An encrypted rolling code (11), a plurality of differing data bit order patterns (13), and a plurality of differing data inversion patterns 14) are provided. One then selects (15) a particular one of each of these patterns and uses those selected patterns as transmission characteristics when transmitting (16) at least part of the encrypted rolling code.
|
1. A method comprising:
providing an encrypted rolling code;
providing a plurality of differing data bit order patterns;
providing a plurality of differing data inversion patterns;
selecting a particular one of each of the data bit order patterns and the data inversion patterns to provide selected patterns;
transmitting at least a part of the encrypted rolling code using the selected patterns as transmission characteristics,
wherein selecting a particular one of each of the data bit order patterns and the data inversion patterns to provide selected patterns comprises using the rolling code to select the particular data bit order pattern and data inversion pattern to provide the selected patterns.
26. A method for use with a receiver that is configured and arranged to compatibly receive and process a transmitted encrypted rolling code, wherein:
the transmitted encrypted rolling code comprises at least a part thereof that was transmitted using selected patterns of transmission characteristics selected based at least in part on using a rolling code, wherein a first one of the selected patterns comprises a selected particular one of a plurality of differing data bit order patterns and wherein a second one of the selected patterns comprises a selected particular one of a plurality of differing data inversion patterns;
the method comprising:
at a transmitter:
providing a message that will be compatibly received and processed by the receiver as the transmitted encrypted rolling code;
transmitting the message to the receiver.
21. An apparatus comprising:
a first memory having a fixed value stored therein;
a second memory having an encrypted rolling code stored therein;
a first lookup table that correlates a first plurality of different encrypted rolling code values with corresponding differing data bit order patterns;
a second lookup table that correlates a second plurality of different encrypted rolling code values with corresponding differing data inversion patterns;
a processor that is operably coupled to the first and second memory and the first and second lookup table and that is configured and arranged to use the encrypted rolling code to select ones of the particular data bit order patterns and data inversion patterns to provide selected patterns;
a transmitter operably coupled to the first and second memory and to the processor and being configured and arranged to transmit at least a part of the encrypted rolling code and the fixed value using the selected patterns as transmission characteristics.
10. A method to facilitate transmitting a remote control message comprising:
providing a fixed message having at least a first and second part;
providing an encrypted rolling code having at least a first, second, third, and fourth part;
providing a plurality of differing data bit order patterns;
providing a plurality of differing data inversion patterns;
using the first part of the encrypted rolling code to select a particular one of each of the data bit order patterns and the data inversion patterns to provide first selected patterns;
using the second part of the encrypted rolling code to select a particular one of each of the data bit order patterns and the data inversion patterns to provide second selected patterns;
transmitting:
the first part of the fixed message and the third part of the encrypted rolling code using the first selected patterns as transmission characteristics; the second part of the fixed message and the fourth part of the encrypted rolling code using the second selected patterns as transmission characteristics.
3. The method of
4. The method of
5. The method of
providing a plurality of differing data bit order patterns comprises providing at least six different bit order patterns; and
providing a plurality of differing data inversion patterns comprises providing at least eight different data inversion patterns.
6. The method of
7. The method of
8. The method of
using a first predetermined portion of the encrypted rolling code to select a first particular data bit order pattern and a first data inversion pattern to provide first selected patterns; and
using a second predetermined portion of the encrypted rolling code to select a second particular data bit order pattern and a second data inversion pattern to provide second selected patterns;
wherein the first and second predetermined portions of the encrypted rolling code are discrete from one another.
9. The method of
providing a fixed code;
and wherein transmitting at least a part of the encrypted rolling code using the selected patterns as transmission characteristics further comprises transmitting at least a part of the encrypted rolling code and the fixed code using the selected patterns as transmission characteristics.
11. The method of
transmitting the first and second parts of the encrypted rolling code without using either the first or second selected patterns as transmission characteristics to thereby provide recovery identifiers to be used when recovering at a receiver the first and second parts of the fixed message and the third and fourth parts of the encrypted rolling code.
12. The method of
13. The method of
using the first part of the encrypted rolling code to select a particular one of each of the data bit order patterns and the data inversion patterns to provide first selected patterns comprises using two bit pairs of the four bit pairs as comprise the first part of the encrypted rolling code and a first lookup table to correlate the two bit pairs to a corresponding data bit order pattern and using a different two bit pairs of the four bit pairs as comprise the first part of the encrypted rolling code and a second lookup table to correlate the different two bit pairs to a corresponding data inversion pattern;
using the second part of the encrypted rolling code to select a particular one of each of the data bit order patterns and the data inversion patterns to provide second selected patterns comprises using two bit pairs of the four bit pairs as comprise the second part of the encrypted rolling code and the first lookup table to correlate the two bit pairs to a corresponding data bit order pattern and using a different two bit pairs of the four bit pairs as comprise the second part of the encrypted rolling code and the second lookup table to correlate the different two bit pairs to a corresponding data inversion pattern.
14. The method of
15. The method of
transmitting the second part of the fixed message and the fourth part of the encrypted rolling code using the second selected patterns as transmission characteristics only after not transmitting for at least a predetermined period of time following transmission of the first part of the fixed message and the third part of the encrypted rolling code using the first selected patterns as transmission characteristics.
16. The method of
17. The method of
18. The method of
providing a data payload that is not substantially unique to
the given transmitter; and wherein transmitting:
the first part of the fixed message and the third part of the encrypted rolling code using the first selected patterns as transmission characteristics;
the second part of the fixed message and the fourth part of the encrypted rolling code using the second selected patterns as transmission characteristics; further comprises:
transmitting:
the first part of the fixed message, the third part of the encrypted rolling code, and a first part of the data payload using the first selected patterns as transmission characteristics;
the second part of the fixed message, the fourth part of the encrypted rolling code, and a second part of the data payload using the second selected patterns as transmission characteristics.
19. The method of
20. The method of
22. The apparatus of
23. The apparatus of
a first part of the encrypted rolling code to select a data bit order pattern and a data inversion pattern to use when transmitting a first part of the encrypted rolling code and the fixed value; and
a second, different part of the encrypted rolling code to select a data bit order pattern and a data inversion pattern to use when transmitting a second, different part of the encrypted rolling code and the fixed value.
24. The apparatus of
a substantially unique identifier for the apparatus;
a remote control signal that is not specific to the apparatus.
25. The apparatus of
27. The method of
28. The method of
0. 29. The method of claim 1 wherein the providing the encrypted rolling code comprises:
providing ternary data as corresponds to a movable barrier operator;
converting the ternary data to a binary format to provide binary information as at least part of the encrypted rolling code.
0. 30. The method of claim 29 wherein the providing the ternary data comprises providing binary bits of information and converting the binary bits into the ternary data in a way not mirroring the converting the ternary data to the binary format to provide binary information.
