Emulate URC7740

Guys, I’ve made a mistake.

The whole time I’ve thought ‘reverse’ means 01011 to 11010. But instead it means a logic inverse: 01011 to 10100.
Dammit, in all testcases the ‘false reversing’ worked, because for example 11110000 is reversed 00001111 in both calculations.

2 Likes

how can I help now ?

2 Likes

I’m about to write a protocol analyzer at the moment. Until than I have no further idea.
Except to correct the false reversing approach above. I’ll try this evening to create a new .ir file.

2 Likes

As promised, the next try:

Filetype: IR library file
Version: 1
# 
name: POWER
type: parsed
protocol: SIRC20
address: 5A 1C 00 00
command: BA 00 00 00
# 
name: POWER
type: parsed
protocol: SIRC20
address: 5A 1C 00 00
command: FF 00 00 00
# 
name: POWER
type: parsed
protocol: SIRC20
address: 5A 1C 00 00
command: 5F 00 00 00
# 
name: POWER
type: parsed
protocol: SIRC20
address: 5A 1C 00 00
command: D3 00 00 00
# 
name: POWER
type: parsed
protocol: SIRC20
address: 5A 1C 00 00
command: 4F 00 00 00
# 

I am pretty sure the address don’t need to be reversed. But I let this here for completeness.

The new calculation is:

        #sserdda = format(int(((bin(int('1'+btnaddr_arr[0], 16))[3:])[::-1]), 2),'X').zfill(2)
        #dnammoc = format(int(((bin(int('1'+btncomm_arr[0], 16))[3:])[::-1]), 2),'X').zfill(2)
        sserdda_bin = ''.join(['1' if i == '0' else '0' for i in bin(int(btnaddr_arr[0], 16))[2:].zfill(8)])
        sserdda = hex(int(sserdda_bin,2))[2:]
        dnammoc_bin = ''.join(['1' if i == '0' else '0' for i in bin(int(btncomm_arr[0], 16))[2:].zfill(8)])
        dnammoc = hex(int(dnammoc_bin,2))[2:]
2 Likes

I’m still thinking about this. I’d like to get (what I guess is) a more compatible remote and a similar Sony unit to test here. My play money has been exhausted lately, so it may be a bit. I would love to be able to find these codes and make the .ir public - that would be a very practical (if slightly obscure) thing to have.

I’m open to other ideas, if someone thinks of something in the meantime.

@BTONO, what region are you actually in?

Edit: I have something coming in the mail.

1 Like

I don’t think another remote is needed. The task is to understand the coding.

Within one protocol, we have 3 dimension:

  • The address - related to the device (type)
  • The command - related to the action
  • The button - Not relevant at all, but helpful, because we’ve had 9 tries per programming session.

Programming Sequence

  1. DVD + 0533 (Is DVD already related to the address? Is 0533 a internal code for the remote, or the address within the DVD address set?)
  2. 994 (seems to be a internal code)
  3. 1 + 00189 (Set 00189 to the button 1)
  4. 2 + 00255 (Set 00255 to the button 2)
  5. 3 + 00095 (Set 00095 to the button 3)
  6. 4 + 00221 (Set 00189 to the button 4)
  7. 5 + 00079 (Set 00189 to the button 5)

Alter the programming sequence

What happen If we press TV instead of DVD at 1.?
What happens to the signal, if we change step 1. to 0534?
What happens to the signal, if we change at step 3. 1 to 00001, 2 to 00002, 3 to 00127, 4 to 00128, 5 to 00256?

Hypothesis

With this information we can analyze the behavior and maybe get how the ‘AllForOne’ remotes will work, to build our own, compatible.

2 Likes

I have some data, based on what you asked for.

Two different device codes with various “994” codes:

A small chart of different ‘994’ codes but only within the 1533 device:

Observations:

-Only certain Device Codes are allowed for what the remote is set to (TV, DVD, etc). Specifically, I cannot use the device code 1533 when the remote is set to TV. It only works when it’s set to DVD.

