MXPA06001168A - Method and apparatus to facilitate transmission of ternary movable barrier operator information - Google Patents

Method and apparatus to facilitate transmission of ternary movable barrier operator information

Info

Publication number
MXPA06001168A
MXPA06001168A MXPA/A/2006/001168A MXPA06001168A MXPA06001168A MX PA06001168 A MXPA06001168 A MX PA06001168A MX PA06001168 A MXPA06001168 A MX PA06001168A MX PA06001168 A MXPA06001168 A MX PA06001168A
Authority
MX
Mexico
Prior art keywords
binary
data
ternary
bits
information
Prior art date
Application number
MXPA/A/2006/001168A
Other languages
Spanish (es)
Inventor
J Fitzgibbon James
Gregori Eric
Original Assignee
The Chamberlain Group Inc*
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by The Chamberlain Group Inc* filed Critical The Chamberlain Group Inc*
Publication of MXPA06001168A publication Critical patent/MXPA06001168A/en

Links

Abstract

Ternary data as corresponds to a movable barrier operator is provided ( 21 ) and converted ( 22 ) into corresponding binary information. In a preferred approach this comprises converting each ternary trit into a corresponding binary pair. Pursuant to a preferred approach binary bits as correspond to, for example, fixed and/or non-fixed information ( 32 and 33 ) are provided ( 31 ) and then converted ( 34 ) into the aforementioned ternary data.