0. 31. The method of claim 10 wherein the providing the encrypted rolling code comprises:
providing ternary data as corresponds to a movable barrier operator;
converting the ternary data to a binary format to provide binary information as at least part of the encrypted rolling code.
0. 32. The method of claim 31 wherein the providing the ternary data comprises providing binary bits of information and converting the binary bits into the ternary data in a way not mirroring the converting the ternary data to the binary format to provide binary information.
0. 33. The method of claim 26 further comprising providing the transmitted encrypted rolling code by:
providing ternary data as corresponds to a movable barrier operator;
converting the ternary data to a binary format to provide binary information as at least part of the encrypted rolling code.
0. 34. The method of claim 33 wherein the providing the ternary data comprises providing binary bits of information and converting the binary bits into the ternary data in a way not mirroring the converting the ternary data to the binary format to provide binary information.
|
This application is a reissue application of application Ser. No. 11/501,455, filed Aug. 9, 2006, issued on Apr. 16, 2013 as U.S. Pat. No. 8,422,667, which is:
a continuation in part of application Ser. No. 11/480,288 which was filed on Jun. 30, 2006 as a continuation of application Ser. No. 11/044,411, which is entitled METHOD AND APPARATUS TO FACILITATE TRANSMISSION OF TERNARY MOVABLE BARRIER OPERATOR INFORMATION, which was filed on Jan. 27, 2005, and is now issued as U.S. Pat. No. 7,071,850; and
This application is a continuation in part of application Ser. No. 11/172,525 filed Jun. 30, 2005 and entitled METHOD AND APPARATUS TO FACILITATE MESSAGE TRANSMISSION AND RECEPTION USING DIFFERENT TRANSMISSION CHARACTERISTICS the contents of which are fully incorporated herein by this reference.
This invention relates generally to encrypted rolling codes and more particularly to the transmission of encrypted rolling code information.
Rolling codes are known in the art. Rolling codes are often used, for example, in conjunction with movable barrier operators of various kinds (with movable barrier operators of various kinds also being known in the art and including operators that effect the selective control and movement of single panel and segmented garage doors, pivoting, rolling, and swinging gates, guard arms, rolling shutters, and various other movable barriers). In such an application setting, a wireless transmitter can send a code to a corresponding movable barrier operator to cause the latter to effect a desired movement or other action with respect to, for example, a corresponding movable barrier.
When using rolling codes, the code transmitted by the wireless transmitter will change (often with each transmission) in accordance with a predetermined plan or algorithm that is also known to the movable barrier operator. Such an approach can foil the use of an intercepted code by an unauthorized party because that intercepted code will not typically again, at least in the near term, be honored by that movable barrier operator should the unauthorized party attempt to themselves transmit that code. Without knowledge of the underlying scheme by which a next code is selected, the unauthorized party who gains access to a presently used code will still remain unable to leverage that knowledge in support of effecting unauthorized control over the movable barrier operator.
There may be instances, however, when additional security may be desired or appropriate. For example, a given rolling code instantiation may be open to brute force attacks or other weaknesses due to local and/or otherwise unique circumstances.
The above needs are at least partially met through provision of the method and apparatus to facilitate transmission of an encrypted rolling code described in the following detailed description, particularly when studied in conjunction with the drawings, wherein:
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. For example, the dimensions and/or relative positioning of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments of the present invention. Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of these various embodiments of the present invention. It will also be understood that the terms and expressions used herein have the ordinary meaning as is accorded to such terms and expressions with respect to their corresponding respective areas of inquiry and study except where specific meanings have otherwise been set forth herein.
Generally speaking, pursuant to these various embodiments, an encrypted rolling code, a plurality of differing data bit order patterns, and a plurality of differing data inversion patterns are provided. One selects a particular one of each of the bit order patterns and the data inversion patterns to provide selected patterns and then uses those selected patterns as transmission characteristics when transmitting at least part of the encrypted rolling code.
By these teachings, for example, a wireless remote control transmitter can be provided with data to be transmitted, where that data comprises, at least in part, at least portions of an encrypted rolling code and where that data comports with a particular data bit order pattern and a particular data inversion pattern as a function of a given portion of that rolling code. That data can then be transmitted in combination with the given portion of the encrypted rolling code wherein that given portion of the rolling code is not transmitted with any of its bits reordered or inverted as a function of the given portion itself. Accordingly, a receiver that receives the data can then properly recover the re-ordered/inverted portions of the encrypted rolling code as a function of the given portion of the encrypted rolling code.
By one approach, if desired, the aforementioned data can comprise ternary data that is presented in a binary format. The use of ternary data can aid in facilitating compatible interaction with at least some movable barrier operators while also achieving an encryption effect at the same time as tending to ensure compatible use with binary peripheral platforms and the like. By one approach, this can comprise mapping each trit of the ternary data to a corresponding pair of binary bits. A pair of binary bits can represent 4 discrete information elements and by one approach, three of these discrete information elements can each correspond to one of the three trit states/levels while the fourth discrete information element (which otherwise comprises an illegal value) can serve a synchronization function.
If desired, in addition to the aforementioned encrypted rolling code, a fixed code can also be included in the transmission. By one approach, for example, both the aforementioned part of the encrypted rolling code and this fixed code can be transmitted using the above-described selected patterns as transmission characteristics.
These and other benefits may become clearer upon making a thorough review and study of the following detailed description. Referring now to the drawings, and in particular to
If desired, this process will also optionally accommodate providing 12 a fixed code. This fixed code can vary with the needs, requirements, and/or opportunities of a given application setting, but can, for example, comprise a value that is substantially unique to a given transmitter and hence comprises a value that will serve to identify that given transmitter. Such an approach can be useful, for example, when used in conjunction with a remote control movable barrier operator transmitter.
This process also provides 13 a plurality of differing data bit order patterns. By one approach, for example, this can comprise data bit order patterns that each comprise a pattern for exactly three bits. As will be shown below, this can be particularly beneficial when used in conjunction with bit pairs that correlate to corresponding ternary data. Similarly, this process provides 14 a plurality of different data inversion patterns. As before, if desired, this can comprise providing patterns that each comprise a pattern for exactly three bits. The number of patterns provided in either case can vary as desired. By one approach, however, this can comprise providing at least nine different bit order patterns and nine different data inversion patterns. Illustrative examples in this regard are provided further herein.
This process then provides for selecting 15 a particular one of each of the data bit order patterns and the data inversion patterns to provide resultant corresponding selected patterns. There are various ways by which such selections can be made. By one approach, one may use a predetermined portion of the previously provided encrypted rolling code to inform the making of these selections. For example (and as will be illustrated in more detail herein), this can comprise using a predetermined four bit pairs of the encrypted rolling code as a basis for selecting the particular data bit order pattern and the particular data inversion pattern. As another example in this regard, in combination with the foregoing or in lieu thereof, this can comprise using a first predetermined portion of the encrypted rolling code to select a first particular data bit order pattern and a first data inversion pattern and using a second predetermined portion of the encrypted rolling code (that is, for example, discrete with respect to the first predetermined portion of the encrypted rolling code though this is not a fundamental requirement) to select a second particular data bit order pattern and a second data inversion pattern.
