fbpx

How are copies made?

At Fobcouver, we have custom written programs to copy a key fob within 5 minutes for our customers. Although the copying process is very quick and efficient nowadays, it wasn’t always this way. Our key fob copy process is detailed below:

Step 1: Scanning for information

Keys fobs have RFID Tags in them which Wikipedia describes as:

“Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader’s interrogating radio waves. Active tags have a local power source such as a battery and may operate at hundreds of meters from the RFID reader.

Since tags have information stored in them already, it’s a “simple” matter of getting the information out of them. We have scanners which can power up tags and show us the data on it which looks like: In it’s simplest form, all information on your computer, smartphone, and even that old casio calculator is stored as 0’s and 1’s. This is called binary, and it is how all digital information is stored at it’s most basic level. From this graph we can extrapolate the following information:

“1010111010101011000011101010101010101011010101011111100000111000010101011101010101100001110101010101010101101010101111110000011100001010101110101010110000111010101010101010110101010111111000001110000101010111010101011000011101010101010101011010101011111100000111000010101011101010101100001110101010101010101101010101111110000011100001010101110101010110000111010101010101010110101010111111000001110000101010111010101011000011101010101010101011010101011111100000111000010”

Once we get the bit stream (the information above), we locate the beginning and ending of the stream (which are the matching strings of 0’s and 1’s). That bit stream would be:

“1010111010101011000011101010101010101011010101011111100000111000010”

After we have located the beginning and ending of the stream, we start to demodulate the data with known cipher keys. With 8 years of experience, Fobcouver has the cipher keys for every system in BC. Individual buildings do not have different ciphers; only different systems will have different ciphers. Knowing which cipher to use will only tell us what system you are using not what building it’s from. Our program will run your key through every known cipher with a 98.74% success rate.

Step 2: Placing Information to New Tag

Finally when we have the key Information and the cipher used. We will place the data onto a donor fob and test it four times to ensure that the key will work before you pay us! Donor fobs look like this: IMG_0173 With our programs we can create a copy faster than you read this page!

Feel free to contact us for more details!

[pirate_forms] For key fob copying in Toronto: fobtoronto http://www.fobtoronto.ca For services in Sydney: Keyfobcopysydney.com.au