Description

METHOD AND APPARATUS TO FACILITATE THE TRANSMISSION OF TERNARIA INFORMATION OF MOBILE BARRIER OPERATORS Technical Field This invention relates generally to movable barrier operators and, more particularly, to the transmission of information of movable barrier operators. BACKGROUND Movable barrier operators of various types are known in the art. These include operators that effect selective control and movement of single-panel and segmented garage doors, pivoting, rolling and oscillating fences, guard arms, rolling shutters, and various other movable barriers. In general, such movable barrier operators typically operate (at least in part) by responding to a remote source control signal. For example, an individual in a vehicle may manipulate a corresponding wireless remote control device to transmit an open command to a given movable barrier operator, thereby causing the latter to move a corresponding movable barrier to an open position. It is also known to effect communications between a movable barrier operator and various other elements such as, but not limited to, tied and untied control interfaces, displays, lighting modules, alarm systems, obstacle detectors, and so on. A known approach to supporting such communications makes use of ternary data. Although many data communications are based on binary data, ternary data has been used for at least some mobile barrier operator communications. However, it is not always convenient to facilitate the transmission and reception of true ternary data (that is, data that can have any of three different states). Problems may arise, for example, such as when a movable barrier operator is interfaced with a peripheral element that only communicates using standard serial equipment that is based on binary signaling. It is also known that encryption can be used to ensure a given data transmission. Unfortunately, many encryption techniques are relatively expensive to deploy. This can be prohibitive when considering the use of encryption in a highly price-sensitive context, such as that of mobile barrier operators and their peripherals. BRIEF DESCRIPTION OF THE DRAWINGS The above needs are at least partially met by the provision of the method and apparatus for facilitating the transmission of ternary information of movable barrier operators described in the following detailed description, particularly when studied in conjunction with the drawings, where : Figure 1 comprises a ternary coding sketch of the state of the art; Figure 2 comprises a flow chart as configured according to various embodiments of the invention; Figure 3 comprises a flow chart as configured in accordance with various embodiments of the invention; Figure 4 comprises a mapping table as configured according to various embodiments of the invention; Figure 5 comprises a schematic view of a data frame as configured according to various embodiments of the invention; Figure 6 comprises a data box flow chart as configured according to various embodiments of the invention; Figure 7 comprises a data box flow chart as configured according to various embodiments of the invention; Figure 8 comprises a data box flow chart as configured according to various embodiments of the invention; and Figure 9 comprises a block diagram as configured in accordance with various embodiments of the invention. Those skilled in the art will appreciate that elements are illustrated in the figures for purposes of simplicity and clarity and that they are not necessarily drawn to scale. For example, the dimensions and / or the relative placement of some of the elements of the figures can be exaggerated in relation to the other elements to help improve the compression of various embodiments of the present invention. Also, common but well-understood elements that are useful or necessary in a commercially feasible embodiment are often not sketched in order to facilitate a less obstructed view of these various embodiments of the present invention. It will also be understood that the terms and expressions used herein have the ordinary meaning given to such terms and expressions with respect to their respective, corresponding interrogation and study areas, except where otherwise indicated herein. specific. Detailed Description In general terms, according to these various embodiments, the ternary data as it corresponds to a movable barrier operator are provided and converted to a binary format. The binary information is then transmitted to or from a movable barrier operator. As shown in more detail later, this process can achieve an encryption effect while also serving to ensure compatible use of peripheral binary platforms. In a preferred approach, converting the ternary data to a binary format comprises mapping each trit of the ternary data into a corresponding pair of binary bits. A pair of binary bits can represent four discrete information elements and in a preferred approach, three of these discrete information elements correspond, each, to one of the three states / levels of trit and the fourth element of discrete information (which of another way comprises an illegal value) serves as a synchrony function. Thus configured, different ternary values encoded in a given field can represent a particular corresponding size of carrier content as it is being exchanged between a movable barrier operator and a given peripheral and / or the update of rolling code information. The carrier content may comprise, for example, non-fixed information that corresponds in some way to the movable barrier operator. It is also possible, and it is actually preferred, to combine such non-fixed information with fixed information (such as, but not limited to, fixed information such as identification information for the movable barrier operator and / or the peripheral platform). It is also possible to combine one or more of the above data elements with rolling code bits (where the rolling code itself comprises the same rolling code that is otherwise used by the movable barrier operator to authenticate incoming communications and / or sources of information. communications). In fact, and as will be disclosed later in greater detail, the incorporation of rolling code information may also serve as an encryption function. These and other benefits can be made clearer by conducting a thorough review and study of the following detailed description. Referring now to the drawings, and in particular to Figure 1, it may be useful to first describe in greater detail a typical ternary data protocol, as it is often deployed in conjunction with many movable barrier operators. In accordance with the illustrated approach, pulses of similar amplitude have one of three different durations. For example, a first pulse 10, which has the shortest duration, may represent the data element "0". A second pulse 11, which has a length of