This process then provides for transmitting 16 at least a part of the encrypted rolling code itself (as well as at least a part of the above-described fixed code when present) using the aforementioned selected patterns as transmission characteristics. By one approach this can comprise making such a transmission using Manchester encoding as is known in the art.
So configured, these teachings are readily employed, for example, to facilitate the transmission of a remote control message. This can comprise, for example, providing a fixed message having at least a first part and a second part along with an encrypted rolling code that has a first through a fourth part. The first part of the encrypted rolling code can then be used to select a particular data bit order pattern and a data inversion pattern to use as a set of first selected patterns while the second part of the encrypted rolling code can be used to select a second set of patterns from amongst the available candidate patterns. One can then transmit the first part of the fixed message and the third part of the encrypted rolling code using the first selected patterns as transmission characteristics while transmitting the second part of the fixed message and the fourth art of the encrypted rolling code using the second selected patterns as transmission characteristics.
By one approach, in this illustrative example this can also comprise transmitting the first and second parts of the encrypted rolling code without using either the first or selected patterns as transmission characteristics. So configured, the first and second parts of the encrypted rolling code are then readily usable as recovery identifiers that can be used by a receiver to recover the first and second parts of the fixed message and the third and fourth parts of the encrypted rolling code.
To illustrate further in this regard, these first and second parts of the encrypted rolling code could each comprise four bit pairs as correspond to the aforementioned ternary data. In such a case, two of the bit pairs as comprise the first part of the encrypted rolling code can be used with a lookup table to correlate those two bit pairs to a corresponding data bit order pattern. In a similar manner the remaining bit pairs can be used with a second lookup table (which may, if desired, actually comprise a part of the first lookup table) to correlate these bit pairs with a corresponding data inversion pattern. In a similar fashion, two of the bit pairs of the four bit pairs as comprise the second part of the encrypted rolling code can be used with that first lookup table to identify another data bit order pattern while the remaining two bit pairs can be used with the second lookup table to identify a corresponding data inversion pattern.
In such a case, the aforementioned transmission can then comprise transmitting the second part of the fixed message and the fourth part of the encrypted rolling code using the second selected patterns as transmission characteristics only after not transmitting for at least a predetermined period of time following transmission of the first part of the fixed message and the third part of the encrypted rolling code using the first selected patterns as transmission characteristics. The duration of this predetermined period of time can vary with the needs and opportunities of a given application setting, but a duration of about 75 milliseconds will suffice for many expected purposes.
In addition to facilitating a transmission of an encrypted rolling code and other content that comprises, for example, information that is unique to a given transmitter (such as a unique identifier for that transmitter), these teachings will further readily accommodate the transmission of additional data that is not substantially unique to the transmitter. This can comprise, for example, providing a data payload (such as a remote control instruction such as OPEN, CLOSE, VACATION MODE, LIGHTS ON, LIGHTS OFF, and so forth) that is not substantially unique to a given transmitter and then transmitting the first part of the fixed message, the third part of the encrypted rolling code, and a first part of this data payload while using the first selected patterns as transmission characteristics and transmitting the second part of the fixed message, the fourth part of the encrypted rolling code, and a second (remaining) portion of the data payload using the second selected patterns as transmission characteristics. When the data payload comprises a relatively large quantity of data as compared to the fixed message and/or the encrypted rolling code, additional portions of the data payload as are not accommodated by the just-described process can then be supplementally transmitted using one of the already selected patterns (or other patterns, if desired) as transmission characteristics.
As another specific illustrative example in this regard, and referring now to
This wireless remote control transmitter can then transmit 23 this data in combination with the given portion of the encrypted rolling code such that the given portion of the encrypted rolling code is not transmitted with any of its bits reordered or inverted as a function of the given portion of the encrypted rolling code. So configured, a receiver that receives this data can properly recover the modified portions of the encrypted rolling code as a function, at least in part, of the unmodified given portion of the encrypted rolling code.
As noted above, these teachings are readily applied in a context that makes use of ternary data. It may therefore be helpful to first describe in more detail a typical ternary data protocol as one finds often deployed in conjunction with many movable barrier operators. Pursuant to one approach, pulses of similar amplitude have one of three different durations. For example, and referring now to
Referring now to
The ternary data itself can comprise, at least in part, bearer data. More particularly, and referring momentarily to
These binary bits are then converted 54 into the aforementioned ternary data. This could comprise, in an appropriate platform, a conversion of the binary data into ternary data such as that described above with respect to
By one approach, however, this does not comprise a simple reversal of the binary-to-ternary process just described. Instead, the ternary-to-binary conversion step can comprise mapping each trit of the ternary data to a corresponding pair of binary bits. To illustrate such a map 61, and referring momentarily to
This leaves an otherwise unused binary pair “11.” Pursuant to a preferred approach, this otherwise illegal value can serve a synchronization function when facilitating communications as between a movable barrier operator and one or more peripheral components when using a binary format that otherwise has no synchronization mechanism built into its format (for example, a stream of binary bits such as:
011011111110100111011101101111111010011101110110111111101001110111 which format lacks a frame marker or other point of synchronization). To illustrate, a synchronization signal/marker comprising this “11” binary pair can be used to indicate, for example, the regular end and/or start of a frame or message as in the following example:
110110111111011110111011110110111111101111110111111101101111111011111 where the bold font “11” regularly spaced binary pairs serve as frame markers (and which, due to their synchronized regular spacing, are readily distinguishable from other “11” pairs as may occur for whatever reason (illustratively depicted in the above example with italic font).
Those skilled in the art will appreciate that this process of converting binary information into ternary information, followed by conversion of that ternary information into corresponding binary pairs, yields, in most cases, a different bit sequence (and even a different number of bits) as compared to the initial binary information. This difference serves, at least in part, as a non-key-based encryption technique and hence provides a way of effecting the provision of an encrypted rolling code.
Referring now to
In this particular illustrative embodiment, the bits comprising the rolling code 71 are encrypted 73 by mirroring the bits and then translating those mirrored bits into ternary values as suggested above to provide corresponding bit pairs (in this example, this would comprise 18 such bit pairs) to thereby provide a resultant encrypted rolling code 74. This mirroring can be applied to specific groupings of bits in the rolling code creating mirrored groups or can involve the entire value. In this illustrative example, the encrypted rolling code 74 is presented for further processing as four groups. In this example, these four groups comprise a roll group E 74A comprised of four binary bit pairs, a roll group F 74B comprised of five binary bit pairs, a roll group G 74C comprised of four binary bit pairs, and a roll group H 74D comprised of five binary bit pairs.
