Zennio GetFace IP
Tecnical Support
39
As already mentioned, Bluetooth communication between GetFace IP and the GetFace
Key application is encrypted. To this end, a primary key and up to three secondary
keys are available, valid for a certain location.
The primary key is generated automatically upon the intercom first launch and
transmitted to the mobile device during pairing.
It is possible to export/import the encryption keys and location identifier to other
intercoms. Intercoms with identical location names and encryption keys form so-called
locations
. A user Auth ID can be copied from one intercom to another within a location
and it would not be necessary to pair it.
Location Settings
:
Location ID
: set a unique identifier for the location in which the encryption
key set is valid.
Export
: push the button to export the location ID and current encryption keys
into a file. Subsequently, the exported file can be imported to another device.
Devices with identical location IDs and encryption keys form a so-called
location.
Import
: push the button to import the location ID and encryption keys from a
file exported from another intercom. Devices with identical location IDs and
encryption keys form a so-called location.
The options for encryption keys are:
Restore primary key
: the original primary key becomes the first
secondary key, the first secondary key becomes the second secondary key
and so on (if there were 3 secondary keys the oldest is deleted).
Delete primary/secondary key
: delete the corresponding key to
prevent the users that still use this key from authentication.
If the key stored on a mobile device is one of the secondary keys, access is allowed
and after valid access the key is updated to the primary key in the device.
If the key stored on a mobile device does not match any of the keys (primary or
secondary) access is not allowed.