Another advantage is that in a CipherLinx® -based system, the encoder’s unique ID is available from the decoder. This identification can be used in various ways, including systems that record access attempts or applications where the originating user needs to be known. Also advantageous is how the modules hand user permissions. In conventional designs, all transmissions are recognized or denied based on the address. In a CipherLinx -based system, each encoder's permissions can be set separately to establish differing use or authorization levels. Permission settings control how the decoder will respond to the reception of a valid command, either allowing the activation of an individual data line or not. The next advantage is that the decoders offer the ability to select momentary or latched operation for the output lines. They can be set to momentarily activate an output while a valid transmission is being received, or they can be set to latch the output in a specific state which remains set until unlatched.