The 40 bit fixed information 72 is subdivided in a similar manner albeit sans encryption. This comprises, in this particular illustrative approach, forming four subgroups comprising a fixed group A 75A, a fixed group B 75B, a fixed group C 75C, and a fixed group D 75D, wherein each such group is comprised of 10 bits of the original 40 bit value.
These variously partitioned data groups can then be used as shown in
The first portion 81 comprises, in this embodiment, the following fields:
There are various ways by which these recover identifier values can be selected. Referring momentarily to
It would also be possible to vary the selection mechanism from, for example, joint message to joint message. By one simple approach in this regard, for example, the first eight bits of the encrypted roll group 74 could be used to form the roll sub-group 91 with the last eight bits of the encrypted roll group 74 being used in a similar fashion in an alternating manner.
The eight bits that comprise this roll sub-group 91 are then further parsed to form the two recovery indicators 81E and 81F mentioned above. Again, there are numerous ways by which one may use the bits that comprise the roll sub-group 91 to form these recovery indicators 81E and 81F. By one simple approach, for example, the bits as comprise the roll sub-group 91 can be used in their existing (or reversed) order to form roll group 1 81E and roll group 2 81F. Using this approach, for example, bit B3 of roll group 1 81E would comprise bit seven from the roll sub-group 91 with bit B2 then corresponding to bit six and so forth.
By another approach, if desired, every other bit can be applied in this manner. So configured, for example, bit B3 could comprise bit six from the roll sub-group 91, bit B2 could comprise bit four from the roll sub-group 91, and so forth. In such a case, bit B7 would then comprise bit seven from the roll sub-group 91, bit B6 would comprise bit five from the roll sub-group 91, and so forth.
Referring again to
Before providing further elaboration regarding an illustrative example of such lookup tables and their use, it will be helpful to first note that, in this example, the data in the second portion 82 of the joint message comprises 10 bits from roll group F (or H) and 10 bits each from fixed group A (or C) and fixed group B (or D) for a total of 30 bits. These bits are organized into triplets (shown in
Those skilled in the art will note that, in this illustrative example, bits from roll group E 74A and roll group G 74C are not present in the second portion 82 of the joint message 80. This is because, in this example, it is presumed that the contents of these two roll groups are used to form the recovery indicators that appear in the first portion 81 of the joint message 80. Other accommodations can of course be made in this regard. In general, however, these teachings will accommodate not including those encrypted rolling code bits that are used as recovery indicators in the second portion 82 of the joint message 80.
In the example shown, the order of the bits in each triplet is “F, B, A” (or “H, D, C” as appropriate). This order is neither arbitrary nor static. Instead, for this particular joint message 80, this order of the bits in each triplet is dictated by the values B7, B6, B5, B4 noted above. In this case, and referring now to
Those skilled in the art will note that this lookup table 101 provides no patterns that would correlate to two bit pairs having the value “11.” This is because, in this embodiment, “11” as a bit pair value comprises an illegal value and hence is not expected to occur. Accordingly there are no bit order patterns presented to correlate with such values as “11XX,” “XX11,” or “1111.” This creates 9 possible selections for the order of bits and the inversion value. The number of possible unique order of three bits leads to only six different bit order patterns. This degree of diversity should suffice for most if not all purposes.
The aforementioned B3, B2, B1, B0 values 81F are employed in a similar fashion with this lookup table 101 to identify a particular inversion pattern to be employed with the data triplets of the second portion 82 of the joint message 80. For example, when these bits are “0000,” this lookup table provides for no inversion of any of the bits in each triplet. On the other hand, when these bits are “1010,” each bit of each triplet is to be inverted. In this case, up to eight different inversion patterns are possible.
To illustrate further, when a given data triplet happens to have the values “110” and the inversion indicator has the values “0100,” the lookup table will return a data inversion pattern of “normal invert invert.” As a result, this particular data triplet will instead have the values “101” because the second and third values in each triplet are now to be inverted in value.
So configured, a first portion of a joint message is seen to include a recovery indicator that itself comprises a selected portion of an encrypted rolling code. A second portion of that joint message, in turn, contains data triplets having bits that are arranged in a particular order and that observe a particular inversion pattern as a function of that joint indicator. Accordingly, it will not be sufficient for an unauthorized party to simply glean, in some fashion, the basis of the rolling code itself. Instead, now, this unauthorized party must also now understand how a particular portion of that rolling code is used to modify the transmission of other portions of that rolling code in addition to fixed information as may also accompany the rolling code.
In many application settings it may be desirable to present more than one such joint message to present a complete transmission. For example, and referring now to
If desired, these joint messages 80A and 80B can be sent in a concatenated manner. By another approach, however, these joint messages can be separated by at least a minimal amount of silence (achieved, for example, by not transmitting during this period of time). For example, 75 milliseconds or so of blank time can be used for this purpose. So configured, a receiver that receives a second joint message prior to this period of blank time expiring can conclude that one or both of the received messages is somehow in error and should be avoided.
As noted above, in some cases it may be useful to transmit an additional amount of data or information than that specifically provided above. For example, it may be useful to transmit additional data that represents a particular instruction, status information, or the like. Such additional information can be readily accommodated by the teachings set forth above. To illustrate, and referring now to
Referring now to
In some cases, it may be necessary or appropriate to transmit even a larger quantity of data than can be accommodated by the processes and techniques described above. In such a case, if desired, additional supplemental joint messages can be used to present such supplemental data. With reference to
Referring now to
Those skilled in the art will appreciate that the above-described processes are readily enabled using any of a wide variety of available and/or readily configured platforms, including partially or wholly programmable platforms as are known in the art or dedicated purpose platforms as may be desired for some applications. Referring now to
In this illustrative embodiment, the apparatus 180 (which may comprise, for example, a wireless remote control transmitter) comprises a processor 181 that couples to a transmitter 182 (such as a wireless transmitter) of choice. Both of these components then also operably couple to a first memory 183, a second memory 184, a first lookup table 185, and a second lookup table 186. The first memory 183 can have a fixed value stored therein. This fixed value can comprise, for example, information that substantially uniquely identifies this particular apparatus 180. This first memory 183 may also, if desired, have a plurality of different fixed values contained therein. This would permit storing, for example, remote control signals that are not specific (i.e., unique) to the apparatus 180 itself.
The second memory 184 can have the aforementioned encrypted rolling code stored therein. By one approach, the processor 181 is configured and arranged to calculate the encrypted rolling code when needed and to temporarily buffer that value in the second memory 184 pending actual use of that information. By another approach, the encrypted rolling code information can be pre-provisioned using a derivation and storage approach of choice.
The lookup tables 185 and 186 are the lookup tables described above. For example, the first lookup table 185 can comprise the lookup table that correlates a first plurality of different encrypted rolling code values with corresponding differing data bit order patterns. Similarly, the second lookup table 186 can comprise the lookup table that correlates a second plurality of different encrypted rolling code values with corresponding different data inversion patterns.
