(19)
(11) EP 0 970 287 B9

(12) CORRECTED EUROPEAN PATENT SPECIFICATION
Note: Bibliography reflects the latest situation

(15) Correction information:
Corrected version no 1 (W1 B1)
Corrections, see

(48) Corrigendum issued on:
20.08.2003 Bulletin 2003/34

(45) Mention of the grant of the patent:
16.04.2003 Bulletin 2003/16

(21) Application number: 97954568.8

(22) Date of filing: 04.12.1997
(51) International Patent Classification (IPC)7E05B 49/00
(86) International application number:
PCT/US9723/148
(87) International publication number:
WO 9802/7300 (25.06.1998 Gazette 1998/25)

(54)

AUTOMATIC RESYNCHRONIZATION FOR REMOTE KEYLESS ENTRY SYSTEMS

AUTOMATISCHE RESYNCHRONISATION FÜR FERNBEDIENBARE SCHLÜSSELLOSE EINGANGSYSTEME

RESYNCHRONISATION AUTOMATIQUE POUR SYSTEMES D'ENTREE A DISTANCE SANS CLE


(84) Designated Contracting States:
DE FR

(30) Priority: 16.12.1996 US 766071

(43) Date of publication of application:
12.01.2000 Bulletin 2000/02

(73) Proprietor: Lear Automotive Dearborn, Inc.
Dearborn, Michigan 48126 (US)

(72) Inventors:
  • FELDMAN, Andrea, M.
    Farmington Hills, MI 48335 (US)
  • SETTLES, Steven, R.
    Sterling Heights, MI 48314 (US)

(74) Representative: Archer, Philip Bruce et al
Urquhart-Dykes & Lord European Patent Attorneys New Priestgate House 57 Priestgate
Peterborough Cambridgeshire PE1 1JX
Peterborough Cambridgeshire PE1 1JX (GB)


(56) References cited: : 
WO-A-95/12940
GB-A- 2 276 023
GB-A- 2 133 073
US-A- 5 369 706
   
       
    Note: Within nine months from the publication of the mention of the grant of the European patent, any person may give notice to the European Patent Office of opposition to the European patent granted. Notice of opposition shall be filed in a written reasoned statement. It shall not be deemed to have been filed until the opposition fee has been paid. (Art. 99(1) European Patent Convention).


    Description

    FIELD OF THE INVENTION



    [0001] This invention relates to secure systems, generally, and more particularly a remote keyless entry encryption algorithm.

    BACKGROUND OF THE INVENTION



    [0002] In the automotive industry, remote keyless entry ("RKE") systems have become standard equipment on many new vehicles. Comprising a receiver within the car and a number of fob transmitters for transmitting a message to the receiver, RKE systems enable users to control several vehicle functions remotely, such as the door locks and trunk, for example.

    [0003] In providing remote control to vehicle functions, a problem arises as to restricting remote access to the automobile's owners and other authorized users. To prevent unauthorized access, an identification system is incorporated with a security code or codes within both the fob transmitter and receiver. The receiver receives a transmitted signal having a command and an identification or security code and compares the received code with the security code stored in its memory. If the receiver determines the received security code to match the stored code, the command is initiated for execution.

    [0004] As the demand for RKE systems has evolved in the marketplace, greater emphasis has been placed on increased security, reliability and flexibility. With the development of sophisticated electronics, presently, a transmitted message may be decoded and retransmitted at a later time. This is in part because in these known systems the transmitted message does not change between transmissions.

    [0005] One area of focus has been the incorporation of encryption techniques into RKE system to decrease the likelihood of unauthorized reception and retransmission of the originally transmitted signal comprising both a command and a security code. Security by encryption may be accomplished using an algorithm in the transmitter for manipulating data into random or "rolling" codes. As a result of such an encryption algorithm, each code transmitted will be different from the last, making it difficult for the code to be copied and the vehicle security defeated.

    [0006] However, in utilizing an encryption scheme, it is also necessary that the transmitter and receiver remain in synchronization with each other. If the transmitter and receiver are asynchronized, the transmitted command residing within an encrypted message will not be initiated by the receiver. A resultant rolling code, as calculated by the receiver and transmitter utilizing such an encryption scheme, must be equivalent to initiate a received command.

    [0007] The issue of synchronization is of particular relevance in certain circumstances. First, if a user inadvertently enables the transmission of a rolling code encrypted command while the transmitter is out of range, the transmitter will be at least one encryption step ahead of the receiver. Further, should either transmitter or receiver suffer a power loss, the unaffected component will be at least one encryption step ahead of the receiver. Moreover, the system may be asynchronized if the user uses an alternate transmitter. This situation arises in the event several transmitters are supplied with a single receiver or if one transmitter is damaged and a replacement transmitter is supplied.

    [0008] Therefore, there is a demand for a method and system for resynchronizing a transmitter that is asynchronized with a receiver generally. Moreover, a need further exists for an RKE system utilizing such a method and system for resynchronizing an asynchronized RKE transmitter with an RKE receiver.

    [0009] Prior art document WO-A-95 129 40 discloces resynchronisation by issuing now security codes if the transmitted code and the code stored in the receiver do not match.

    SUMMARY OF THE INVENTION



    [0010] In order to achieve the advantages of the present invention, a method of resynchronizing a remote keyless entry receiver having received a new encrypted message transmitted by the transmitter which does not match a previous encrypted massage, also transmitted by the transmitter, and stored in memory is disclosed. The method comprises a first step of transmitting and receiving a first new follow up encrypted message. Subsequently, the received new encrypted message is re-encrypted, and that result is tested against the received first new follow up encrypted message to determine whether there is a match. In the event both match, a second new follow up encrypted message is transmitted and received. At this point, the received re-encrypted new encrypted message is re-encrypted a second time, and that result is tested against the received second new follow up encrypted message to determine whether there is a further match. If a match is made, the received second new follow up encrypted message is decrypted and the command within the received and decrypted second new follow up encrypted message is initiated.

    [0011] In a further embodiment of the present invention, a system is disclosed for resynchronizing a receiver with a transmitter if the receiver and the transmitter are asynchronized. The system comprises a first memory device for storing an old encrypted message transmitted by the transmitter and received by the receiver, as well as a second memory device for storing a new encrypted message transmitted by the transmitter and received by the receiver. The system further comprises a microcomputer for re-encrypting the old encrypted message, and for testing whether the re-encrypted old message matches the new message. If the new message matches the re-encrypted old message, the microcomputer decrypts the new message and initiates a command within the decrypted new message. If, however, the new message does not match the re-encrypted old message, the microcomputer re-encrypts the re-encrypted old message, and decrements a counter each time the re-encrypted old message is re-encrypted. While the counter exceeds a count number, the microcomputer tests whether the new message matches the re-encrypted old message. Where a match is made, the new message is decrypted and the command within the decrypted new message is initiated by the microcomputer.

    [0012] On the other hand, if the new message does not match the re-encrypted old message and the counter exceeds the count number, the steps of re-encrypting the re-encrypted old message, decrementing the counter, and testing whether the new message matches the re-encrypted old message are repeated. However, if the counter does not exceed the count number, the microcomputer receives a first new follow up encrypted message transmitted by the transmitter, re-encrypting the new message, and tests whether the first new follow up message matches the re-encrypted new message. In the event that the first new follow up message matches the re-encrypted new message, the microcomputer receives a further new follow up encrypted message transmitted by the transmitter, re-encrypts the re-encrypted new message, and tests whether the further new follow up message matches the twice re-encrypted new message. Should the further new follow up message match the twice re-encrypted new message, the microcomputer decrypts the further new follow up message and initiates the command within the further new follow up message.

    [0013] These and other advantages and objects will become apparent to those skilled in the art from the following detailed description read in conjunction with the appended claims and the drawings attached hereto.

