High throughput embedded code hopping system with bypass mode
First Claim
1. A system for monitoring and controlling an area comprising:
- a) a controller for controlling system operational functions;
b) at least one remote control transmitter for transmitting at least one system command to said controller in a code word having at least one fixed position word and at least one hopping word therein;
c) said fixed position word having an identification code for control of said controller, said identification code programmed in said controller, and a channel code for issuing high and low security commands to said controller;
d) a hopping algorithm for modifying said hopping code of said transmitter n-times in response to n-times activation of said transmitter and for modifying said hopping word m-times within said controller upon receipt of said code word times from said transmitter; and
,e) a bypass mode for bypassing said code hopping algorithm and for controlling said system functions in response to said controller receiving said low security command.
18 Assignments
0 Petitions
Accused Products
Abstract
A system for monitoring and controlling an area comprising a controller for controlling system operational functions; at least one remote control transmitter for transmitting at least one system command to said controller in a code word having a fixed word and a hopping word therein; the fixed word having an identification code for selective control of the controller, the identification code programmed therein, and a channel code for issuing high and low security commands to the controller; a hopping algorithm for modifying the hopping code of the transmitter n-times in response to n-times activation of said transmitter and for modifying the hopping word m-times within the controller upon receipt of the code word m-times from said transmitter; and, a bypass mode for bypassing the code hopping algorithm and for controlling system functions in response to the controller receiving the low security command.
-
Citations
30 Claims
-
1. A system for monitoring and controlling an area comprising:
-
a) a controller for controlling system operational functions; b) at least one remote control transmitter for transmitting at least one system command to said controller in a code word having at least one fixed position word and at least one hopping word therein; c) said fixed position word having an identification code for control of said controller, said identification code programmed in said controller, and a channel code for issuing high and low security commands to said controller; d) a hopping algorithm for modifying said hopping code of said transmitter n-times in response to n-times activation of said transmitter and for modifying said hopping word m-times within said controller upon receipt of said code word times from said transmitter; and
,e) a bypass mode for bypassing said code hopping algorithm and for controlling said system functions in response to said controller receiving said low security command. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for monitoring and controlling an area comprising:
-
a) a controller for controlling system operational functions; b) at least one remote control transmitter for transmitting at least one system command to said controller in a code word having a fixed position word and a hopping word therein; c) said fixed position word having an identification code for control of said controller, said identification code programmed in said controller, and a channel code for issuing high and low security commands to said controller; d) a hopping algorithm for modifying said hopping code of said transmitter n-times in response to n-times activation of said transmitter and for modifying said hopping word m-times within said controller upon receipt of said code word times from said transmitter; and
,e) a bypass mode for bypassing said code hopping algorithm and for controlling said system functions in response to said controller receiving said low security command, after verification of said hopping code using said hopping algorithm at least one time. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. Method of transmitting system commands, in a code word having a fixed code and a hopping code and having low security and high security commands, from a remote control transmitter to a system controller responsive thereto, comprising the steps of:
-
a) encoding a fixed position word within a transmitter having an identification code and a channel code therein, said channel code providing system operational function commands to a system controller; b) programming said identification code within said controller; c) assigning a high security or a low security to said channel code; d) programming a hopping algorithm into said transmitter and said controller, each having a 0-times modified initial hopping word therein; e) modifying said initial hopping word n-times with said hopping algorithm in response to n-times activation of said transmitter; f) encoding a code word having said fixed position word and said n-times modified hopping word therein; g) transmitting said code word to said controller; h) said controller receiving said code word; i) said controller responding to said code word having said identification code programmed therein; j) said controller decoding said channel code and determining whether it is said high security or said low security code; k) said controller modifying said initial hopping word m-times in response to receiving said high security code with said hopping algorithm in response to n-times activation of said transmitter; l) said controller executing said commands if said n-times modified hopping word received from said transmitter matches said m-times hopping word decoded by said controller; and
,m) said controller bypassing said step of modifying said initial hopping word in response to said low security channel identification code and executing said command of said channel code. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. Method of transmitting system commands, in a code word having a fixed code and a hopping code and having low security and high security commands, from a remote control transmitter to a system responsive thereto, comprising the steps of:
-
a) encoding a fixed position word within a transmitter having an identification code and a channel code therein, said channel code providing system operational function commands to a system controller; b) programming said identification code within said controller; c) assigning a high security or a low security to said channel code; d) programming a hopping algorithm into said transmitter and said controller, each having a 0-times modified initial hopping word therein; e) modifying said initial hopping word n-times with said hopping algorithm in response to n-times activation of said transmitter; f) encoding a code word having said fixed position word and said n-times modified hopping word therein; g) transmitting said code word to said controller; h) said controller receiving said code word; i) said controller responding to said code word having said identification code programmed therein; i) said controller decoding said channel code and determining whether it is said high security or said low security code; k) said controller modifying said initial hopping word m-times in response to receiving said high security code with said hopping algorithm in response to n-times activation of said transmitter; l) said controller executing said commands if said n-times modified hopping word received from said transmitter matches said m-times hopping word decoded by said controller; and
,m) verifying said hopping code using said hopping algorithm at least one time and thereafter bypassing said step of verifying said hopping word in response to said low security channel code and executing said command of said channel code. - View Dependent Claims (25, 26, 27, 28, 29, 30)
-
Specification