average length, may represent the data element or state "1". And a third pulse 12, which has the longest duration, may represent the data element or state "2". Such a data mapping protocol serves well to perform a data exchange based on base three. As will be disclosed in more detail below, these teachings use and leverage a ternary approach to perform relatively safe and compatible coraunications between movable barrier operators and corresponding peripheral components of choice. However, in general, these teachings evade the specific ternary approach just described. Referring now to Figure 2, in general, these teachings provide a process 20 that itself provides ternary data as befits a movable barrier operator and then converts that ternary data into a binary format to provide resulting binary information. This binary information is then transmitted 23 from one platform to another. As will be shown later, this process of ternary to binary conversion serves, at least in part, as a type of encryption process that in turn helps to ensure the authenticity and accuracy of the information that is being transmitted. The ternary data themselves may comprise, at least in part, bearer data. More particularly, and referring momentarily to Figure 3, according to a preferred (though optional) approach, the provision of ternary data may comprise the prior provision 31 of binary bits comprising information corresponding to the movable barrier operator ( for example, information set originated by, or intended for, a mobile barrier operator). Such information may optionally comprise, for example, fixed information of movable barrier operator 32 such as identification information for a particular movable barrier operator, a particular peripheral component, or the like. Such information may also optionally comprise (in addition to or instead of the fixed information 32) non-fixed information 33 as corresponds again to the movable barrier operator. This non-fixed information 33 may comprise bearer / information data (such as, but not limited to, platform status information, commands, ratifications, and so forth). As will be shown below, this non-fixed information 33 may also comprise varying amounts of data, if desired. These binary bits are then converted 34 preferably into the aforementioned ternary data. This may comprise, in an appropriate platform, a conversion of the binary data into ternary data as described above with respect to Figure 1. In general, such an approach does not need to be used. Instead, the binary data can be converted into a binary bit format (an illustrative example being provided below). As mentioned before, these teachings contemplate converting such ternary data into binary information. However, in a preferred approach, this does not comprise a simple inversion of the ternary binary process just described. Instead, the ternary to binary conversion step comprises, in a preferred approach, mapping each trit of the ternary data to a pair of corresponding binary bits.
To illustrate, and referring momentarily to Figure 4, the ternary data element "0" (corresponding to the usual binary data element "0") maps to the binary pair "01". In a similar way, ternary "1" (which corresponds to the usual binary "1") maps the binary pair "10" and "2" ternary (which corresponds to the usual binary "11") maps to the binary pair "11". This leaves a binary pair "00" otherwise unused. In accordance with a preferred approach, this otherwise illegal value can serve as a synchronization function when communications are facilitated such as between a movable barrier operator and one or more peripheral components when a binary format is used that otherwise does not have a Synchronized mechanism interconstructed in its format (for example, a stream of binary bits such as: 011011111110100111011101101111111010011101110110111111101001110111 which format lacks a frame marker or other synchronization point). To illustrate, a synchrony / marker signal comprising this binary pair "00" can be used to indicate, for example, the regular end and / or start of a frame or message as in the following example: 0001101111110100101110110001101111111010011101110011011011111111010011 where the binary pairs spaced regularly with the bold font "00" serve as box markers (and which, due to their regular synchronized spacing, are easily distinguishable from other "00" pairs as may occur for any reason (outlined illustratively in FIG. previous example with a cursive source.) Those skilled in the art will appreciate that this process of converting binary information into ternary information, followed by conversion of that ternary information into corresponding binary pairs, yields, in most cases, a different sequence of bits (and even a different number of bits) compared to the initial binary information. This difference serves, at least in part, a non-key encryption technique and thus provides an added security element with respect to the data being transmitted. As mentioned before, and as will be described in more detail below, message loads of different sizes can be accommodated by these teachings. In accordance with a preferred approach, for example, at least two charges of different size can be accommodated. However, it is useful to provide a specific indication in a transmitted message regarding what dimensioned load is being transmitted. By this preferred approach, and now referring to Figure 5, a frame 50 of fixed data otherwise comprising, in this illustrative example, a first field 51 of fixed bits and a second field 52 of fixed bits (where these fixed bits correspond, for example, to non-changing information such as information identifying the source and / or target) also comprise a ternary value "X" 53 (preferably comprising a corresponding binary pair as per the mapping convention described above). A first particular ternary value 53 may correspond to and otherwise indicate the provision of carrier content having a first size while a second ternary value 53 may correspond to and otherwise indicate the provision of carrier content having a second different size. For example, the second value may indicate a carrier content smaller than that of the first value. The third possible ternary state / value can correspond to a third size of bearer content if desired. In a preferred approach, however, and as will be described below in greater detail, the available third ternary level can be used to identify a rolling code update (for the rolling code that is otherwise employed by the movable barrier operator in ordinary course of operation). Thus configured, ternary data as ordinarily used by and with a movable barrier operator can be supported in a binary context, with which performing operation compatible with non-ternary signal trajectories and / or peripheral platforms. The ternary nature of the source