The processor 181 itself is configured and arranged (via, for example, appropriate programming) to carry out selected teachings as have been presented above. So configured, for example, the processor 181 can be configured and arranged to use the encrypted rolling code to select ones of the particular data bit order patterns and data inversion patterns for the transmitter 182 to use as transmission characteristics when transmitting the fixed value and at least portions of the encrypted rolling code. In particular, if desired, the processor can use a first part of the encrypted rolling code to select a data bit order pattern and a data inversion pattern to use when transmitting a first part of the encrypted rolling code and the fixed value and a second, different part of the encrypted rolling code to select a data bit order pattern and a data inversion pattern to use when transmitting a second, different part of the encrypted rolling code and the fixed value.
Those skilled in the art will recognize and understand that such an apparatus 180 may be comprised of a plurality of physically distinct elements as is suggested by the illustration shown in
So configured, those skilled in the art will recognize and appreciate that these teachings offer great flexibility and opportunity with respect to further protecting information during a wireless transmission of that information. These teachings have particular relevance to transmissions of rolling codes and offer particular advantages when also used in conjunction with the transmission of fixed information in addition to rolling code information. The particular transmission characteristics presented are largely compatible for use with a wide variety of wireless modulation techniques. Those skilled in the art will also appreciate that these teachings are highly compatible for use with binary-based representations of ternary data formats.
Those skilled in the art will recognize that a wide variety of modifications, alterations, and combinations can be made with respect to the above described embodiments without departing from the spirit and scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the ambit of the inventive concept.
Fitzgibbon, James J., Gregori, Eric M., Laird, Edward T.
Patent | Priority | Assignee | Title |
11799648, | Jan 27 2005 | The Chamberlain Group LLC | Method and apparatus to facilitate transmission of an encrypted rolling code |
12149618, | Jan 27 2005 | The Chamberlain Group LLC | Method and apparatus to facilitate transmission of an encrypted rolling code |
Patent | Priority | Assignee | Title |
3906348, | |||
4097859, | Nov 01 1976 | Unisys Corporation | Three-level to two-level decoder |
4178549, | Mar 27 1978 | National Semiconductor Corporation | Recognition of a received signal as being from a particular transmitter |
4243976, | Mar 12 1979 | The Singer Company | Ternary to binary converter |
4255742, | Jun 07 1979 | Ford Motor Company | Data communication code |
4387455, | Jun 18 1981 | NIRAVOICE | Apparatus and method for transmission of communications |
4387460, | Jul 23 1979 | SOCIETE ANONYME DE TELECOMMUNICATIONS, A CORP OF FRANCE | Supplementary information transmitting arrangement for a digital data transmission system |
4468787, | Nov 09 1981 | TELECOMMUNICATIONS PRODUCTS CORP , A CORP OF DE ; BANGOR PUNTA INTERNATIONAL CAPITAL HOLDING CORP , A CORP OF DE | Ternary data transmission system |
4566044, | Oct 29 1984 | International Business Machines Corporation | Direction-constrained ternary codes using peak and polarity detection |
4677284, | Aug 22 1985 | Multi-access security system | |
4720860, | Nov 30 1984 | EMC Corporation | Method and apparatus for positively identifying an individual |
4750118, | Oct 29 1985 | CHAMBERLAIN GROUP, INC , THE, A CT CORP | Coding system for multiple transmitters and a single receiver for a garage door opener |
4808995, | May 02 1986 | THE CHAMBERLAIN GROUP INC | Accessory-expandable, radio-controlled, door operator with multiple security levels |
4829296, | Apr 30 1986 | CONTROL MODULE, INC | Electronic lock system |
4850046, | Oct 30 1986 | Neiman | Infrared transmitter of coded message having fixed code and large number of combinations |
4856062, | Nov 30 1984 | EMC Corporation | Computing and indicating device |
4885778, | Nov 30 1984 | EMC Corporation | Method and apparatus for synchronizing generation of separate, free running, time dependent equipment |
4893338, | Dec 31 1987 | Pitney Bowes Inc. | System for conveying information for the reliable authentification of a plurality of documents |
4910750, | Dec 05 1985 | STC PLC, A BRITISH CORP | Data transmission system |
4988990, | Aug 11 1987 | Rosemount Inc. | Dual master implied token communication system |
4988992, | Jul 27 1989 | The Chamberlain Group, Inc. | System for establishing a code and controlling operation of equipment |
5021776, | Jul 11 1988 | Yale Security Inc. | Electronic combination of lock with changeable entry codes, lock-out and programming code |
5091942, | Jul 23 1990 | Ericsson, Inc | Authentication system for digital cellular communications |
5136548, | Jun 07 1990 | DaimlerChrysler AG | Remote-control system for closures |
5150464, | Jun 06 1990 | Apple Inc | Local area network device startup process |
5197061, | Mar 23 1990 | ETAT FRANCAIS, MINISTERE DES PTT CENTRE NATIONAL D ETUDES DES TELECOMMUNICATIONS ; TELEDIFFUSION DE FRANCE S A | Device for the transmission of digital data with at least two levels of protection and corresponding reception device |
5252960, | Aug 26 1991 | THE CHAMBERLAIN GROUP INC | Secure keyless entry system for automatic garage door operator |
5420925, | Mar 03 1994 | Delphi Technologies, Inc | Rolling code encryption process for remote keyless entry system |
5442340, | Aug 14 1990 | Gentex Corporation | Trainable RF transmitter including attenuation control |
5517187, | May 29 1990 | Microchip Technology Incorporated; INTENCO S A | Microchips and remote control devices comprising same |
5563600, | Jun 30 1993 | CODE SYSTEMS, INC | Data transmission for remote-controlled security system |
5565812, | Mar 23 1995 | Texas Instruments Incorporated | Increased sensitivity signal shaper circuit to recover a data stream coming from a digitally modulated channel |
5566359, | Jun 06 1992 | Prevention of simultaneous transmitter operation in a ground radio transmitting and receiving apparatus | |
5576701, | Jul 16 1990 | The Chamberlain Group, Inc. | Remote actuating apparatus comprising keypad controlled transmitter |
