describes the brief operation of a authenticated and multiple coded microcontroller based wireless security system. A system which uses a simple RF without any encoding schemes for transmission can be can be hacked easily. Attackers can use custom made devices which mimic or regenerate the codes of the original device to get their attack done. The idea is to use a unique and a complicated code which will be very difficult to trace and backup. The transmitter and receiver agree on a particular code for the transmission. If that matches then only the next step of desired operation will be performed. In this method unauthorized devices cannot communicate with the receiver without knowing the codes.