Rolling code security system

Cryptography – Communication system using cryptography – Symmetric key cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C380S239000, C341S173000

Reexamination Certificate

active

06980655

ABSTRACT:
A rolling code transmitter is useful in a security system for providing secure encrypted RF transmission comprising an interleaved trinary bit fixed code and rolling code. A receiver demodulates the encrypted RF transmission and recovers the fixed code and rolling code. Upon comparison of the fixed and rolling codes with stored codes and determining that the signal has emanated from an authorized transmitter, a signal is generated to actuate an electric motor to open or close a movable barrier.

REFERENCES:
patent: 2405500 (1946-08-01), Guannella
patent: 3716865 (1973-02-01), Willmott
patent: 3735106 (1973-05-01), Hollaway
patent: 3792446 (1974-02-01), McFiggins et al.
patent: 3798359 (1974-03-01), Feistel
patent: 3798360 (1974-03-01), Feistel
patent: 3798605 (1974-03-01), Feistel
patent: 3845277 (1974-10-01), Voss et al.
patent: 3890601 (1975-06-01), Pietrolewicz
patent: 3906348 (1975-09-01), Willmott
patent: 3938091 (1976-02-01), Atalla et al.
patent: 4037201 (1977-07-01), Willmott
patent: 4064404 (1977-12-01), Willmott et al.
patent: RE29525 (1978-01-01), Willmott
patent: 4078152 (1978-03-01), Tuckerman, III
patent: 4138735 (1979-02-01), Allocca et al.
patent: 4178549 (1979-12-01), Ledenbach et al.
patent: 4195196 (1980-03-01), Feistel
patent: 4195200 (1980-03-01), Feistel
patent: 4196310 (1980-04-01), Forman et al.
patent: 4218738 (1980-08-01), Matyas et al.
patent: 4304962 (1981-12-01), Fracassi et al.
patent: 4305060 (1981-12-01), Apple et al.
patent: 4316055 (1982-02-01), Feistel
patent: 4326098 (1982-04-01), Bouricius et al.
patent: 4327444 (1982-04-01), Court
patent: 4328414 (1982-05-01), Atalla
patent: 4328540 (1982-05-01), Matsuoka et al.
patent: RE30957 (1982-06-01), Feistel
patent: 4380762 (1983-04-01), Capasso
patent: 4385296 (1983-05-01), Tsubaki et al.
patent: 4393269 (1983-07-01), Konheim et al.
patent: 4418333 (1983-11-01), Schwarzbach et al.
patent: 4426637 (1984-01-01), Apple et al.
patent: 4445712 (1984-05-01), Smagala-Romanoff
patent: 4447890 (1984-05-01), Duwel et al.
patent: 4454509 (1984-06-01), Buennagel et al.
patent: 4464651 (1984-08-01), Duhame
patent: 4471493 (1984-09-01), Schober
patent: 4491774 (1985-01-01), Schmitz
patent: 4509093 (1985-04-01), Stellberger
patent: 4529980 (1985-07-01), Liotine et al.
patent: 4535333 (1985-08-01), Twardowski
patent: 4574247 (1986-03-01), Jacob
patent: 4578530 (1986-03-01), Zeidler
patent: 4581606 (1986-04-01), Mallory
patent: 4590470 (1986-05-01), Koenig
patent: 4593155 (1986-06-01), Hawkins
patent: 4596898 (1986-06-01), Pemmaraju
patent: 4596985 (1986-06-01), Bongard et al.
patent: 4599489 (1986-07-01), Cargile
patent: 4602357 (1986-07-01), Yang et al.
patent: 4611198 (1986-09-01), Levinson et al.
patent: 4623887 (1986-11-01), Welle, II
patent: 4626848 (1986-12-01), Ehlers
patent: 4628315 (1986-12-01), Douglas
patent: 4630035 (1986-12-01), Stahl et al.
patent: 4633247 (1986-12-01), Hegeler
patent: 4638433 (1987-01-01), Schindler
patent: 4646080 (1987-02-01), Genest et al.
patent: 4652860 (1987-03-01), Weishaupt et al.
patent: 4670746 (1987-06-01), Taniguchi et al.
patent: 4686529 (1987-08-01), Kleefeldt
patent: 4695839 (1987-09-01), Barbu et al.
patent: 4703359 (1987-10-01), Rumbolt et al.
patent: 4710613 (1987-12-01), Shigenaga
patent: 4716301 (1987-12-01), Willmott et al.
patent: 4720860 (1988-01-01), Weiss
patent: 4723121 (1988-02-01), van den Boom et al.
patent: 4731575 (1988-03-01), Sloan
patent: 4737770 (1988-04-01), Brunius et al.
patent: 4740792 (1988-04-01), Sagey et al.
patent: 4750118 (1988-06-01), Heitschel et al.
patent: 4754255 (1988-06-01), Sanders et al.
patent: 4755792 (1988-07-01), Pezzolo et al.
patent: 4758835 (1988-07-01), Rathmann et al.
patent: 4761808 (1988-08-01), Howard
patent: 4779090 (1988-10-01), Micznik et al.
patent: 4794268 (1988-12-01), Nakano et al.
patent: 4794622 (1988-12-01), Isaacman et al.
patent: 4796181 (1989-01-01), Wiedemer
patent: 4799061 (1989-01-01), Abraham et al.
patent: 4800590 (1989-01-01), Vaughan
patent: 4802114 (1989-01-01), Sogame
patent: 6154544 (2000-11-01), Farris et al.
patent: 32 34 538 (1984-03-01), None