5578999, | Dec 06 1993 | Casio Computer Co., Ltd. | Remote control with learning function and confirmation thereof |
5594429, | Oct 27 1993 | ALPS ELECTRIC CO , LTD | Transmission and reception system and signal generation method for same |
5600653, | Sep 30 1994 | Viasat, Inc | Technique for improving asynchronous transfer mode operation over a communications link with bursty bit errors |
5635913, | Jul 16 1990 | The Chamberlain Group, Inc. | Remote actuating apparatus with long and short operating codes |
5673017, | Sep 03 1993 | VIPER BORROWER CORPORATION, INC ; VIPER HOLDINGS CORPORATION; VIPER ACQUISITION CORPORATION; DEI SALES, INC ; DEI HOLDINGS, INC ; DEI INTERNATIONAL, INC ; DEI HEADQUARTERS, INC ; POLK HOLDING CORP ; Polk Audio, Inc; BOOM MOVEMENT, LLC; Definitive Technology, LLC; DIRECTED, LLC | Remote vehicle starting system |
5686904, | Dec 04 1992 | Microchip Technology Incorporated; INTENCO S A | Secure self learning system |
5699065, | Jan 16 1996 | THE CHAMBERLAIN GROUP INC | Remote control transmitter and method of operation |
5719619, | Oct 08 1994 | Sony Corporation | Bidirectional broadcasting method, bidirectional broadcasting system and receiver apparatus for bidirectional broadcast |
5774065, | Aug 05 1994 | Nippondenso Co., Ltd. | Remote control system and method using variable ID code |
5838747, | Jul 28 1995 | NEC Electronics Corporation | Asynchronous serial data transmission apparatus with edge interrupt operation and timer interrupt operation |
5942985, | Jul 25 1995 | Samsung Electronics Co., Ltd. | Automatic locking/unlocking device and method using wireless communication |
5949349, | Feb 19 1997 | CHAMBERLAIN GROUP, THE | Code responsive radio receiver capable of operation with plural types of code transmitters |
6012144, | Oct 08 1996 | Transaction security method and apparatus | |
6049289, | Sep 06 1996 | MICROCHIP TECHNOLOGY INC | Remote controlled garage door opening system |
6052408, | Sep 06 1995 | DYNAMIC TRANSMISSION TECHNOLOGIES LLC | Cellular communication system with dynamically modified data transmission parameters |
6070154, | Nov 27 1998 | Activepoint Ltd. | Internet credit card security |
6094575, | Nov 01 1993 | Intel Corporation | Communication system and method |
6154544, | May 17 1995 | The Chamberlain Group, Inc. | Rolling code security system |
6157719, | Apr 03 1995 | TECH 5 SAS | Conditional access system |
6175312, | May 29 1990 | Microchip Technology Incorporated; INTENCO S A | Encoder and decoder microchips and remote control devices for secure unidirectional communication |
6181255, | Feb 27 1997 | CHAMBERLAIN GROUP, INC THE | Multi-frequency radio frequency transmitter with code learning capability |
6243000, | Feb 13 1998 | Wireless rolling code security system | |
6414587, | Mar 13 1998 | The Chamberlain Group, Inc. | Code learning system for a movable barrier operator |
6414986, | Aug 24 1998 | Redwood Technologies, LLC | Method and system for radio communication |
6456726, | Oct 26 1999 | MATSUSHITA ELECTRIC INDUSTRIAL CO , LTD | Methods and apparatus for multi-layer data hiding |
6496477, | Jul 09 1999 | Texas Instruments Incorporated | Processes, articles, and packets for network path diversity in media over packet applications |
6535544, | Sep 15 1997 | Frequency hopping system for intermittent transmission | |
6549949, | Aug 31 1999 | Accenture Global Services Limited | Fixed format stream in a communication services patterns environment |
6640244, | Aug 31 1999 | Accenture Global Services Limited | Request batcher in a transaction services patterns environment |
6688518, | Jan 31 2002 | Wall-mounted touch screen information system | |
6690796, | May 17 1995 | The Chamberlain Group, Inc. | Rolling code security system |
6697379, | May 18 1998 | CONVERSANT INTELLECTUAL PROPERTY MANAGEMENT INC | System for transmitting messages to improved stations, and corresponding processing |
6754266, | Oct 09 1998 | Microsoft Technology Licensing, LLC | Method and apparatus for use in transmitting video information over a communication network |
6810123, | May 17 1995 | The Chamberlain Group, Inc. | Rolling code security system |
6829357, | Dec 14 1999 | TRW Inc. | Communication system having a transmitter and a receiver that engage in reduced size encrypted data communication |
6850910, | Oct 22 1999 | Matsushita Electric Industrial Co., Ltd. | Active data hiding for secure electronic media distribution |
6930983, | Mar 15 2000 | Texas Instruments Incorporated | Integrated circuits, systems, apparatus, packets and processes utilizing path diversity for media over packet applications |
6956460, | Jan 15 2002 | Transmitter for operating rolling code receivers | |
6963561, | Dec 15 2000 | NOKIA SIEMENS NETWORKS ETHERNET SOLUTIONS LTD | Facility for transporting TDM streams over an asynchronous ethernet network using internet protocol |
6980518, | Jun 23 2000 | International Business Machines Corporation | Gossip-based reliable multicast message recovery system and method |
6980655, | Jan 21 2000 | The Chamberlain Group, Inc. | Rolling code security system |
6998977, | Apr 28 2003 | CHAMBERLIAN GROUP, INC , THE | Method and apparatus for monitoring a movable barrier over a network |
7002490, | Sep 09 2003 | Ternarylogic LLC | Ternary and higher multi-value digital scramblers/descramblers |
7039397, | Jul 30 2003 | Lear Corporation | User-assisted programmable appliance control |
7039809, | Nov 12 1998 | MasterCard International Incorporated | Asymmetric encrypted pin |
7042363, | Apr 02 2003 | GM Global Technology Operations LLC | Methods and apparatus for producing a three-state single wire control |
7050479, | May 12 2000 | L-3 Communications Titan Corporation | System for, and method of, providing frequency hopping |
7050794, | Jul 30 2003 | Lear Corporation | User-assisted programmable appliance control |
7057494, | Aug 09 2001 | Gentex Corporation | Method and apparatus for a rolling code learning transmitter |
7057547, | May 21 2002 | CHAMBERLAIN GROUP, INC THE | Mounted remote control unit with plug-in module interface |
7068181, | Jul 30 2003 | Lear Corporation | Programmable appliance remote control |
7071850, | Jan 27 2005 | CHAMBERLAIN GROUP, INC , THE | Method and apparatus to facilitate transmission of ternary movable barrier operator information |
7088218, | Jul 30 2003 | Lear Corporation | Wireless appliance activation transceiver |
7088706, | Jun 30 1999 | Cisco Technology, Inc. | Method and apparatus for measuring latency of a computer network |