data may also be weighted to help characterize a given communication with respect to the size and / or nature of its payload and / or to provide another header related to systems such as synchronization. In addition, express processes, as a beneficial side effect, can contribute to the security of the resulting transmissions. This security can be improved through appropriate data manipulation and also through the incorporation of the rolling code mechanism as typically employed by the movable barrier operator to authenticate incoming signal sources. Referring now to Figure 6, some specific exemplary illustrative examples will now be provided. In this first illustrative example, a peripheral component (such as, but not limited to, an intrusion detection alarm system) has a 15bit (binary) payload 60 to communicate to a movable barrier operator. This payload comprises, in this example, non-fixed data that can and will vary in content with necessity and circumstance. A box / source / address header 61 comprises 4 data trits (since the participating platform is, probably by definition, a non-ternary base platform), these trits each preferably comprise a binary pair counterpart as per mapping convention previously disclosed. A fixed code frame 50 as disclosed above (comprising, in this example, a fixed code field of 15 bits, a fixed code field of 14 bits, and a field of 1 trit of characterization 53) serves to contain, in this example, a fixed identifier for the peripheral component itself (such as an identifier code assigned to the manufacturer or installer) that helps the movable barrier operator identify the peripheral component and distinguish its communications from those of other devices and sources. In this example, the field of 1 trit characterization 53 has a trit value of "0" which in this example means the 15 bit size of the data payload 60 described above. This field, upon receipt, can assist the movable barrier operator with respect to recovering that payload 60. The contents of the header 61 and the fixed code box 50 are manipulated and processed in relation to a back end process described above. ahead. First, however, it should be beneficial to first describe a front-end data manipulation process as it corresponds to the data payload 60 itself. The 32-bit rolling code value (in this example) present as used by the operator Movable barrier is increased by a value of "3" to provide an increased rolling code value 63. In many instances the peripheral component will already have a correct rolling code value (or otherwise useful) by means well understood in the art and not requiring further elaboration herein. In other cases, where substantial rolling code synchrony has been lost for any reason, the peripheral device may receive an update according to the rolling code of, for example, the movable barrier itself (a technique for effecting such an update as per these teachings). is further expressed later in this description). The 15 bits of the data payload 60 are then combined via concatenation with the lower 16 bits 64 (ie, the least significant bits) of the rolling code value 63 increased. The 15 bits of the data payload 60 are then given an exclusive OR function with 15 bits of the lower 16 bits 64 and the resulting value is then increased by "1" to produce a result obtained by exclusive 15-bit OR function 65. In this exemplary approach, this completes the front end data manipulation process that prepares the payload data 60 for manipulations of the back end process 62. Returning now to the back end process 62, the result obtained by exclusive OR function 65 is inverted or mirrored with respect to the lower 16 bits of the rolling code 64 increased to provide a series of reverse ordered bits 62C. These binary bits are then converted to a ternary form 62D (i.e., from a base two representation to a base three representation). For example, by way of illustration, the value "9" (in base ten) would appear in binary format as "1001". This binary number, once converted to a ternary form, would appear as "100". In general, however, the peripheral component will not be able to literally calculate or process using a ternary data system. Therefore, in a preferred approach, these ternary trits are each mapped to a corresponding binary pair as described above to provide trits encoded by binary pair 62E. To complete this example, then, the original ternary value "100" would be expressed as three binary pairs "10 01 01". Thus it can be seen that the original binary value "1001" becomes the binary expression "100101". Those skilled in the art will understand and appreciate that this conversion process therefore provides a supplementary benefit of effectively encrypting the original binary expression as an encoded expression. It will be further appreciated that the incorporation of the rolling code value as described above adds an additional element of variability and therefore also serves as a purpose of encryption type as well (with the exclusive OR application)., concatenation, and reverse bit ordering also contributing, at least in part, to the encoded / encrypted result). With reference again to the fixed code frame 50 described above, the binary data as they comprise the fixed code frame 50 are similarly converted to a ternary system and in particular are converted to coded trits to corresponding binary pair 62A. These binary-coded trits 62A as they comprise the above-mentioned fixed code information are then modified in conjunction with the binary-coded trits 62E as they represent the non-fixed code information modified by rolling code. The precise nature of this modification may vary with the needs of a given set and / or the preferences of the designer. With respect to one approach, this modification comprises combining the trits, on a trit to trit basis, of the coded trits to binary pair 62A as they represent the non-fixed code information with the trits encoded to binary pair 62E as they represent the information of fixed code and then retaining the least significant bit of the resulting combination. For example, the twentieth bit of the fixed code information is added to the twentieth bit of the non-fixed code information and the least significant bit of the resulting sum is then retained as the modified result 62B. Preferably this modification occurs with respect to both the 15-bit fixed code field information 51 and the 14-bit fixed code field information 52 (in combination with the characterization field 53). The binary-coded trits 62B modified by resulting fixed code information are then interleaved with the binary-coded trits 62E modified by non-fixed code information to provide a set of 40 interleaved trits encoded to binary pair 62G. These are then preferably combined with the original header 61 to provide a resultant message 62H comprising, in this example, 