    BRIEF DESCRIPTION OF THE DRAWINGS



    [0014] The present invention will be better understood from reading the following description of non-limitative embodiments, with reference to the attached drawings, wherein below:

    Figure 1 illustrates a flow chart of a first embodiment of the present invention; and

    Figure 2 illustrates a block diagram of a second embodiment of the present invention.



    [0015] It should be emphasized that the drawings of the instant application are not to scale but are merely schematic representations and are not intended to portray the specific parameters or the structural details of the invention, which can be determined by one of skill in the art by examination of the information herein.

    DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT



    [0016] Referring to Figure 1, a flow chart of a method of resynchronizing a transmitter with a receiver if the both are not properly synchronized. Upon initiating the algorithm (START 10), the receiver receives a encrypted message, labeled "previous message", from the transmitter (PREVIOUS MESSAGE RECEIVED 15). At this point the operation of the RKE system, both transmitter and receiver are synchronized. At a later time, a new encrypted message transmitted by the transmitter is received by the receiver (NEW MESSAGE RECEIVED 20).

    [0017] To determine whether the RKE system is synchronized properly, the step of re-encrypting the previous message is performed (RE-ENCRYPT PREVIOUS MESSAGE 25). So long as the encryption algorithm is deterministic, the next encrypted value of the previous message will equal the subsequently received new message if both transmitter and receiver are synchronized. As such, the method test whether the re-encrypted previously received message matches the just received new message (TEST 30). In the event that a match is made, the RKE system deems that both transmitter and receiver are synchronized. As a result, the new message is decrypted (DECRYPT MESSAGE 85), the command residing within the most recently received message, in this case the new message, is initiated (INITIATE COMMAND 90), and the algorithm complete (STOP 95).

    [0018] On the other hand, if the re-encrypted previously received message does not match the just received new message, the method performs a preliminary check to see if the recently received new message is authentic. Here, the already re-encrypted previous message is re-encrypted once again (RE-ENCRYPT RE-ENCRYPTED PREVIOUS MESSAGE 35). Subsequently, a count number within a counter is decremented by one (DECREMENT COUNTER 50). In the preferred embodiment of the present invention, the count number is preset to 256, though it should be apparent that other numbers may be substituted therefor.

    [0019] Upon decrementing the counter, the process subsequently tests whether the count number has reached zero (TEST 45). If the count number does not equal zero, the control of the algorithm is returned to the step of determining whether the re-encrypted previously received message matches the just received new message (TEST 30). This loop is executed in an attempt to test whether the transmitter is authentic, as well as to ascertain whether the new transmitted message falls within a window of encrypted results. Thus, the method examines whether the recently received message as transmitted by the transmitter is encrypted a certain number, or count number, of times ahead of the previously received message in the receiver.

    [0020] As such, the method, once again, if a match is made, the new message is decrypted (DECRYPT MESSAGE 85), the command residing within the more recently received message, in this case the new message, is initiated (INITIATE COMMAND 90), and the algorithm completed (STOP 95). In contrast, if a match is not made, the already twice re-encrypted previous message is re-encrypted once again (RE-ENCRYPT RE-ENCRYPTED PREVIOUS MESSAGE 35), and the count number within the counter is decremented by one (DECREMENT COUNTER 50) and a test is performed to determine whether the count number has reached zero (TEST 45). It should be apparent to one of ordinary skill in the art, as a result of this configuration, the algorithm performs this loop in the proper circumstances a maximum total of number times equal to the initial count number.

    [0021] In the event the count number is determined to be equal to zero, the method determines that both receiver and transmitter need to be resynchronized. Here, a first new follow up encrypted message is transmitted by the transmitter and received by the receiver (FIRST NEW FOLLOW UP MESSAGE RECEIVED 50). Once the first new follow up message is received, the algorithm re-encrypts the previously received new message (RE-ENCRYPT THE NEW MESSAGE 55). It should be noted that this step encompasses the step of setting the previous message to the new message by writing over the contents of the previous message with the new message. Thereafter, a test is performed to determine whether the first new follow up message matches the re-encrypted new message (TEST 60).

    [0022] In the event a match is made between the first new follow up message and the re-encrypted new message, the method calls for the transmission by the transmitter and reception by the receiver of a second new follow up encrypted message (SECOND NEW FOLLOW UP MESSAGE RECEIVED 70). Subsequently, the re-encrypted new message is re-encrypted an additional time (RE-ENCRYPT THE RE-ENCRYPTED NEW MESSAGE 75). Once the re-encrypted new message is re-encrypted, a test is performed to determine whether the second new follow up message matches the twice re-encrypted new message (TEST 80). If a match is made at this point, the new message is decrypted (DECRYPT MESSAGE 85), the command residing within the most recently received message, in this case the second follow up message, is initiated (INITIATE COMMAND 90), and the algorithm completed (STOP 95). At this point, both receiver and transmitter have been resynchronized.

    [0023] On the other hand, if the second new follow up message does not match the twice re-encrypted new message, the receiver is powered down for a period of time (POWER DOWN RECEIVER 65). Likewise, if the first new follow up message fails to match the re-encrypted new message, the receiver is powered down for a period of time (POWER DOWN RECEIVER 65).

    [0024] In the preferred embodiment of the present invention, it should be noted, that a third and a fourth new follow up message are required to match a continuously further re-encrypted new message before the resynchronization takes place. Accordingly, the third new follow up message is transmitted and received, the twice re-encrypted new message is re-encrypted a third time, and the third new follow up message is tested against the three times re-encrypted new message for a match. If no match is made, as detailed hereinabove, the receiver is powered down for a period of time (POWER DOWN RECEIVER 65). If a match is made, the fourth new follow up message is transmitted and received, the three times re-encrypted new message is re-encrypted yet another time, and the fourth new follow up message is tested against the four times re-encrypted new message for a match. Once again, if the fourth new follow up message does not match the four times re-encrypted new message, the receiver is powered down for a period of time (POWER DOWN RECEIVER 65). If both the fourth new follow up message and the four times re-encrypted new message do match, the transmitter and receiver are deemed to have been resynchronized and a fifth message is transmitted and received. The fifth message is decrypted, the command contained therein is subsequently initiated, and the algorithm completed.

    [0025] Referring to Figure 2, a second embodiment of the present invention, a resynchronization system 100, is illustrated. System 100 comprises a transmitter 110 having a radio frequency ("RF") transmitter section 114 including an antenna for transmitting messages. Moreover, transmitter 110 additionally comprises a microcomputer 118 for performing various functions, including encrypting messages.

    [0026] System 100 further comprises a receiver 120 for receiving the encrypted messages transmitted by transmitter 110. The reception of these messages is primarily the responsibility of an RF receiver section 125 within receiver 120. RF receiver section 125 is coupled with a microcomputer 130. In turn, microcomputer 130 is coupled with both an old message memory device 135 and a new message memory device 140. In the preferred embodiment, system 100 is employed in a RKE system, and as such, receiver 120 is located within the vehicle.

    [0027] Functionally, receiver 120 receives an encrypted message, labeled "previous message", from transmitter 110. This previous message is stored in old message memory device 135. At this point the operation of the RKE system, both transmitter and receiver are synchronized. At a later time, a new encrypted message transmitted by transmitter 110 is received by receiver 120 which is stored in new message memory device 140.

    [0028] Microcomputer 130 determines whether the resynchronization algorithm is required. First, microcomputer 130 re-encrypts the previous message stored in old message memory device 135. Subsequently, microcomputer 130 tests whether the re-encrypted previous message matches the new message stored in new message memory device 140. If a match is made, the microcomputer concludes no resynchronization is necessary, and as a result, decrypts the new message and initiates the command within the decrypted message.