-As mentioned, my remote does not accept 0533 as a valid device ID for any device type. Given my research into different One-For-All remotes, I think this might be a region thing. The one I have is specifically for the US and it lacks 0533 according to Sony DVD codes for OneForAll universal remote controls We can speculate that we can use the protocol and address as identified by the OP, but this is not guaranteed (see further below)

-When entering the 994 codes (00189, 00255, etc) it does not appear to matter which button (1, 2, 3, etc) it’s assigned to. The same code can be assigned to multiple buttons.

-The Device code appears to set both the protocol,address space, and (default) layout of commands.

-The ‘994’ codes appear to modify and override the existing Device code (Device 0534, code 00189 is a different protocol and address and command than Device 1533, code 00189)

-However, it appears that the ‘994’ code can change the protocol (somewhat) and the address space, too (Device 1533, code 00004 seems to alter what would be SIRC20 to just SIRC, with a different address)

-There appears to be some overlap with some of the 994 codes (00256 and 00001 seem to both return the command 0x62)

2 Likes

Also, I’ve not seen device code 1533 plus a 944 code change the protocol to something completely different, like NEC. So far, all my tests within device code 1533 are either SIRC20 or SIRC.

1 Like

@BTONO Hey friend, if you’re still around, give this ir file a try.

https://raw.githubusercontent.com/emptythevoid/flipperzero/main/infrared/experimental_sony_unlock/Unlock_0533.ir

It looks almost exactly like the one I had with the other URC remote, except all the commands are SIRC20 address 3A 09 00 00

Edit: I looked over my notes. I think the codes are exactly the same as device code 1533

2nd Edit: when you’re testing these region unlocks, you’re testing it with a DVD, right? The unlock is only good for DVD playback. It has no effect on blu-ray discs.

1 Like

I came across a post that suggests this hack only makes models from certain regions region free.

I was suspecting this as well. I never did hear back what region OP is in. Do you have the link? Will be useful to add to my notes.

Edit: I think I found it.

1 Like

I feel confident that I can report that this procedure does not work on the US (region 1) model. This is backed up by the website(s) that @jmr and I came across.
With the coding as indicated by the programming instructions, the US model does not even respond to anything at all. If I modify it to use the address of @BTONO 's remote, I can control the player, but the special buttons only result in the unit turning on at the end of the procedure.
I’d love to test this on a region 2 unit, but I think obtaining one would be prohibitive for me.

This is a bummer.
Even if the way until this discovery was fun. Thank you guys for the nice working together at this experiment! Maybe one day someone else from another region will got us the proof.

1 Like

Jeez I’ve missed a lot. Sorry I was swamped and now I’m away from home (California) for the next 2 weeks.
I’ll get back on it as soon as I come back.
If one of you is not too far out I can also consider sending the player if needed.
Thank you so much for your patience and work.

1 Like

Presumably, if you’re in California, you’re going to run into the same issue I have. I got the same S5100 player and it doesn’t respond to the codes. The ‘internet’ strongly suggests the codes are only going to work on a region 2 player (that would be foreign for you and me).

1 Like

I wonder if there is a firmware update procedure… Perhaps it could load firmware from another region?
EDIT: I’m pretty sure that’s a dead end.

1 Like

Someone in a CFW discord provided the .ir file.
PanasonicRegionFreeDVD.ir (9.1 KB)

The file should just send the sequence for European Panasonic DVD player. Works when no disc is loaded.

What score! Awesome!

It would be easy to 1) test with the “hack” first without flipper and with special remote to see if works and 2) If it works then use flipper to add new RAW remote and save the sequences of the hack in a single “raw” press with the multiple keys to unlock the dvd…

Sure, this would be easier. But to be honest, it was a lot of fun to get a bunch of values, try to understand it and build a Flipper file out of this knowledge.

Even if it don’t worked out in the end, the task of reversing with the guys here got me a lot of fun and knowledge.
I think this is a underestimated purpose of the Flipper. Beside making fake TikTok videos and turn off school property, you can understand the invisible waves around you … Or in simpler words: Hack the Planet.

2 Likes