detected at any time, or if the transmission cannot be decrypted with the
saved key, then the decoder will ignore the packet and look for the next
one.
If no valid packet is detected within 262mS, the decoder will go back to
sleep.
Decoder Create Key Mode
Create Key Mode is entered when the LEARN and CREATE_KEY lines
on the decoder are taken high at the same time. When this happens, the
MODE_IND line will go high as an indication that the decoder is ready to
create the key. The CREATE_KEY line will need to go high ten times to set
the key. Each edge on the line starts a timer that is used to populate a part
of the key. This method is used to gather entropy so that the key will be
truly random and will choose from among all 2 80 possible keys.
Following the tenth press, the decoder will begin to send the key to the
encoder on the KEY_OUT line. This will be output as a serial data stream,
so it can be sent to the encoder by any method suitable for serial data
transfer. This can include the use of a wire, contact points on an enclosure,
or infrared. The HS Series Master Development System demonstrates wire
and infrared transfer methods. You may wish to refer to the development
system User’s Guide for circuit schematics and further details.
Once the encoder receives the key on its KEY_IN line, it will send a
confirmation to the decoder through its DATA_OUT line. This means that
the standard mode of communication, whether a wire, RF, or infrared,
must be active. When the decoder receives this confirmation, it will send
a final confirmation through the KEY_OUT line. The MODE_IND LED lines
on the encoder and the decoder will turn on for one second. This indicates
that the encoder and decoder are now ready to be used. The decoder will
output the key information for seventeen seconds or until it receives a valid
confirmation from the encoder. If Control Permissions are going to be used,
they may now be set as described in the Decoder Learn Mode section.
Note that the CREATE_KEY line should be connected to a button or
another contact that will give random times between presses. Connecting
this line to a deterministic source, such as a microprocessor clock, will not
produce a secure key and could compromise the system.
– 15 –