patent: 32 34 539 (1984-03-01), None
patent: 32 44 049 (1984-09-01), None
patent: 33 09 802 (1984-09-01), None
patent: 33 32 721 (1984-12-01), None
patent: 33 09 802 (1985-07-01), None
patent: 34 07 436 (1985-08-01), None
patent: 34 07 469 (1985-09-01), None
patent: 35 32 156 (1987-03-01), None
patent: 36 36 822 (1987-10-01), None
patent: 0 043 270 (1982-01-01), None
patent: 0 103 790 (1984-03-01), None
patent: 0 244 332 (1987-11-01), None
patent: 0 155 378 (1988-07-01), None
patent: 0 154 019 (1988-08-01), None
patent: 0 311 112 (1989-04-01), None
patent: 0 335 912 (1989-10-01), None
patent: 0 459 781 (1991-12-01), None
patent: 2 606 232 (1988-05-01), None
patent: 2 607 544 (1988-07-01), None
patent: 2 685 520 (1993-07-01), None
patent: 2 023 899 (1980-01-01), None
patent: 2 051 442 (1981-01-01), None
patent: 2 099 0195 (1982-12-01), None
patent: 2 118 614 (1983-11-01), None
patent: 2 131 992 (1984-06-01), None
patent: 2 133 073 (1984-07-01), None
patent: 2 184 774 (1987-07-01), None
patent: WO 93/20538 (1993-10-01), None
patent: WO 94/11829 (1994-05-01), None
patent: 90/4088 (1990-05-01), None
patent: 89 08 225 (1990-06-01), None
Abrams and Podell,Tutorial Computer and Network Security, District of Columbia: IEEE, (1987).
Abramson, Norman,The Aloha System—Another Alternative for Computer Communications, pp. 281-285, (University of Hawaii, 1970).
Access Transmitters—Access Security System, pp. 1-2, (Undated). http://www.webercreations.com/access/security.html.
Alexi, Werner, et al.RSA and Rabin Functions: Certain Parts Are As Hard As The Whole, pp. 194-209, Siam Computing, vol. 14, No. 2, (Apr. 1988).
Allianz: Allianz-Zentrum for Technik GmbH—Detailed Requirements for Fulfilling the Specification Profile for Electronically Coded OEM Immobilizers, Issue 22, (Jun. 1994 (Translation Jul. 5, 1994) ).
Anderson, Ross.Searching for the Optium Correlation Attack, pp. 136-143, Computer Laboratory, Pembroke Street, Cambridge CB2 3QG, (Undated).
Arazi, Benjamin.Vehicular Implementations of Public Key Cryptographic Techniques, pp. 646-653, IEEE Transactions on Vehicular Technology, vol. 40, No. 3, (Aug. 1991).
Baran, P.Security Secrecy and Tamper-free Communications, Distribution Communications, vol. 9, (Rand Corporation, 1964).
Barbaroux, Paul.Uniform Results in Polynomial-Time Security, pp. 297-306, Advances in Cryptology—Eurocrypt 92, (1992).
Bellovin, S. M.Security Problems in the TCP/IP Protocol Suite, pp. 32-49, Computer Communication Review, New Jersey, (Undated).
Beutelspacher, Albrecht.Perfect and Essentially Perfect Authentication Schemes, pp. 167-170, Advances in Cryptology-Eurocrypt 87, (Extended Abstract), Federal Republic of Germany, (Undated).
Bloch, Gilbert.Enigma Before Ultra Polish Work and The French Contribution, pp. 142-155, Cryptologia 11 (3), (Jul. 1987).
Brickell, Ernest F. and Stinson, Doug.Authentication Codes With Multiple Arbiters, pp. 51-55, Proceedings of Eurocrypt 88, (1988).
Bruwer, Frederick J.Die Toepassing Van Gekombineerde Konvolusiekodering en Modulasie op HF-Datakommuikasie, District of Pretoria in South Africa, (Jul. 1998).
Burger, Chris R.,Secure Learning RKE Systems Using KeeLoq® Encoders, TBOO1, pp. 1-7, 1996 Microchip Technology, Inc.
Burmeister, Mike. A Remark on the Efficiency of Identification Schemes, pp. 493-495, Advances in Cryptology—Eurocrypt 90, (1990).
Cerf, Vinton G. and Kahn, Robert E.A Protocol for Packet Network Intercommunication, pp. 637-648, Transactions on Communications, vol. Com-22, No. 5, (May 1974).
Cerf, Vinton G.Issues In Packet-Network Interconnection, pp. 1386-1408, Proceedings of the IEEE, 66(11), (Nov. 1978).
Conner, Doug.Cryptographic Techniques—Secure Your Wireless Designs, pp. 57-68, EDN (Design Feature), (Jan. 18, 1996).
Coppersmith, Don.Fast Evaluation of Logarithms in Fields of Characteristic Two, pp. 587-594, IEEE Transactions on Information Theory, IT-30 (4), (Jul. 1984).
Davies, Donald W.Tutorial: The Security of Data in Networks, pp. 13-

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Rolling code security system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Rolling code security system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Rolling code security system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3483176

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.