What is radio transmission?

Transmission solutions essentially send information from one place to another via radio waves. This is a type of wireless communication – so-called because, of course, it doesn’t require physical wires. Other types of common radio transmission include radio and television broadcasting and walkie-talkies.

There are two essential components in any radio transmission solution: a transmitter and a receiver.

The transmitter is the component which generates and sends the signal.

The receiver is the component which picks up the signal and displays or utilizes the information contained within it.

A receiver is mounted on a plain white wall in a garage while an extended hand holds a small transmitter with four yellow buttons

Wireless solutions in access control

In access control, radio transmission is commonly used for wireless activation of security systems. Let’s look at an example of an automated car gate at the end of a driveway. The gate is fitted with an electro-magnetic lock at its center.

Hidden in a control panel at the side of the gate is the receiver. The resident of the house, who is driving up towards the gate, has a hand-held transmitter in their car. If they are in range of the receiver, when they press the button on the transmitter, it generates a signal and sends it to the receiver. The receiver recognizes the signal and in turn, triggers the lock to release and the gate to automatically open.

Transmission solutions are also common for automatic garage door openers, wireless access control keypads, and automatic light switches.

A locked padlock sits on top of a laptop computer to represent cyber security

What is encrypted radio transmission?

In its basic form, radio transmission has vulnerabilities. Devices exist which can interrupt the signal mid-transmission and allow hackers to gain access to the information being sent. However, there are now multiple methods for encrypting the information to ensure that it cannot be stolen.

One of those methods is KeeLoq® rolling code. This method is intended to prevent hackers from intercepting signals used in access control systems. By constantly changing the ‘password’ required to gain access (on a rolling basis), even if it is intercepted, by the time the hacker tries to use the password they have stolen, it has already changed.

A closeup of a man sitting in front of a laptop holding and using a mobile phone to contact technical support

Need some help?

Get in touch with our expert technical support team via phone, email or leave us a message on the website. Let's chat!