fbpx

How to Copy or Clone and Apartment Key Fob or Garage Remote.

How are copies made?

At Fobcouver, we have custom written programs to copy a key fob within 5 minutes for our customers. Although the copying process is very quick and efficient nowadays, it wasn’t always this way. How we copy a key fob is explained below:

Step 1: Scanning for information

Keys fobs have RFID Tags in them which Wikipedia describes as:

“Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. Passive tags collect energy from a nearby RFID reader’s interrogating radio waves. Active tags have a local power source such as a battery and may operate at hundreds of meters from the RFID reader. Unlike a barcode, the tag need not be within the line of sight of the reader, so it may be embedded in the

Since tags have information stored in them already, it’s a “simple” matter of getting the information out of them. We have scanners which can power up tags and show us the data on it which looks like:

From this graph we can extrapolate the following information:

“1010111010101011000011101010101010101011010101011111100000111000010101011101010101100001110101010101010101101010101111110000011100001010101110101010110000111010101010101010110101010111111000001110000101010111010101011000011101010101010101011010101011111100000111000010101011101010101100001110101010101010101101010101111110000011100001010101110101010110000111010101010101010110101010111111000001110000101010111010101011000011101010101010101011010101011111100000111000010”

Once we get the bit steam, we locate the beginning and ending of the stream which would be

“1010111010101011000011101010101010101011010101011111100000111000010”

After we have located the beginning and ending of the stream, we start to demodulate the data with known cipher keys. With 8 years of experience, Fobcouver has the cipher keys for every system in BC. Individual buildings do not have different ciphers; only different systems will have different ciphers. Knowing which cipher to use will only tell us what system you are using not what building it’s from. Our program will run your key through every known cipher with a 98.74% success rate.

Step 2: Placing Information to New Tag

Finally when we have the key Information and the cipher used. We will place the data onto a donor fob and test it four times to ensure that the key will work before you pay us!

Donor fobs look like this:

IMG_0173

With our programs we can create a copy faster than you read this page!

Feel free to contact us for more details!

[pirate_forms]

For key fob copying in Toronto:

fobtoronto

http://www.fobtoronto.co

For services in Sydney:

Keyfobcopysydney.com.au