44 trits that are encoded as 44 binary pairs (i.e., 88 binary bits). The above process allows up to 15 bits of non-fixed data to be coded and communicated to or from a mobile barrier operator using concepts, forces, and familiar resources (such as maintenance and use of ternary data and rolling code) of the movable barrier operator . Referring now to Figure 7, if desired, a reduced data capacity can also be accommodated. In the example shown, the non-fixed code field 70 will accommodate 7 data bits. Here, during the front end processing of the non-fixed information, these 7 non-fixed code bits 70 are effectively filled with 8 following bits of the rolling code value 63 incremented by 3 (ie, the next 8 bits as follows the first 16 bits 64 as already applied for concatenation to non-fixed code information 70). The resulting 15 bits then again are given an exclusive OR function with the lower 16 bits of the rolling code value 64 incremented and concatenated as "1" as described above. The back end process 62 is then executed as described above. If desired, the characterization trit 53 in the fixed code information 50 may have a value or state corresponding to ae indicates that the non-fixed code size comprises the amount of 7 bits instead of the 15 bit quantity provided above with with respect to Figure 6. This in turn will allow a receiving platform to make sure whether the resulting message contains 7 bits of non-fixed information or 15 bits of non-fixed information and therefore whether to reverse the front end process accordingly to one or the other. These described processes assume that the coding platform has a precise value for the present rolling code. It is possible, for a variety of reasons, that this may not always be the case. In some cases, the source platform may be able to independently assert that its present value for the rolling code is not synchronized or is otherwise inaccurate. In other cases, the source platform may be able to deduce this situation by having its message rejected by the receiving platform. In such a case it may be useful and / or desirable to provide a mechanism with which a platform can be provided with an updated rolling code value in order to re-establish its rolling code synchrony. Referring now to Figure 8, the processes described above can be modified to accommodate a message that essentially serves to transmit a present rolling code value. With respect to this approach, a rolling code value 63 present (increased again by the value "3" in this illustrative embodiment) is subject to the above described endpoint process without prior combination with any user data. The characterization field 53 can again be set to a value, this time a value indicating that the resulting message comprises the rolling code value (increased by "3") and does not contain other non-fixed code information. The processes described above are suitable for implementation through any number of currently known platforms and no doubt other platforms will be developed later. Generally speaking, and with reference now to Figure 9, a suitable enabling apparatus 90 (such as, but not limited to, a movable barrier operator or a device communicating with a movable barrier operator) preferably has at least minus a first memory 91 containing the ternary data to be transmitted as between a movable barrier operator and a peripheral device. A ternary to binary converter 92 is operatively coupled to this first memory 91 and serves to convert the ternary data into corresponding binary data. More particularly, and with respect to a preferred approach as expressed above, the ternary data comprises a binary expression of ternary data which the ternary to binary converter 92 then converts to corresponding binary pairs. A transmitter 93 receives this converted information and transmits the information to a given recipient (those skilled in the art will recognize that this transmitter 93 may use a wired / wired path (such as an electrical conductor or fiber optic) or a wireless path (such as as a radio frequency carrier, an optical free space carrier, an ultrasonic carrier, and so on.) The ternary data contained in the first memory 91 can originate in several ways.An optional but preferred approach begins, in part, with the provision of a user data memory 94B containing non-fixed binary user data and a rolling code memory 94C having rolling code data stored therein (such as a rolling code value present as increases by "3"). Data from these two memories 94B and 94C are input to an exclusive OR operator 95 that provides its output to a concatenator 96. This concatenator 96 is also operatively coupled to receive, in this illustrative embodiment, rolling code data from of rolling code memory 94C. Thus configured, the concatenator 96 serves to concatenate the output of the exclusive OR operator 95 with rolling code data. A reverse bit computer 97 is operatively coupled to the concatenator 96 and serves to reverse the order of the concatenated output of the concatenator 96. The output of this reverse bit computer 97 is then operatively coupled to a ternary binary 98 converter. which serves to convert the binary data to ternary data expressed in binary as described above. In this illustrated embodiment, an interleaver 99 is coupled to the ternary binary converter 98 and a fixed code information source 94A and interleaves incoming data streams from these two sources (if desired, the fixed code information may develop as described above). The interleaved data output of the interleaver 99 then couples to the first memory 91. Thus configured and arranged, the interleaved data of the interleaver 99 may comprise the ternary data which is then provided by the first memory 91 to the binary ternary to binary converter 92 described previously . Thus configured, the native ability of a movable barrier operator to process ternary data, together with the maintenance and use of a rolling code, is effectively weighted and used to facilitate relatively secure communications such as between such a movable barrier operator and one or more components / peripheral devices. Those skilled in the art will recognize that the blocks described above can be implemented using corresponding discrete physical elements and / or through the use of a partially or fully programmable platform. As many movable barrier operators comprise a programmable controller, in many cases it will probably be preferred simply to program the controller according to the teachings. Those skilled in the art will recognize that a wide variety of modifications, alterations, and combinations can be made with respect to the embodiments described above without departing from the spirit and scope of the invention, and that such modifications, alterations, and combinations should be observed. as being within the scope of the inventive concept.

