johnellinwood / smartfire

Proflame 2 Smart Home Controller
GNU General Public License v3.0
17 stars 3 forks source link

Cloning serial number? #1

Open friggeri opened 3 years ago

friggeri commented 3 years ago

First off, thanks for spending the time putting this together, I’ve been thinking about doing something similar myself but never invested the time.

How would you recommend going about figuring out the serial number to my existing remote? Any tips?

Thanks a lot!

johnellinwood commented 3 years ago

Oh, hey, I just saw your issue here. Yeah, I need to review my notes. I have a command parser script somewhere that can pull out the serial number. You can also just use some RF recorder software and the YardStick to record the signal, pass through AM demod, and manually read the serial number.

I'll use this ticket to track the issue of adding a "clone" method to this smart fire API.

johnellinwood commented 3 years ago

From my notes:

RF Characteristics 315 nominal frequency Fc: 314,958,300 Hz actual BW: 5 KHz ideally, not sure the filter BW on the receiver Fs: 2,400 Symbol period: 414 us 5 repetitions of transmission separated by 13 LOW symbols 13.3556 Hz rate 74.875 ms period (time for all 181 symbols) 2.41736 kBaud symbol rate (transmission rate of symbols) 413.674 us symbol period (width of each symbol)

Signal analysis toolchain - this is how we record and analyze the real proflame2 transmitter signals

RTL-SDR on Linux RTL-SDR command to raw cu8 recording Prefer > 2Msps recording Inspectrum symbol grid and calculator Audacity waveform inspection

RTL-SDR on Windows SDR# oscilloscope, FFT, baseband recording Audacity waveform inspection

jbruening commented 2 years ago

rtl_433 recently added (release 21.12) support for proflame2 based on the research done in this repository (https://github.com/merbanan/rtl_433/issues/1905)

rtl_433 will dump out the serial number (as hex in kv format, integer in json)

with an example command of: rtl_433 -f 315M -g 40 -R 207

time : 2022-01-12 21:40:12 model : Proflame2-Remote Id : ffffff Cmd1 : 01 Cmd2 : 06 Err1 : fc Err2 : da Pilot : 0 Light : 0 Thermostat: 0 Power : 1 Front : 0 Fan : 0 Aux : 0 Flame : 6 Integrity : CHECKSUM

boojew commented 1 year ago

@johnellinwood any chance you have that parsing script somewhere to reverse an RF command? I dont have an SDR device available to me so I am struggling to get the serial #, but I am using your amazing work to build a command encoder to be sent to a broadlink RM4 Pro.

Thanks