How are copies made?
At Fobcouver, we have custom written programs to copy a key fob within 5 minutes for our customers. Although the copying process is very quick and efficient nowadays, it wasn’t always this way. Our key fob copy process is detailed below:Step 1: Scanning for information
Keys fobs have RFID Tags in them which Wikipedia describes as:“Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader’s interrogating radio waves. Active tags have a local power source such as a battery and may operate at hundreds of meters from the RFID reader.
Since tags have information stored in them already, it’s a “simple” matter of getting the information out of them. We have scanners which can power up tags and show us the data on it which looks like:“1010111010101011000011101010101010101011010101011111100000111000010101011101010101100001110101010101010101101010101111110000011100001010101110101010110000111010101010101010110101010111111000001110000101010111010101011000011101010101010101011010101011111100000111000010101011101010101100001110101010101010101101010101111110000011100001010101110101010110000111010101010101010110101010111111000001110000101010111010101011000011101010101010101011010101011111100000111000010”
Once we get the bit stream (the information above), we locate the beginning and ending of the stream (which are the matching strings of 0’s and 1’s). That bit stream would be:“1010111010101011000011101010101010101011010101011111100000111000010”
After we have located the beginning and ending of the stream, we start to demodulate the data with known cipher keys. With 8 years of experience, Fobcouver has the cipher keys for every system in BC. Individual buildings do not have different ciphers; only different systems will have different ciphers. Knowing which cipher to use will only tell us what system you are using not what building it’s from. Our program will run your key through every known cipher with a 98.74% success rate.