7139398, | Jun 06 2001 | Sony Corporation, a Japanese corporation; SONY ELECTRONICS INC , A DELAWARE CORPORATION | Time division partial encryption |
7161466, | Jul 30 2003 | Lear Corporation | Remote control automatic appliance activation |
7298721, | Feb 02 2000 | NTT DoCoMo, Inc | Single-carrier/DS-CDMA packet transmitting method, uplink packet transmitting method in multi carrier/DS-CDMA mobile communication system, and structure of downlink channel in multi carrier/DS-CDMA mobile communication system |
7301900, | May 24 2001 | ADEIA GUIDES INC | Method and apparatus for hub-based network access via a multimedia system |
7333615, | Jun 26 2002 | Bellsouth Intellectual Property Corporation | Encryption between multiple devices |
7336787, | Jun 06 2001 | Sony Corporation, a Japanese corporation; SONY ELECTRONICS INC , A CORP OF DELAWARE | Critical packet partial encryption |
7346163, | Oct 31 2003 | Sony Corporation; Sony Electronics INC | Dynamic composition of pre-encrypted video on demand content |
7353499, | Sep 25 2003 | Oracle America, Inc | Multiple instruction dispatch tables for application program obfuscation |
7406553, | Sep 30 2002 | CAVIUM INTERNATIONAL; MARVELL ASIA PTE, LTD | System and apparatus for early fixed latency subtractive decoding |
7412056, | May 17 1995 | The Chamberlain Group, Inc. | Rolling code security system |
7415618, | Sep 25 2003 | Oracle America, Inc | Permutation of opcode values for application program obfuscation |
7429898, | Nov 09 2005 | FUJIFILM Corporation | Clock signal generating circuit, semiconductor integrated circuit and method for controlling a frequency division ratio |
7447498, | Jul 30 2003 | Lear Corporation | User-assisted programmable appliance control |
7489922, | Jul 30 2003 | Lear Corporation | User-assisted programmable appliance control |
7492898, | May 17 1995 | The Chamberlain Group, Inc. | Rolling code security system |
7492905, | May 17 1995 | CHAMBERLAIN GROUP, INC , THE | Rolling code security system |
7516325, | Apr 06 2001 | BlackBerry Limited | Device authentication in a PKI |
7535926, | Jan 07 2005 | Juniper Networks, Inc | Dynamic interface configuration for supporting multiple versions of a communication protocol |
7545942, | Feb 14 2002 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Security key distribution using key rollover strategies for wireless networks |
7548153, | Jul 09 2004 | Transcore, LP | Multi-protocol or multi-command RFID system |
7561075, | Jan 27 2005 | The Chamberlain Group, Inc | Method and apparatus to facilitate transmission of ternary movable barrier operator information |
7564827, | Oct 19 2001 | Alcatel-Lucent USA Inc | Adaptive hybrid retransmission method for wireless communications |
7598855, | Feb 01 2005 | LBT IP II LLC | Apparatus and method for locating individuals and objects using tracking devices |
7623663, | May 17 1995 | The Chamberlain Group, Inc. | Rolling code security system |
7668125, | Sep 09 2003 | Qualcomm Incorporated | Incremental redundancy transmission for multiple parallel channels in a MIMO communication system |
7741951, | Aug 09 2001 | Gentex Corporation | Method and apparatus for a rolling code learning transmitter |
7742501, | Aug 06 2004 | ADAPTIV NETWORKS INC | System and method for higher throughput through a transportation network |
7757021, | Oct 21 2004 | FUTURE LINK SYSTEMS | Slave bus subscriber for a serial data bus |
7764613, | Aug 14 2003 | NTT DoCoMo, Inc | Communication control method and system |
7786843, | Apr 19 2005 | Gentex Corporation | System and method for training a trainable transmitter and a remote control system receiver |
7812739, | Jul 30 2003 | Lear Corporation | Programmable appliance remote control |
7839851, | Dec 22 2006 | NTT DOCOMO, INC.; NTT DoCoMo, Inc | Method and apparatus for opportunistic multicasting with coded scheduling in wireless networks |
7855633, | Jul 30 2003 | Lear Corporation | Remote control automatic appliance activation |
7999656, | Oct 26 2005 | SentriLock, LLC | Electronic lock box with key presence sensing |
8014377, | Jun 24 2004 | Apple Inc | Efficient location updates, paging and short bursts |
8130079, | Aug 15 2007 | AT&T Intellectual Property I, L.P. | Methods, systems, and products for discovering electronic devices |
8194856, | May 17 1995 | The Chamberlain Group, Inc. | Rolling code security system |
8207818, | Jun 08 2007 | The Chamberlain Group, Inc | Method and apparatus regarding a movable barrier operator remote control transmitter kit |
8209550, | Apr 20 2007 | TELEFONAKTIEBOLAGET LM ERICSSON PUBL | Method and apparatus for protecting SIMLock information in an electronic device |
8225094, | Apr 06 2001 | Certicom Corp. | Device authentication in a PKI |
8233625, | May 17 1995 | The Chamberlain Group, Inc. | Rolling code security system |
8266442, | Aug 13 2003 | CPC PATENT TECHNOLOGIES PTY LTD | Remote entry system |
8276185, | Jan 19 2005 | U S BANK NATIONAL ASSOCIATION, AS COLLATERAL AGENT | Enhanced security memory access method and architecture |
8284021, | May 17 1995 | The Chamberlain Group, Inc. | Rolling code security system |
8290465, | Feb 02 2007 | LG Electronics Inc | Method of transmitting and receiving a message associated with power saving mode in a wireless communication system |
8416054, | Feb 25 2010 | The Chamberlain Group, Inc.; The Chamberlain Group, Inc | Method and apparatus for training a learning movable barrier operator transceiver |
8422667, | Jan 27 2005 | The Chamberlain Group, Inc | Method and apparatus to facilitate transmission of an encrypted rolling code |
8452267, | Nov 27 2009 | EazyBreak Oy | System and method for granting access to a system |
8463540, | Mar 18 2005 | GATEKEEPER SYSTEMS, INC | Two-way communication system for tracking locations and statuses of wheeled vehicles |
8536977, | Aug 09 2001 | Gentex Corporation | Method and apparatus for a rolling code learning transmitter |
8544523, | Jul 10 2001 | Overhead Door Corporation | Automatic barrier operator system |
8581695, | May 27 2009 | Overhead Door Corporation | Channel-switching remote controlled barrier opening system |
8615562, | Dec 29 2006 | GOOGLE LLC | Proxy for tolerating faults in high-security systems |
8633797, | May 17 1995 | The Chamberlain Group, Inc. | Rolling code security system |
8634777, | Sep 26 2011 | AVAGO TECHNOLOGIES INTERNATIONAL SALES PTE LIMITED | Pairing with directional code sequence |
