|
|
[email protected] wrote:
|> |
|> |>
|> |>Jim Thompson wrote:
|> |>> On 3 Dec 2006 16:07:56 GMT,
[email protected] wrote:
|> |>
|> |>> Clear back in 1950, 390MHz was assigned to the military. But _some_
|> |>> garage-door-opener companies have continued to use that frequency
|> |>> based on the FCC "low-power-non-interference" rule.
|> |>>
|> |>> In COS the openers were simply over-powered by a high power military
|> |>> antenna located on Cheyenne Mountain.
|> |>>
|> |> Hmm, I remember hearing of an incident of Sputnik screwing with garage
|> |>door openers back in the day.
|> |
|> | I was a Senior in High School when Sputnik went up. I don't think RF
|> | garage door openers existed back then ;-)
|>
|> If not then, soon after. My grandfather's brother had a remote garage door
|> opener in 1961. I can't say whether it was optical or radio as I was a bit
|> too young then to consider it important. But I sure thought it was great.
|> It might have been rather expensive at the time.
|
|
| And probaly without the modern coding remotes have today. (remember,
| computer took up
| entire rooms at this time.
I wonder if the first RF garage door
| openers listened for a specific audio tone broadcasted by the radio
| transmitter, or simply responded whenever
| an RF signal was detected on its frequency.
My guess would be an audio tone. A more advanced design would compare
to a 2nd audio tone such that the 1st must be stronger. They did have
a means to reject neighbors. I remember my uncle mentioning his neighbor
(in an area of expensive homes) also having one of these and they did not
operate each other. Being RF frequency selective would be a bit hard to
do for such cheap electronics. I have no idea if the audio would have
been AM or FM modulated, but my guess would be AM. Still, it could easily
be FM with the 2 tone test where one has to be much higher than the other
to reject all the background hiss from FM demodulation.
These days, I'd want to make one with a challenge response security system
built in so "the code" itself is never actually sent. For example, the
remote makes a request to the base, the base generates a random number,
encrypts it, sends one or the other to the remote, the remote does the
same if sent the number or decrypts if sent the result, and sends back its
result for confirmation and action. As long as it's very hard to derive
the key from those two pieces of data, it should be reasonably secure.