Claims (26)

  1. CLAIMS 1. A method comprising: providing ternary data according to a mobile barrier operator; convert ternary data to a binary format to provide binary information; transmit the binary information.
  2. 2. The method of claim 1, wherein converting the ternary data to a binary format further comprises mapping each trit of the ternary data to a corresponding pair of binary bits.
  3. 3. The method of claim 2, wherein transmitting the binary information further comprises transmitting binary bit pairs, wherein each of the binary bit pairs potentially represents one of: a particular ternary value; an illegal value.
  4. 4. The method of claim 3, wherein the illegal value serves a synchrony function.
  5. The method of claim 4, wherein: a first particular ternary value for the particular ternary value corresponds to carrier content having a first size; a second particular ternary value for the particular ternary value corresponds to carrier content having a second size, the second size is different from the first size; a third particular ternary value for the particular ternary value corresponds to updating a rolling code as employed by the movable barrier operator.
  6. The method of claim 1, wherein providing ternary data further comprises: providing binary bits comprising information corresponding to the movable barrier operator; convert binary bits into ternary data.
  7. The method of claim 6, wherein providing binary bits comprising information corresponding to the movable barrier operator further comprises providing binary bits as correspond, at least in part, to fixed information corresponding to the movable barrier operator.
  8. The method of claim 7, wherein the fixed information comprises identification information.
  9. The method of claim 8, wherein providing binary bits as comprising information corresponding to the movable barrier operator further comprises providing binary bits as corresponds, at least in part, to non-fixed information corresponding to the movable barrier operator.
  10. The method of claim 6, wherein providing ternary data further comprises: combining at least some of the binary bits with rolling code bits.
  11. The method of claim 10, wherein combining at least some of the binary bits with rolling code bits further comprises: applying the exclusive OR function to the binary bits with the rolling code bits to provide encrypted bits; concatenate the bits encrypted with the rolling code bits to provide resulting bits; reverse order the resulting bits to provide bits sorted in reverse; and where to convert the binary bits into ternary data further comprises: converting the bits ordered in reverse into the ternary data.
  12. The method of claim 11, and further comprising: interlacing the ternary data with other ternary data prior to providing interlaced ternary data; and where to convert the ternary data to a binary format to provide binary information further comprises: converting the intertwined ternary data to the binary format to provide the binary information.
  13. The method of claim 12, wherein interlinking the ternary data with other ternary data further comprises: providing additional binary bits comprising information corresponding to the movable barrier operator; converting the additional binary bits comprising information corresponding to the movable barrier operator into intermediate ternary data; modify the intermediate ternary data using rolling code information to provide the other ternary data.
  14. The method of claim 13, wherein modifying the intermediate ternary data using rolling code information further comprises: modifying the intermediate ternary data using the ternary data.
  15. The method of claim 14, wherein modifying the intermediate ternary data using the ternary data further comprises: combining each trit of intermediate ternary data with a corresponding trit of the ternary data to provide a resulting multi-trit value; select a particular trit of each resulting multi-trit value to understand the other ternary data.
  16. The method of claim 15, wherein selecting a particular trit of each resulting multi-trit value further comprises selecting a less significant trit of each resulting multi-trit value.
  17. 17. The method of claim 1, wherein transmitting the binary information comprises transmitting the binary information to at least one of: a movable barrier operator, - an alarm system; a sensor.
  18. 18. A method for facilitating a communication such as between a movable barrier operator and a peripheral device, comprising: providing data to be transmitted, where the data comprise, at least in part, ternary data; encrypt the data, at least in part, by converting at least some of the ternary data to corresponding binary data; transmit the corresponding binary data.
  19. 19. The method of claim 18, wherein encrypting the data further comprises converting at least some trits as they comprise the ternary data into corresponding binary pairs, such that each trit thus converted is represented by a corresponding binary pair.
  20. 20. The method of claim 18, wherein providing data to be transmitted, wherein the data comprises, at least in part, ternary data, further comprising: providing initial data to be transmitted, where the initial data comprise, at least in part, initial binary data; provide rolling code bits; applying the exclusive OR function to at least some bits of the initial binary data with at least some of the rolling code bits to provide a resulting set of bits; reverse ordering the resulting bit set to provide bits sorted in reverse; convert the bits ordered in reverse to corresponding ternary data to provide the ternary data.
  21. The method of claim 20, wherein providing initial data to be transmitted, wherein the initial data comprises, at least in part, initial binary data, further comprises providing initial data that selectively comprises any of the 15 binary bits and 7 binary bits .
  22. 22. An apparatus comprising at least one of a movable barrier operator and a device communicating with a movable barrier operator, comprising: a first memory having ternary data to be transmitted as between the movable barrier operator and the device which communicates with a movable barrier operator; a ternary to binary converter being operatively coupled to the first memory and having a binary data output; a transmitter operatively coupled to the binary data output.
  23. The apparatus of claim 22, and further comprising: a user data memory having binary user data stored therein; a rolling code memory having rolling code data stored therein; an exclusive OR function having inputs operatively coupled to the user data memory and the rolling code memory; a concatenator being operatively coupled to an output of the exclusive OR function and the rolling code memory; a reverse bit computer being operatively coupled to an output of the concatenator; a binary to ternary converter having an input operatively coupled to an output of the reverse bit computer and having an output operatively coupled to an input of the first memory.
  24. 24. The apparatus of claim 23, wherein the binary data output of the ternary to binary converter comprises a binary pair data output.
  25. 25. The apparatus of claim 24, wherein the ternary to binary convert comprises means for converting at least some trits of the ternary data to corresponding binary pairs, such that each such trit is represented by a corresponding binary pair.
  26. 26. The apparatus of claim 23, and further comprising interlacing means for interleaving trits as they leave the binary to ternary converter with fixed code information as it corresponds to the apparatus to provide trits as they are input to the ternary to binary converter.
MXPA/A/2006/001168A 2005-01-27 2006-01-27 Method and apparatus to facilitate transmission of ternary movable barrier operator information MXPA06001168A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11044411 2005-01-27

