2N® LTE Verso Configuration Manual
139
/
224
•
•
•
•
be periodically updated for security reasons, especially in the event of a mobile device loss or
intercom configuration leak.
The primary key can be re-generated any time. Thus, the original primary key becomes the first
secondary key, the first secondary key becomes the second secondary key and so on. Secondary
keys can be deleted any time.
When a key is deleted, the
2N
®
Mobile Key
users that still use this key will not be able to
authenticate themselves unless they have updated the encryption keys in their mobile devices
before deletion. The mobile device keys are updated at every use of the
2N
®
Mobile
Key
application.
List of Parameters
Location ID
– set a unique identifier for the location in which the selected encryption key
set is valid.
Export
– push the button to export the location ID and current encryption keys into a file.
Subsequently, the exported file can be imported to another device.
Import
– push the button to import the location ID and current encryption keys from a file
exported from another intercom.
Restore primary key
– by generating a new primary encryption key you delete the oldest
secondary key. Thus, the
2N
®
Mobile Key
users that still use this key will not be able to
authenticate themselves unless they have updated the encryption keys in their mobile
•
Note
The encryption keys are generated automatically upon the intercom first launch
and saved into the intercom configuration file. We recommend you to re-generate
the encryption keys manually before the first use to enhance security.