The encrypted portion 32 utilizes but does not transmit the secret key 20. The secret key 20 is not transmitted at any time and is utilized only for the encryption process.
The data input and utilized for the encryption process, except for the secret key 20, is also transmitted in non-encrypted form. The non-encrypted portion 34 includes the Id code 24, the entire rolling count 26 and the button code 28. The encrypted portion 32 and the non-encrypted portion 34 are both sent to and received by the vehicle controller 14.
The vehicle controller 14 includes the same encryption algorithm 30 as is present within the transmitter 16. The encryption algorithm 30 within the vehicle controller 14 utilizes the received non-encrypted portion 34 of the transmission 18 to replicate the encrypted portion of the transmission 32. Because the vehicle controller 14 also includes the secret data key 20, the non-encrypted portion 34 of the transmission combined with the secret data key 20 processed by the same encryption algorithm 30 will produce the same encryption as is received. Accordingly, the vehicle controller 14 generates another encrypted transmission and compares the generated encryption 38 with the received encryption 32. If the comparison meets the desired criteria than the transmission is authenticated and the commands communicated by the button code are implemented as is schematically indicated at 42. However, if the comparison indicated at 40 does not result in a desired match, then the transmission is not authenticated and the vehicle operation is not performed.
This method transmits all the data, but for the secret key, required to replicate the encryption performed at the transmitter 16. The encryption is duplicated with the stored secret key 20 and compared to the received encryption. This process does not require multiple storage of identification codes. All that is required is that each device and vehicle stores a common secret key code that is utilized along with the common encryption algorithm to confirm that an approved and authorized transmission is received. As appreciated, the number of data bits and types of data bits can be modified to meet desired application specific operation.
The rolling count 26 is transmitted in the identical form that is utilized to generate the encrypted portion 32 of the transmission. This removes the need for storage of any portion of the rolling count in any of the vehicle controllers. This further prevents the ranging out of any one of the transmitters 16 as it applies to any one of the vehicles.
This transmission system and method of encrypting and decrypting transmissions facilitates the use of many different transmitters with many different vehicles. As each vehicle includes the secret key, it will accept any transmitter that also includes the same secret key 20. Therefore, even if one transmitter 16 has not ever operated one of the many vehicles, but has operated other vehicles many times, the rolling count value, although high, will not prevent operation of any one of the multiple vehicles.
Although a preferred embodiment of this invention has been disclosed, a worker of ordinary skill in this art would recognize that certain modifications would come within the scope of this invention. For that reason, the following claims should be studied to determine the true scope and content of this invention.
The application claims priority to U.S. Provisional Application No. 60/802,572 which was filed on May 22, 2006.
Number | Date | Country | |
---|---|---|---|
60802572 | May 2006 | US |