2N TELEKOMUNIKACE a.s., www.2n.cz
132/177
You can set and edit the Auth ID value for each user in the Mobile Key section of the
intercom phone book. You can move Auth ID to another user or copy it to another
intercom. By deleting the Auth ID value you can block the user's access.
Encryption Keys and Locations
The
– intercom communication is always encrypted.
2N Mobile Key
®
2N Mobile Key
®
cannot authenticate a user without knowing the encryption key. The primary
encryption key is automatically generated upon the intercom first launch and can be
re-generated manually any time later. Together with AuthID, the primary encryption
key is transmitted to the mobile device for pairing.
You can export/import the encryption keys and location identifier to other intercoms.
Intercoms with identical location names and encryption keys form so-called
.
locations
In one location, a mobile device is paired just once and identifies itself with one unique
Auth ID (i.e. a user AuthID can be copied from one intercom to another within a
location).
Pairing
Pairing means transmission of user access data to a user personal mobile device. The
user access data can only be saved into one mobile device, i.e. a user cannot have two
mobile devices for authentication, for example. However, the user access data can be
saved into multiple locations in one mobile device (i.e. the mobile device is used as a
key for more locations at the same time).
To pair a user with a mobile device, use the user's page in the intercom phone book.
Physically, you can pair a user locally using the USB Bluetooth module connected to
your PC or remotely using an integrated Bluetooth module. The results of both the
pairing methods are the same.
The following data is transmitted to a mobile device for pairing:
Location identifier
Location encryption key
User Auth ID
Encryption Key for Pairing
An encryption key other than that used for communication after pairing is used in the
pairing mode for security reasons. This key is generated automatically upon the
intercom first launch and can be re-generated any time later.
Summary of Contents for Helios IP
Page 1: ...www 2n cz 2N Helios IP IP Intercom Configuration Manual Version 2 17 ...
Page 22: ...2N TELEKOMUNIKACE a s www 2n cz 22 177 5 Intercom Configuration ...
Page 82: ...2N TELEKOMUNIKACE a s www 2n cz 82 177 ...
Page 97: ...2N TELEKOMUNIKACE a s www 2n cz 97 177 Display Module Configuration ...