    [0029] On the other hand, if the re-encrypted previous message does not match the new message stored in new message memory device 140, microcomputer re-encrypts the re-encrypted previous message. Upon re-encrypting the re-encrypted previous message, microcomputer 130 decrements a counter, preferably located within microcomputer 130. While the counter exceeds a count number, microcomputer 130 tests whether the new message matches the re-encrypted previous message. Where a match is made, the new message is decrypted and the command within the decrypted new message is initiated by microcomputer 130.

    [0030] If, however, a match is not made between the new message and the multiple times re-encrypted previous message, microcomputer 130 loops back to re-encrypt the re-encrypted previous message and decrement the counter. It should be apparent to one of ordinary skill that the re-encrypted previous message is re-encrypted during each loop. Thereafter, microcomputer 130 tests whether the new message matches the re-encrypted previous message.

    [0031] In the event that, after decrementing the counter, the count number is deemed to be zero, microcomputer 130 executes a resynchronization routine. This routine requires microcomputer 130 to receive a first follow up encrypted message from transmitter 110 through RF receiver section 125. Once received, microcomputer 130 re-encrypts the new message. This is realized by first setting the new message to be equal to the previous message. In so doing, the contents of new message memory device 140 are written into old message memory device 135. Thereafter, microcomputer 130 tests for a match between the re-encrypted new message and the first follow up message.

    [0032] In the event a match is made between the first new follow up message and the re-encrypted new message, microcomputer 130 receives a second new follow up encrypted message. In the preferred embodiment, the second follow up message is transmitted automatically by transmitter 110. In a further embodiment of the present invention, both transmitter 110 and receiver 120 are transceivers, and at this point receiver 120 transmits a feedback status message to transmitter 110 notifying transmitter 110 that a second follow up message is required.

    [0033] Subsequent to receiving the second follow up message, microcomputer 130 re-encrypts the re-encrypted new message an additional time and tests whether the second new follow up message matches the twice re-encrypted new message. If a match is made, microcomputer 130 decrypts the new message, initiates the command residing within the most recently received message, in this case the second follow up message, and the algorithm completed. At this point, both receiver and transmitter have been resynchronized.

    [0034] On the other hand, if the second new follow up message fails to match the twice re-encrypted new message, microcomputer 130 powers down receiver 120 for a period of time. Likewise, if microcomputer 130 determines that the first new follow up message does not match the re-encrypted new message, receiver 120 is powered down-for a period of time.

    [0035] In the preferred embodiment of the present invention, it should be noted, that a third and a fourth new follow up message are required to match a continuously further re-encrypted new message before the resynchronization takes place. Accordingly, the third new follow up message is transmitted by transmitter 110 and received by receiver 120, and microcomputer 130 re-encrypts the twice re-encrypted new message for a third time. Thereafter, the third new follow up message is tested against the three times re-encrypted new message by microcomputer 130 for a match. If no match is made, as detailed hereinabove, microcomputer 130 powers down receiver 120 for a'period of time. However, if a match is made, the fourth new follow up message is transmitted by transmitter 110 and received by receiver 120, and microcomputer 130 re-encrypts the three times re-encrypted new message yet another time. As detailed hereinabove, microcomputer 130 subsequently tests the fourth new follow up message against the four times re-encrypted new message for a match. If the fourth new follow up message does not match the four times re-encrypted new message, microcomputer 130 powers down receiver 120 for a period of time. If the fourth new follow up message and the four times re-encrypted new message do match, microcomputer 130 deems transmitter 110 and receiver 120 to have been resynchronized and a fifth message is transmitted by transmitter 110 and received by receiver 120. Microcomputer 130 subsequently decrypts the fifth message, the command contained therein is subsequently initiated, and the algorithm completed.

    [0036] It should be apparent to one of ordinary skill in the art that the encryption method employed in both transmitter 110 and receiver 120 must be identical to execute a command. Various encryption techniques may be utilized in this regard including linear and non-linear rolling code algorithms. The essential point in selecting an encryption process, however, is that predictability of the result.

    [0037] It should also be noted that reference to term message hereinabove shall mean either a single code set or, as in the preferred embodiment, a pair of code sets.

    [0038] While the particular invention has been described with reference to illustrative embodiments, this description is not meant to be construed in a limiting sense. It is understood that although the present invention has been described in a preferred embodiment, various modifications of the illustrative embodiments, as well as additional embodiments of the invention, will be apparent to persons skilled in the art upon reference to this description without departing from the scope of the invention, as recited in the claims appended hereto. Thus, for example, it should be apparent to one of ordinary skill in the art that the security system of the present invention may be applied in conjunction with enclosed spaces which inhibit entry and/or exit such as a vehicle, door, building entrance, safe, desk drawer or jail cell, and the like. The invention detailed herein is, hence, applicable to other secured enclosed spaces or secured switching mechanisms requiring security for deterring theft. Moreover, the present invention is also applicable to key formats requiring the storage of personal or secured information thereon.


    Claims

    1. A method of resynchronizing a receiver (120) with a transmitter (110) if the receiver and the transmitter are asynchronous, the receiver having received a new encrypted message, the method comprising the steps:

    transmitting and receiving a first new follow up encrypted message;

    re-encrypting the received new encrypted message; testing whether said received first new follow up encrypted message matches the re-encrypted received new encrypted message; and

    if said received first new follow up encrypted message matches the re-encrypted received new encrypted message,
       transmitting and receiving a further new follow up encrypted message;
       re-encrypting the received re-encrypted new encrypted message;
       testing whether said received further new follow up encrypted message matches said received twice re-encrypted new encrypted message; and
       if said received further new follow up encrypted message matches the received twice re-encrypted new encrypted message,
          decrypting said received further new follow up encrypted message; and
          initiating a command within said received and decrypted further new follow up encrypted message.


     
    2. The method of claim 1, further comprising the step of:

    powering down the receiver if said received first new follow up encrypted message does not match the re-encrypted received new encrypted message or if said received further new follow up encrypted message does not match the received twice re-encrypted new encrypted message.


     
    3. The method of claim 2, wherein the receiver is powered down for a period of time.
     
    4. The method of claim 1, further comprising the steps of:

    if said received first new follow up encrypted message matches the re-encrypted received new encrypted message,
       transmitting and receiving a second new follow up encrypted message;
       re-encrypting the received re-encrypted new encrypted message;
       testing whether said received second new follow up encrypted message matches said received twice re-encrypted new encrypted message; and
       if said received second new follow up encrypted message matches the received twice re-encrypted new encrypted message,
          transmitting and receiving a third new follow up encrypted message;
             re-encrypting the received twice encrypted new encrypted message;
             testing whether said received third new follow up encrypted message matches said received three times encrypted new encrypted message; and
             if said received third follow up encrypted message matches the received three times encrypted new encrypted message,
                transmitting and receiving a fourth new follow up encrypted message;
                re-encrypting the received three times encrypted new encrypted message;
                testing whether said received fourth new follow up encrypted message matches said received four times encrypted new encrypted message; and
                if said received fourth new follow up encrypted message matches said received four times encrypted new encrypted message,
                   transmitting and receiving a fifth new follow up encrypted message;
                   re-encrypting the received four times encrypted new encrypted message;
                   testing whether said received fifth new follow up encrypted message matches said received five times encrypted new encrypted message; and
                   if said received fifth new follow up encrypted message matches said received five times encrypted new encrypted message,
                 decrypting said received fifth new follow up encrypted message; and
                 initiating a command within said received and decrypted further fifth new follow up encrypted message.