8645708, | Nov 30 2007 | Bouyant Holdings Limited | Method and apparatus for the secure identification of the owner of a portable device |
8661256, | Apr 06 2001 | Certicom Corp. | Device authentication in a PKI |
8699704, | Jan 13 2010 | Entropic Communications, LLC | Secure node admission in a communication network |
8760267, | Aug 28 2006 | Gentex Corporation; GENTEX CORPORATON | System and method for enrollment of a remotely controlled device in a trainable transmitter |
8787823, | Sep 19 2005 | CalAmp Wireless Networks Corporation | Recovery system with repeating communication capabilities |
8830925, | Aug 08 2008 | LG Electronics Inc | Method of reporting channel quality information in a wireless communication system |
8836469, | Oct 15 2010 | The Chamberlain Group, Inc | Method and apparatus to accommodate both a learn mode of operation and a pairing mode of operation during a relationship-establishment mode of operation |
9082293, | Sep 14 2006 | Crown Equipment Corporation | Systems and methods of remotely controlling a materials handling vehicle |
9124424, | Jun 18 2009 | III Holdings 12, LLC | System, apparatus and method for license key permutation |
9142064, | Aug 07 2013 | ZF Friedrichshafen AG | System for detecting vehicle driving mode and method of conducting the same |
9160408, | Oct 11 2010 | ENPHASE ENERGY, INC | System and method for establishing communication with an array of inverters |
9280704, | Jun 12 2013 | The Code Corporation | Communicating wireless pairing information for pairing an electronic device to a host system |
9317983, | Apr 15 2013 | AutoConnect Holdings LLC | Automatic communication of damage and health in detected vehicle incidents |
9336637, | Mar 17 2011 | UNIKEY TECHNOLOGIES, INC | Wireless access control system and related methods |
9396376, | Apr 30 2015 | International Business Machines Corporation | Enhanced quick response codes |
9413453, | Apr 09 2013 | PANASONIC INTELLECTUAL PROPERTY MANAGEMENT CO , LTD | Wireless communication method and wireless communication system |
9418326, | Apr 30 2015 | International Business Machines Corporation | Enhanced quick response codes |
20010023483, | |||
20020034303, | |||
20020184504, | |||
20020191785, | |||
20020191794, | |||
20030056001, | |||
20030070092, | |||
20030072445, | |||
20030147536, | |||
20030177237, | |||
20030191949, | |||
20030227370, | |||
20040019783, | |||
20040081075, | |||
20040174856, | |||
20040179485, | |||
20040181569, | |||
20050053022, | |||
20050058153, | |||
20050101314, | |||
20050174242, | |||
20050285719, | |||
20060083187, | |||
20060109978, | |||
20060176171, | |||
20070005806, | |||
20070006319, | |||
20070018861, | |||
20070058811, | |||
20070245147, | |||
20080229400, | |||
20080297370, | |||
20090016530, | |||
20090021348, | |||
20090096621, | |||
20090176451, | |||
20090315672, | |||
20100060413, | |||
20100112979, | |||
20100125509, | |||
20100125516, | |||
20100199092, | |||
20100211779, | |||
20110051927, | |||
20110296185, | |||
20110316668, | |||
20110316688, | |||
20110317835, | |||
20110320803, | |||
20120054493, | |||
20120297681, | |||
20130170639, | |||
20130268333, | |||
20130272520, | |||
20140169247, | |||
20140289528, | |||
20150222517, | |||
20150358814, | |||
20160021140, | |||
20160198391, | |||
20160261572, | |||
AU2006200340, | |||
AU2007203558, | |||
AU2008202369, | |||
AU2011202656, | |||
AU2011218848, | |||
AU645228, | |||
AU710682, | |||
CA2087722, | |||
CA2177410, | |||
CA2193846, | |||
CA2443452, | |||
CA2456680, | |||
CA2565505, | |||
CA2596188, | |||
CA2631076, | |||
CA2684658, | |||
CA2708000, | |||
CA2742018, | |||
CA2790940, | |||
CN101399825, | |||
EP265935, | |||
EP771498, | |||
EP937845, | |||
EP1024626, | |||
EP1223700, | |||
EP1313260, | |||
EP1421728, | |||
EP1625560, | |||
EP1760985, | |||
EP1865656, | |||
EP1875333, | |||
EP2149103, | |||
EP2290872, | |||
EP2293478, | |||
EP2437212, | |||
EP2800403, | |||
FR2737373, | |||
GB2288261, | |||
GB2430115, | |||
GB2440816, | |||
GB2453383, | |||
JP9322274, | |||
WO10301, | |||
WO10302, | |||
WO3010656, | |||
WO3079607, | |||
WO10301, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Oct 30 2006 | FITZGIBBON, JAMES J | The Chamberlain Group, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 043269 | /0546 | |
Oct 30 2006 | GREGORI, ERIC | The Chamberlain Group, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 043269 | /0546 | |
Jul 11 2014 | LAIRD, EDWARD T | The Chamberlain Group, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 043269 | /0540 | |
Aug 10 2017 | The Chamberlain Group, Inc. | (assignment on the face of the patent) | / | |||
Aug 05 2021 | The Chamberlain Group, Inc | THE CHAMBLERLAIN GROUP LLC | CONVERSION | 058738 | /0305 | |
Aug 05 2021 | The Chamberlain Group, Inc | The Chamberlain Group LLC | CONVERSION | 060379 | /0207 | |
Nov 03 2021 | Systems, LLC | ARES CAPITAL CORPORATION, AS COLLATERAL AGENT | SECOND LIEN PATENT SECURITY AGREEMENT | 058015 | /0001 | |
Nov 03 2021 | The Chamberlain Group LLC | ARES CAPITAL CORPORATION, AS COLLATERAL AGENT | SECOND LIEN PATENT SECURITY AGREEMENT | 058015 | /0001 | |
Nov 03 2021 | Systems, LLC | WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL AGENT | FIRST LIEN PATENT SECURITY AGREEMENT | 058014 | /0931 | |
Nov 03 2021 | The Chamberlain Group LLC | WELLS FARGO BANK, NATIONAL ASSOCIATION, AS COLLATERAL AGENT | FIRST LIEN PATENT SECURITY AGREEMENT | 058014 | /0931 | |
Jan 26 2024 | ARES CAPITAL CORPORATION, AS COLLATERAL AGENT | The Chamberlain Group LLC | NOTICE OF TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS | 066374 | /0749 | |
Jan 26 2024 | ARES CAPITAL CORPORATION, AS COLLATERAL AGENT | Systems, LLC | NOTICE OF TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS | 066374 | /0749 |
Date | Maintenance Fee Events |
Oct 02 2024 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Feb 09 2024 | 4 years fee payment window open |
Aug 09 2024 | 6 months grace period start (w surcharge) |
Feb 09 2025 | patent expiry (for year 4) |
Feb 09 2027 | 2 years to revive unintentionally abandoned end. (for year 4) |
Feb 09 2028 | 8 years fee payment window open |
Aug 09 2028 | 6 months grace period start (w surcharge) |
Feb 09 2029 | patent expiry (for year 8) |
Feb 09 2031 | 2 years to revive unintentionally abandoned end. (for year 8) |
Feb 09 2032 | 12 years fee payment window open |
Aug 09 2032 | 6 months grace period start (w surcharge) |
Feb 09 2033 | patent expiry (for year 12) |
Feb 09 2035 | 2 years to revive unintentionally abandoned end. (for year 12) |