Publications (1)

Publication Number Publication Date
MXPA06001168A true MXPA06001168A (en) 2007-04-20

Family

ID=

Similar Documents

Publication Publication Date Title
CA2533771C (en) Method and apparatus to facilitate transmission of ternary movable barrier operator information
US11799648B2 (en) Method and apparatus to facilitate transmission of an encrypted rolling code
DE60138747D1 (en) A transmission apparatus having a radio connection control layer in a radio communication system and a corresponding data transmission method
CA2610498A1 (en) Traffic preemption system communication method
WO2005024568A3 (en) Trusted interface unit (tiu) and method of making and using the same
JP6906498B2 (en) Message transmission and reception methods and devices
WO2017057165A1 (en) Vehicle communication system
KR20140047112A (en) Data selection method for reducing the decoding computational complexity of a vehicle-to-x communication system, and vehicle-to-x communication system
CA2594385A1 (en) Apparatus and method for ciphering/deciphering a signal in a communication system
JP2006262457A (en) Control frame, system for controlling actuator, and command receiver
CN103327030A (en) Method for information transmission by utilizing Wi-Fi (Wireless-Fidelity) message length
JP2006050526A5 (en)
GB2481532A (en) Applying encrypted rolling code to wired communication links, preferably for garage door openers
KR101705639B1 (en) Method for transmitting and receiving a message in a vehicle network system
MXPA06001168A (en) Method and apparatus to facilitate transmission of ternary movable barrier operator information
EP2321812B1 (en) Method and apparatus for multiple bit encoding
AU2002248065B2 (en) Apparatus and method for setting communication packet
KR101558976B1 (en) System and method for transmitting and receiving data using ethernet network
US20230336341A1 (en) Method and apparatus to facilitate transmission of an encrypted rolling code
JPH11261551A (en) Method for securing information transmission via open communication network
KR102078903B1 (en) reliable data checking method of wireless encrypted communication
CN115038066A (en) Data transmission method, data transmission device, related equipment and storage medium
CN115209366A (en) Method and transmission device for mobile radio transmission of measurement data
JP2018506220A5 (en)
KR20070008121A (en) Method for managing a signal of a remote controlled device