     
    5. A method of resynchronizing a remote keyless entry receiver (120) with a transmitter (110), the receiver having received a previous encrypted message, the method comprising the steps:

    receiving a new encrypted message from the transmitter;

    re-encrypting the previous encrypted message;

    testing whether said received new encrypted message matches said re-encrypted previous encrypted message;

    if said received new encrypted message matches said re-encrypted previous encrypted message,
       decrypting said received new encrypted message;
       initiating a command within said decrypted new message;

    if said received new encrypted message does not match said re-encrypted previous encrypted message,
       re-encrypting said re-encrypted previous encrypted message;
       decrementing a counter each time said re-encrypted previous encrypted message is re-encrypted;
       if said counter exceeds a count number,
          testing whether said received new encrypted message matches said re-encrypted previous encrypted message;
             if said received new encrypted message matches said re-encrypted previous encrypted message,
                decrypting said received new encrypted message;
                initiating said command within said decrypted new message;
             if said received new encrypted message does not match said re-encrypted previous encrypted message,
                repeating the steps of re-encrypting said re-encrypted previous encrypted message, decrementing the counter, and testing whether said new encrypted message matches said re-encrypted previous encrypted message if said counter exceeds said count number;

       if said counter does not exceed said count number,
          transmitting and receiving a first new follow up encrypted message;
          re-encrypting said received new encrypted message;
          testing whether said received first new follow up encrypted message matches said re-encrypted received new encrypted message;
          if said received first new follow up encrypted message matches said re-encrypted received new encrypted message,
                transmitting and receiving a further new follow up encrypted message;
                re-encrypting said received re-encrypted new encrypted message;
                testing whether said received further new follow up encrypted message matches said received twice re-encrypted new encrypted message;
                if said received further new follow up encrypted message matches said received twice re-encrypted new encrypted message,
                   decrypting said received further new follow up encrypted message; and
                   initiating said command within said received further new follow up encrypted message.
     
    6. The method of claim 5, further comprising the step of:

    powering down the receiver if said received first new follow up encrypted message does not match the re-encrypted received new encrypted message or if said received further new follow up encrypted message does not match the received twice re-encrypted new encrypted message.


     
    7. The method of claim 6, wherein the receiver is powered down for a period of time.
     
    8. The method of claim 5, further comprising the steps of:

    if said received first new follow up encrypted message matches the re-encrypted received new encrypted message,
       transmitting and receiving a second new follow up encrypted message;
       re-encrypting the received re-encrypted new encrypted message;
       testing whether said received second new follow up encrypted message matches said received twice re-encrypted new encrypted message; and
       if said received second new follow up encrypted message matches the received twice re-encrypted new encrypted message,
          transmitting and receiving a third new tallow up encrypted message;
          re-encrypting the received twice encrypted new encrypted message;
          testing whether said received third new follow up encrypted message matches said received three times encrypted new encrypted message; and
          if said received third follow up encrypted message matches the received three times encrypted new encrypted message,
                transmitting and receiving a fourth new follow up encrypted message;
                re-encrypting the received three times encrypted new encrypted message;
                testing whether said received fourth new follow up encrypted message matches said received four times encrypted new encrypted message; and
                if said received fourth new follow up encrypted message matches said received four times encrypted new encrypted message,
                   transmitting and receiving a fifth new follow up encrypted message;
                   re-encrypting the received four times encrypted new encrypted message;
                   testing whether said received fifth new follow up encrypted message matches said received five times encrypted new encrypted message; and
                   if said received fifth new follow up encrypted message matches said received five times encrypted new encrypted message,
                      decrypting said received fifth new follow up encrypted message; and
                      initiating a command within said received and decrypted further fifth new follow up encrypted message.


     
    9. A system for resynchronizing a receiver (120) with a transmitter (110) if the receiver and the transmitter are asynchronized, the system comprising:

    a first memory device (135) for storing an old encrypted message transmitted by the transmitter and received by the receiver;

    a second memory device (140) for storing a new encrypted message transmitted by the transmitter and received by the receiver;

    a microcomputer 130 for re-encrypting said old encrypted message, for testing whether said re-encrypted old message matches said new message,

    if said new message matches said re-encrypted old message,
       for decrypting said new message; and
       for initiating a command within said decrypted new message; and
       if said new message does not match said re-encrypted old message,
          for re-encrypting said re-encrypted old message;
          for decrementing a counter each time said re-encrypted old message is re-encrypted;
          for testing whether said counter exceed a count number; and
          if said count number exceeds said zero,
             for testing whether said new message matches said re-encrypted old message;
             if said new message matches said re-encrypted old message,
                for decrypting said new message;
                for initiating said command within said decrypted new message; and
             if said new message does not match said re-encrypted old message,
                for repeating the steps of re-encrypting said re-encrypted old message, for decrementing the counter, and for testing whether said new encrypted message matches said re-encrypted old message if said counter exceeds said count number; and
          if said counter number does not exceed zero,
             for transmitting and receiving a first new follow up encrypted message;
             for re-encrypting said new message;
             for testing whether said first new follow up message matches said re-encrypted new message; and
             if said first new follow up encrypted message matches said re-encrypted new message,
                for transmitting and receiving a further new follow up encrypted message;
                for re-encrypting said re-encrypted new message;
                for testing whether said further new follow up message matches said twice re-encrypted new message; and
                if said further new follow up message matches said twice re-encrypted new message,
                   for decrypting said further new follow up message; and
                   for initiating said command within said further new follow up message.


     
    10. The system of claim 9, wherein at least one of said first and second memory devices comprise at least one of random access memory ("RAM") and electrical erasable programmable read only memory ("EEPROM").
     
    11. The system of claim 9, wherein said microcomputer powers down the receiver if said first new follow up message does not match said re-encrypted new message or if said further new follow up message does not match said twice re-encrypted new message.
     
    12. The system of claim 11, wherein the receiver is powered down for a period of time.
     
    13. The system of claim 9, wherein said microcomputer further tests whether said first new follow up message matches said re-encrypted new message and if said received first new follow up encrypted message matches the re-encrypted new message,
       said microcomputer receives a second new follow up encrypted message transmitted from the transmitter;
       said microcomputer re-encrypts said re-encrypted new message;
       said microcomputer tests whether said second new follow up message matches said twice re-encrypted new message; and
    if said second new follow up message matches said twice re-encrypted new message,
       said microcomputer receives a third new follow up encrypted message transmitted by the transmitter;
       said microcomputer re-encrypts said twice encrypted new message;
       said microcomputer tests whether said third new follow up message matches said three times encrypted new message; and
       if said received third follow up encrypted message matches said three times encrypted new message,
          said microcomputer receives a fourth new follow up encrypted message transmitted by the transmitter;
          said microcomputer re-encrypts said three times encrypted new message;
          said microcomputer tests whether said received fourth new follow up message matches said four times encrypted new message; and
          if said fourth new follow up encrypted message matches said four times encrypted new message,
             said microcomputer receives a fifth new follow up encrypted message transmitted by the transmitter;
             said microcomputer re-encrypts said four times
                encrypted new message;
                said microcomputer tests whether said fifth new follow up message matches said five times encrypted new message; and
                if said received fifth new follow up message matches said five times encrypted new message,
                   said microcomputer decrypts said fifth new follow up message; and
                   said microcomputer initiates a command within said decrypted further fifth new follow up encrypted message.
     


    Ansprüche

    1. Verfahren zum Resynchronisieren eines Empfängers (120) mit einem Sender (110), wenn der Empfänger und der Sender asynchron sind, wobei der Empfänger eine neue verschlüsselte Nachricht empfangen hat und das Verfahren die folgenden Schritte umfasst:

    Senden und Empfangen einer ersten neuen verschlüsselten Folge-Nachricht;

    neues Verschlüsseln der empfangenen neuen verschlüsselten Nachricht;

    Prüfen, ob die empfangene erste neue verschlüsselte Folge-Nachricht der neu verschlüsselten empfangenen neuen verschlüsselten Nachricht entspricht; und

    wenn die empfangene erste neue verschlüsselte Folge-Nachricht der neu verschlüsselten empfangenen neuen verschlüsselten Nachricht entspricht:

    Senden und Empfangen einer weiteren neuen verschlüsselten Folge-Nachricht;

    neues Verschlüsseln der empfangenen neu verschlüsselten neuen verschlüsselten Nachricht;

    Prüfen, ob die empfangene weitere neue verschlüsselte Folge-Nachricht der empfangenen zweimal neu verschlüsselten neuen verschlüsselten Nachricht entspricht; und

    wenn die empfangene weitere neue verschlüsselte Folge-Nachricht der empfangenen zweimal neu verschlüsselten neuen verschlüsselten Nachricht entspricht:

    Entschlüsseln der empfangenen weiteren neuen verschlüsselten Folge-Nachricht; und

    Auslösen eines Befehls in der empfangenen und entschlüsselten weiteren neuen verschlüsselten Folge-Nachricht.


     
    2. Verfahren nach Anspruch 1, das des Weiteren den folgenden Schritt umfasst:

    Abschalten des Empfängers, wenn die empfangene erste neue verschlüsselte Folge-Nachricht nicht der neu verschlüsselten empfangenen neuen verschlüsselten Nachricht entspricht, oder wenn die empfangene weitere neue verschlüsselte Folge-Nachricht nicht der empfangenen zweimal neu verschlüsselten neuen verschlüsselten Nachricht entspricht.


     
    3. Verfahren nach Anspruch 2, wobei der Empfänger über einen Zeitraum abgeschaltet wird.
     
    4. Verfahren nach Anspruch 1, das des Weiteren die folgenden Schritte umfasst:

    wenn die empfangene erste neue verschlüsselte Folge-Nachricht der neu verschlüsselten empfangenen neuen verschlüsselten Nachricht entspricht:

    Senden und Empfangen einer zweiten neuen verschlüsselten Foige-Nachricht;

    neues Verschlüsseln der empfangenen neu verschlüsselten neuen verschlüsselten Nachricht;

    Prüfen, ob die empfangene zweite neue verschlüsselte Folge-Nachricht der empfangenen zweimal neu verschlüsselten neuen verschlüsselten Nachricht entspricht; und

    wenn die empfangene zweite neue verschlüsselte Folge-Nachricht der empfangenen zweimal neu verschlüsselten neuen verschlüsselten Nachricht entspricht:

    Senden und Empfangen einer dritten neuen verschlüsselten Folge-Nachricht;

    neues Verschlüsseln der empfangenen zweimal verschlüsselten neuen verschlüsselten Nachricht;

    Prüfen, ob die empfangene dritte neue verschlüsselte Folge-Nachricht der empfangenen dreimal verschlüsselten neuen verschlüsselten Nachricht entspricht; und

    wenn die empfangene dritte verschlüsselte Folge-Nachricht der empfangenen dreimal verschlüsselten neuen verschlüsselten Nachricht entspricht:

    Senden und Empfangen einer vierten neuen verschlüsselten Folge-Nachricht;

    neues Verschlüsseln der empfangenen dreimal verschlüsselten neuen verschlüsselten Nachricht;

    Prüfen, ob die empfangene vierte neue verschlüsselte Folge-Nachricht der empfangenen viermal verschlüsselten neuen verschlüsselten Nachricht entspricht; und

    wenn die empfangene vierte neue verschlüsselte Folge-Nachricht der empfangenen viermal verschlüsselten neuen verschlüsselten Nachricht entspricht:

    Senden und Empfangen einer fünften neuen verschlüsselten Folge-Nachricht;

    neues Verschlüsseln der empfangenen viermal verschlüsselten neuen verschlüsselten Nachricht;

    Prüfen, ob die empfangene fünfte neue verschlüsselte Folge-Nachricht der empfangenen fünfmal verschlüsselten neuen verschlüsselten Nachricht entspricht; und

    wenn die empfangene fünfte neue verschlüsselte Folge-Nachricht der empfangenen fünfmal verschlüsselten neuen verschlüsselten Nachricht entspricht:

    Entschlüsseln der empfangenen fünften neuen verschlüsselten Folge-Nachricht; und

    Auslösen eines Befehls in der empfangenen und entschlüsselten weiteren fünften neuen verschlüsselten Folge-Nachricht.


     
    5. Verfahren zum Resynchronisieren eines Empfängers (120) einer schlüssellosen Fembedienungs-Zentralverriegelung mit einem Sender (110), wobei der Empfänger eine vorangehende verschlüsselte Nachricht empfangen hat und das Verfahren die folgenden Schritte umfasst:

    Empfangen einer neuen verschlüsselten Nachricht von dem Sender;

    neues Verschlüsseln der vorangehenden verschlüsselten Nachricht;

    Prüfen, ob die empfangene neu verschlüsselte Nachricht der neu verschlüsselten vorangehenden verschlüsselten Nachricht entspricht;

    wenn die empfangene neue verschlüsselte Nachricht der neu verschlüsselten vorangehenden verschlüsselten Nachricht entspricht:

    Entschlüsseln der empfangenen neuen verschlüsselten Nachricht;

    Auslösen eines Befehls in der entschlüsselten neuen Nachricht;

    wenn die empfangene neue verschlüsselte Nachricht der neu verschlüsselten vorangehenden verschlüsselten Nachricht nicht entspricht:

    neues Verschlüsseln der neu verschlüsselten vorangehenden verschlüsselten Nachricht;

    Herabsetzen eines Zähler immer dann, wenn die neu verschlüsselte vorangehende verschlüsselte Nachricht neu verschlüsselt wird;

    wenn der Zähler eine Zählzahl überschreitet:

    Prüfen, ob die empfangene neue verschlüsselte Nachricht der neu verschlüsselten vorangehenden verschlüsselten Nachricht entspricht;

    wenn die empfangene neue verschlüsselte Nachricht der neu verschlüsselten vorangehenden verschlüsselten Nachricht entspricht:

    Entschlüsseln der empfangenen neuen verschlüsselten Nachricht;

    Auslösen des Befehls in der entschlüsselten neuen Nachricht;

    wenn die empfangene neue verschlüsselte Nachricht der neu verschlüsselten vorangehenden verschlüsselten Nachricht nicht entspricht:

    Wiederholen der Schritte des neuen Verschlüsselns der neu verschlüsselten vorangehenden verschlüsselten Nachricht, des Herabsetzens des Zählers und des Prüfens, ob die neue verschlüsselte Nachricht der neu verschlüsselten vorangehenden verschlüsselten Nachricht entspricht, wenn der Zähler die Zählzahl überschreitet;

    wenn der Zähler die Zählzahl nicht überschreitet:

    Senden und Empfangen einer ersten neuen verschlüsselten Folge-Nachricht;

    neues Verschlüsseln der empfangenen neuen verschlüsselten Nachricht;

    Prüfen, ob die empfangene erste neue verschlüsselte Folge-Nachricht der neu verschlüsselten empfangenen neuen verschlüsselten Nachricht entspricht;

    wenn die empfangene erste neue verschlüsselte Folge-Nachricht der neu verschlüsselten empfangenen neuen verschlüsselten Nachricht entspricht:

    Senden und Empfangen einer weiteren neuen verschlüsselten Folge-Nachricht; neues Verschlüsseln der empfangenen neu verschlüsselten neuen verschlüsselten Nachricht;

    Prüfen, ob die empfangene weitere neue verschlüsselte Folge-Nachricht der empfangenen zweimal neu verschlüsselten neuen verschlüsselten Nachricht entspricht;

    wenn die empfangene weitere neue verschlüsselte Folge-Nachricht der empfangenen zweimal neu verschlüsselten neuen verschlüsselten Nachricht entspricht

    Entschlüsseln der empfangenen weiteren neuen verschlüsselten Folge-Nachricht; und

    Auslösen des Befehls in der empfangenen weiteren neuen verschlüsselten Folge-Nachricht.


     
    6. Verfahren nach Anspruch 5, das des Weiteren den folgenden Schritt umfasst:

    Abschalten des Empfängers, wenn die empfangene erste neue verschlüsselte Folge-Nachricht der neu verschlüsselten empfangenen neuen verschlüsselten Nachricht nicht entspricht oder wenn die weitere neue verschlüsselte Folge-Nachricht der empfangenen zweimal neu verschlüsselten neuen verschlüsselten Nachricht nicht entspricht.


     
    7. Verfahren nach Anspruch 6, wobei der Empfänger über einen Zeitraum abgeschaltet wird.
     
    8. Verfahren nach Anspruch 5, das des Weiteren die folgenden Schritte umfasst:

    wenn die empfangene erste neue verschlüsselte Folge-Nachricht der neu verschlüsselten empfangenen neuen verschlüsselten Nachricht entspricht:

    Senden und Empfangen einer zweiten neuen verschlüsselten Folge-Nachricht; neues Verschlüsseln der empfangenen neu verschlüsselten neuen verschlüsselten Nachricht;

    Prüfen, ob die empfangene zweite neue verschlüsselte Folge-Nachricht der empfangenen zweimal neu verschlüsselten neuen verschlüsselten Nachricht entspricht; und

    wenn die empfangene zweite neue verschlüsselte Folge-Nachricht der empfangenen zweimal neu verschlüsselten neuen verschlüsselten Nachricht entspricht:

    Senden und Empfangen einer dritten neuen verschlüsselten Folge-Nachricht;

    neues Verschlüsseln der empfangenen zweimal verschlüsselten neuen verschlüsselten Nachricht;

    Prüfen, ob die empfangene dritte neue verschlüsselte Folge-Nachricht der empfangenen dreimal verschlüsselten neuen verschlüsselten Nachricht entspricht; und

    wenn die empfangene dritte verschlüsselte Folge-Nachricht der empfangenen dreimal verschlüsselten neuen verschlüsselten Nachricht entspricht:

    Senden und Empfangen einer vierten neuen verschlüsselten Folge-Nachricht;

    neues Verschlüsseln der empfangenen dreimal verschlüsselten neuen verschlüsselten Nachricht;

    Prüfen, ob die empfangene vierte neue verschlüsselte Folge-Nachricht der empfangenen viermal verschlüsselten neuen verschlüsselten Nachricht entspricht; und

    wenn die empfangene vierte neue verschlüsselte Folge-Nachricht der empfangenen viermal verschlüsselten neuen verschlüsselten Nachricht entspricht:

    Senden und Empfangen einer fünften neuen verschlüsselten Folge-Nachricht; neues Verschlüsseln der empfangenen viermal verschlüsselten neuen verschlüsselten Nachricht;

    Prüfen, ob die empfangene fünfte neue verschlüsselte Folge-Nachricht der empfangenen fünfmal verschlüsselten neuen verschlüsselten Nachricht entspricht; und

    wenn die empfangene fünfte neue verschlüsselte Folge-Nachricht der empfangenen fünfmal verschlüsselten neuen verschlüsselten Nachricht entspricht:

    Entschlüsseln der empfangenen fünften neuen verschlüsselten Folge-Nachricht; und

    Auslösen eines Befehls in der empfangenen und entschlüsselten weiteren fünften neuen verschlüsselten Folge-Nachricht.


     
    9. System zum Resynchronisieren eines Empfänger (120) mit einem Sender (110), wenn der Empfänger und der Sender asynchron sind, wobei das System umfasst

    eine erste Speichervorrichtung (135), die eine von dem Sender gesendete und von dem Empfänger empfangene alte verschlüsselte Nachricht speichert;

    eine zweite Speichervorrichtung (140), die eine von dem Sender gesendete und von dem Empfänger empfangene neue verschlüsselte Nachricht speichert;

    einen Mikrocomputer (130), der die alte verschlüsselte Nachricht neu verschlüsselt, um zu prüfen, ob die neu verschlüsselte alte Nachricht der neuen Nachricht entspricht,

    wenn die neue Nachricht der neu verschlüsselten alten Nachricht entspricht:

    die neue Nachricht entschlüsselt; und

    einen Befehl in der entschlüsselten neuen Nachricht auslöst; und

    wenn die neue Nachricht der neu verschlüsselten alten Nachricht nicht entspricht:

    die neu verschlüsselte alte Nachricht neu verschlüsselt;

    einen Zähler immer dann herabsetzt, wenn die neu verschlüsselte alte Nachricht neu verschlüsselt wird;

    prüft, ob der Zähler eine Zählzahl überschreitet; und

    wenn die Zählzahl Null überschreitet:

    prüft, ob die neue Nachricht der neu verschlüsselten alten Nachricht entspricht;

    wenn die neue Nachricht der neu verschlüsselten alten Nachricht entspricht:

    die neue Nachricht entschlüsselt;

    den Befehl in der entschlüsselten neuen Nachricht auslöst; und

    wenn die neue Nachricht der neu verschlüsselten alten Nachricht nicht entspricht:

    die Schritte des neuen Verschlüsseins der neu verschlüsselten alten Nachricht wiederholt, den Zähler herabsetzt und prüft, ob die neue verschlüsselte Nachricht der neu verschlüsselten alten Nachricht entspricht, wenn der Zähler die Zählzahl überschreitet; und

    wenn die Zählzahl Null nicht überschreitet:

    eine erste neue verschlüsselte Folge-Nachricht sendet und empfängt;

    die neue Nachricht neu verschlüsselt;

    prüft, ob die erste neue Folge-Nachricht der neu verschlüsselten neuen Nachricht entspricht; und

    wenn die erste neue verschlüsselte Folge-Nachricht der neu verschlüsselten neuen Nachricht entspricht:

    eine weitere neue verschlüsselte Folge-Nachricht sendet und empfängt;

    die neu verschlüsselte neue Nachricht neu verschlüsselt;

    prüft, ob die weitere neue Folge-Nachricht der zweimal neu verschlüsselten neuen Nachricht entspricht; und

    wenn die weitere neue Folge-Nachricht der zweimal neu verschlüsselten neuen Nachricht entspricht:

    die weitere neue Folge-Nachricht entschlüsselt; und

    den Befehl in der welteren neuen Folge-Nachricht auslöst.


     
    10. System nach Anspruch 9, wobei wenigstens die erste oder die zweite Speichervorrichtung wenigstens einen Direktzugriffsspeicher (RAM) oder einen elektrisch löschbaren programmierbaren Festwertspeicher (EEPROM) umfasst.
     
    11. System nach Anspruch 9, wobei der Mikrocomputer den Empfänger abschaltet, wenn die erste neue Folge-Nachricht nicht der neu verschlüsselten neuen Nachricht entspricht oder wenn die weitere neue Folge-Nachricht nicht der zweimal neu verschlüsselten neuen Nachricht entspricht.
     
    12. System nach Anspruch 11, wobei der Empfänger über einen Zeitraum abgeschaltet wird.
     
    13. System nach Anspruch 9, wobei der Mikrocomputer des Weiteren prüft, ob die erste neue Folge-Nachricht der neu verschlüsselten neuen Nachricht entspricht, und, wenn die empfangene erste neue verschlüsselte Folge-Nachricht der neu verschlüsselten neuen Nachricht entspricht:

    der Mikrocomputer eine von dem Sender gesendete zweite neue verschlüsselte Folge-Nachricht empfängt;

    der Mikrocomputer die neu verschlüsselte neue Nachricht neu verschlüsselt;

    der Mikrocomputer prüft, ob die zweite neue Folge-Nachricht der zweimal neu verschlüsselten neuen Nachricht entspricht; und

    wenn die zweite neue Folge-Nachricht der zweimal neu verschlüsselten neuen Nachricht entspricht:

    der Mikrocomputer eine von dem Sender gesendete dritte neue verschlüsselte Folge-Nachricht empfängt;

    der Mikrocomputer die zweimal verschlüsselte neue Nachricht neu verschlüsselt;

    der Mikrocomputer prüft, ob die dritte neue Folge-Nachricht der dreimal verschlüsselten neuen Nachricht entspricht; und

    wenn die empfangene dritte verschlüsselte Folge-Nachricht der dreimal verschlüsselten neuen Nachricht entspricht:

    der Mikrocomputer eine von dem Sender gesendete vierte neue verschlüsselte Folge-Nachricht empfängt;

    der Mikrocomputer die dreimal verschlüsselte neue Nachricht neu verschlüsselt;

    der Mikrocomputer prüft, ob die empfangene vierte neue Folge-Nachricht der viermal verschlüsselten neuen Nachricht entspricht; und

    wenn die vierte neue verschlüsselte Folge-Nachricht der viermal verschlüsselten neuen Nachricht entspricht:

    der Mikrocomputer eine von dem Sender gesendete fünfte neue verschlüsselte Folge-Nachricht empfängt;

    der Mikrocomputer die viermal verschlüsselte neue Nachricht neu verschlüsselt;

    der Mikrocomputer prüft, ob die fünfte neue Folge-Nachricht der fünfrnal verschlüsselten neuen Nachricht entspricht; und

    wenn die empfangene fünfte neue Folge-Nachricht der fünfmal verschlüsselten neuen Nachricht entspricht:

    der Mikrocomputer die fünfte neue Folge-Nachricht entschlüsselt; und

    der Mikrocomputer einen Befehl in der entschlüsselten weiteren fünften neuen verschlüsselten Folge-Nachricht auslöst


     


    Revendications

    1. Procédé permettant de resynchroniser un récepteur (120) avec un émetteur (110) si le récepteur et l'émetteur sont asynchrones, le récepteur ayant reçu un nouveau message crypté, le procédé comprenant les étapes consistant à :

    transmettre et recevoir un premier nouveau message crypté de suivi ;

    recrypter le nouveau message crypté reçu ;

    vérifier que ledit premier nouveau message crypté de suivi reçu correspond au nouveau message crypté reçu et recrypté ; et

    si ledit premier message crypté de suivi reçu correspond au nouveau message crypté reçu et recrypté,

    transmettre et recevoir un autre nouveau message crypté de suivi ;

    recrypter le nouveau message crypté reçu et recrypté ;

    vérifier que ledit autre nouveau message crypté reçu correspond au dit nouveau message crypté reçu et recrypté deux fois ; et

    si ledit autre nouveau message crypté de suivi reçu correspond au nouveau message crypté reçu et recrypté deux fois,

    décrypter ledit autre nouveau message crypté de suivi reçu ; et

    initier une commande à l'intérieur dudit autre nouveau message crypté de suivi reçu et décrypté.


     
    2. Procédé selon la revendication 1, comprenant en outre l'étape consistant à :

    mettre hors tension le récepteur si ledit premier nouveau message crypté de suivi reçu ne correspond pas au nouveau message crypté reçu et recrypté ou si ledit autre nouveau message crypté de suivi reçu ne correspond pas au nouveau message crypté reçu et recrypté deux fois.


     
    3. Procédé selon la revendication 2, dans lequel le récepteur est mis hors tension pour un intervalle de temps donné.
     
    4. Procédé selon la revendication 1, comprenant en outre les étapes consistant à :

    si ledit premier nouveau message crypté de suivi reçu correspond au nouveau message crypté reçu et recrypté,

    transmettre et recevoir un second nouveau message crypté de suivi ;

    recrypter le nouveau message crypté reçu et recrypté ;

    vérifier que ledit second nouveau message crypté de suivi reçu correspond au dit nouveau message crypté reçu et recrypté deux fois ; et

    si ledit second nouveau message crypté de suivi reçu correspond au nouveau message crypté reçu et recrypté deux fois,

    transmettre et recevoir un troisième nouveau message crypté de suivi ;

    recrypter le nouveau message crypté reçu et recrypté deux fois ;

    vérifier que ledit troisième nouveau message crypté de suivi reçu correspond au dit nouveau message crypté reçu et crypté trois fois ; et

    si ledit troisième message crypté de suivi reçu correspond au nouveau message crypté reçu et crypté trois fois,

    transmettre et recevoir un quatrième nouveau message crypté de suivi ;

    recrypter le nouveau message crypté reçu et crypté trois fois ;

    vérifier que ledit quatrième nouveau message crypté de suivi reçu correspond au dit nouveau message crypté reçu et crypté quatre fois ; et

    si ledit quatrième nouveau message crypté de suivi reçu correspond au nouveau message crypté reçu et crypté quatre fois,

    transmettre et recevoir un cinquième nouveau message crypté de suivi ;

    recrypter le nouveau message crypté reçu et crypté quatre fois ;

    vérifier que ledit cinquième nouveau message crypté de suivi reçu correspond au dit nouveau message crypté reçu et crypté cinq fois ; et

    si ledit cinquième nouveau message crypté de suivi reçu correspond au nouveau message crypté reçu et crypté cinq fois,

    décrypté ledit cinquième nouveau message crypté de suivi reçu ; et

    initier une commande à l'intérieur dudit autre cinquième nouveau message crypté de suivi reçu et décrypté.


     
    5. Procédé permettant de resynchroniser un récepteur d'entrée sans touche distant (120) avec un émetteur (110), le récepteur ayant reçu un message crypté précédent, le procédé comprenant les étapes consistant à :

    recevoir un nouveau message crypté provenant de l'émetteur ;

    recrypter le message crypté précédent ;

    vérifier que ledit nouveau message crypté reçu correspond au dit message crypté précédent recrypté ;

    si ledit nouveau message crypté correspond au dit message crypté précédent recrypté,

    décrypter ledit nouveau message crypté reçu ;

    initier une commande à l'intérieur dudit nouveau message décrypté ;

    si ledit nouveau message crypté reçu ne correspond pas au dit message crypté précédent recrypté,

    recrypter ledit message crypté précédent recrypté ;

    décrémenter un compteur à chaque recryptage dudit message crypté précédent recrypté ;

    si ledit compteur dépasse un nombre de compte donné,

    vérifier que ledit nouveau message crypté reçu correspond au dit message crypté précédent recrypté ;

    si ledit nouveau message crypté reçu correspond au dit message crypté précédent recrypté,

    décrypter ledit nouveau message crypté reçu ;

    initier ladite commande à l'intérieur dudit nouveau message décrypté ;

    si ledit nouveau message crypté reçu ne correspond pas au dit message crypté précédent recrypté,

    répéter les étapes consistant à recrypter ledit message crypté précédent recrypté, décrémenter le compteur, et vérifier que ledit nouveau message crypté correspond au dit message crypté précédent recrypté si ledit compteur dépasse ledit nombre de compte donné ;

    si ledit compteur ne dépasse pas ledit nombre de compte,

    transmettre et recevoir un premier nouveau message crypté de suivi ;

    recrypter ledit nouveau message crypté reçu ;

    vérifier que ledit premier nouveau message crypté de suivi reçu correspond au dit nouveau message crypté reçu et recrypté ;

    si ledit premier nouveau message crypté de suivi reçu correspond au dit nouveau message crypté reçu et recrypté,

    transmettre et recevoir un autre nouveau message crypté de suivi ;

    recrypter ledit nouveau message crypté reçu et recrypté ;

    vérifier que ledit autre nouveau message crypté de suivi reçu correspond au dit nouveau message crypté reçu et recrypté deux fois ;

    si ledit autre nouveau message crypté de suivi reçu correspond au dit nouveau message crypté reçu et recrypté deux fois,

    décrypter ledit autre nouveau message crypté de suivi ; et

    initier ladite commande à l'intérieur dudit autre nouveau message crypté de suivi reçu.


     
    6. Procédé selon la revendication 5, comprenant en outre l'étape consistant à :

    mettre hors tension le récepteur si ledit premier nouveau message crypté de suivi reçu ne correspond pas au nouveau message crypté reçu et recrypté ou si ledit autre nouveau message crypté de suivi reçu ne correspond pas au nouveau message crypté reçu et recrypté deux fois.


     
    7. Procédé selon la revendication 6, dans lequel le récepteur est mis hors tension pour un intervalle de temps donné.
     
    8. Procédé selon la revendication 5, comprenant en outres les étapes consistant à :

    si ledit premier nouveau message crypté de suivi reçu correspond au nouveau message crypté reçu et recrypté,

    transmettre et recevoir un second nouveau message crypté de suivi ;

    recrypter le nouveau message crypté reçu et recrypté ;

    vérifier que ledit second nouveau message crypté de suivi reçu correspond au dit nouveau message crypté reçu et recrypté deux fois ; et

    si ledit second nouveau message crypté de suivi reçu correspond au nouveau message crypté reçu et recrypté deux fois,

    transmettre et recevoir un troisième nouveau message crypté de suivi ;

    recrypter le nouveau message crypté reçu et crypté deux fois ;

    vérifier que ledit troisième nouveau message crypté de suivi reçu correspond au dit nouveau message crypté reçu et crypté trois fois ; et

    si ledit troisième nouveau message crypté de suivi reçu correspond au nouveau message crypté reçu et crypté trois fois,

    transmettre et recevoir un quatrième nouveau message crypté de suivi ;

    recrypter le nouveau message crypté reçu et crypté trois fois ;

    vérifier que ledit quatrième nouveau message crypté de suivi reçu correspond au dit nouveau message crypté reçu et crypté quatre fois ; et

    si ledit quatrième nouveau message crypté de suivi reçu correspond au nouveau message crypté reçu et crypté quatre fois,

    transmettre et recevoir un cinquième nouveau message crypté de suivi ;

    recrypter le nouveau message crypté reçu et crypté quatre fois ;

    vérifier que ledit cinquième nouveau message crypté de suivi reçu correspond au dit nouveau message crypté reçu et crypté cinq fois ; et

    si ledit cinquième nouveau message crypté de suivi reçu correspond au nouveau message crypté reçu et crypté cinq fois,

    décrypter ledit cinquième nouveau message crypté de suivi reçu ; et

    initier une commande à l'intérieur dudit autre cinquième nouveau message crypté de suivi reçu et décrypté.


     
    9. Système permettant de resynchroniser un récepteur (120) avec un émetteur (110) si le récepteur et l'émetteur ne sont plus synchronisés ensemble, le système comprenant :

    un premier dispositif de mémoire (135) permettant de stocker un ancien message crypté transmis par l'émetteur et reçu par le récepteur ;

    un second dispositif de mémoire (140) permettant de stocker un nouveau message crypté transmis par l'émetteur et reçu par le récepteur ;

    un microordinateur (130) permettant de recrypter ledit ancien message crypté afin de vérifier que ledit ancien message recrypté correspond au dit nouveau message,

    si ledit nouveau message correspond au dit ancien message recrypté,

    pour décrypter ledit nouveau message ; et

    pour initier une commande à l'intérieur dudit nouveau message décrypté ; et

    si ledit nouveau message ne correspond pas au dit ancien message recrypté,

    pour recrypter ledit ancien message recrypté ;

    pour décrémenter un compteur à chaque recryptage dudit ancien message recrypté ;

    pour vérifier que ledit compteur dépasse un nombre de compte donné ; et

    si ledit nombre de compte dépasse ledit zéro,

    pour vérifier que ledit nouveau message correspond au dit ancien message recrypté ;

    si ledit nouveau message correspond au dit ancien message recrypté,

    pour décrypter ledit nouveau message ;

    pour initier ladite commande à l'intérieur dudit nouveau message décrypté ; et

    si ledit nouveau message ne correspond pas au dit ancien message recrypté,

    pour répéter les étapes consistant à recrypter ledit ancien message recrypté, décrémenter le compteur, et vérifier que ledit nouveau message crypté correspond au dit ancien message recrypté si ledit compteur dépasse ledit nombre de compte ; et

    si ledit nombre de compte ne dépasse pas zéro,

    pour transmettre et recevoir un premier nouveau message crypté de suivi ;

    pour recrypter ledit nouveau message ;

    pour vérifier que ledit premier nouveau message crypté de suivi correspond au dit nouveau message recrypté ; et

    si ledit premier nouveau message crypté de suivi correspond au dit nouveau message recrypté,

    pour transmettre et recevoir un autre nouveau message crypté de suivi ;

    pour recrypter ledit nouveau message recrypté ;

    pour vérifier que ledit autre nouveau message de suivi correspond au dit nouveau message recrypté deux fois ; et

    si ledit autre nouveau message de suivi correspond au dit nouveau message recrypté deux fois,

    pour décrypter ledit autre nouveau message de suivi ; et

    pour initier ladite commande à l'intérieur dudit autre nouveau message de suivi.


     
    10. Système selon la revendication 9, dans lequel au moins l'un desdits premier et second dispositifs de mémoire comprend au moins une mémoire vive (« mémoire RAM ») et une mémoire morte programmable effaçable électriquement (« mémoire EEPROM »).
     
    11. Système selon la revendication 9, dans lequel ledit microordinateur met hors tension le récepteur si ledit premier nouveau message de suivi ne correspond pas au dit nouveau message recrypté, ou si ledit autre nouveau message de suivi ne correspond pas au dit nouveau message recrypté deux fois.
     
    12. Système selon la revendication 11, dans lequel le récepteur est mis hors tension pour un intervalle de temps donné.
     
    13. Système selon la revendication 9, dans lequel ledit microordinateur vérifie en outre que ledit premier nouveau message de suivi correspond au dit nouveau message recrypté et si ledit premier nouveau message crypté de suivi reçu correspond au nouveau message recrypté,
       ledit microordinateur reçoit un second nouveau message crypté de suivi transmis à partir de l'émetteur ;
       ledit microordinateur recrypte ledit nouveau message recrypté ;
       ledit microordinateur vérifie que ledit second nouveau message de suivi correspond au dit nouveau message recrypté deux fois ; et
       si ledit second nouveau message de suivi correspond au dit nouveau message recrypté deux fois,
       ledit microordinateur reçoit un troisième nouveau message crypté de suivi transmis par l'émetteur ;
       ledit microordinateur recrypte ledit nouveau message crypté deux fois ;
       ledit microordinateur vérifie que ledit troisième nouveau message de suivi correspond au dit nouveau message crypté trois fois ; et
       si ledit troisième message crypté de suivi correspond au dit nouveau message crypté trois fois,
       ledit microordinateur reçoit un quatrième nouveau message crypté de suivi transmis par l'émetteur ;
       ledit microordinateur recrypte ledit nouveau message crypté trois fois ;
       ledit microordinateur vérifie que ledit quatrième nouveau message de suivi correspond au dit nouveau message crypté quatre fois ; et
       si ledit quatrième nouveau message crypté de suivi correspond au dit nouveau message crypté quatre fois,
       ledit microordinateur reçoit un cinquième nouveau message crypté de suivi transmis par l'émetteur ;
       ledit microordinateur recrypte ledit nouveau message crypté quatre fois ;
       ledit microordinateur vérifie que ledit cinquième nouveau message de suivi correspond au dit nouveau message crypté cinq fois ; et
       si ledit cinquième nouveau message de suivi reçu correspond au dit nouveau message crypté cinq fois,
       ledit microordinateur décrypte ledit cinquième nouveau message de suivi ; et
       ledit microordinateur initie une commande à l'intérieur dudit autre cinquième nouveau message crypté de suivi décrypté.
     




    Drawing