Encryption Keys for Mobile Key

Users can use the Mobile Key application for connection with the 2N devices. The Mobile Key – device communication is always encrypted. Mobile Key cannot authenticate a user without knowing the encryption key. The primary encryption key is automatically generated upon the intercom first launch and can be re-generated manually any time later. Together with AuthID, the primary encryption key is transmitted to the mobile device for pairing.

The Mobile Key – device communication is always encrypted. Mobile Key cannot authenticate a user without knowing the encryption key. The primary encryption key is automatically generated upon the intercom first launch and can be re-generated manually any time later. Together with AuthID, the primary encryption key is transmitted to the mobile device for pairing.

You can generate up to 4 encryption keys in Settings > Credentials > Encryption Keys for Mobile Key. The generated key is automatically uploaded into Mobile Key upon the first use of the mobile phone with the device paired earlier. When you attempt to generate the fifth key, Access Commander will warn you that the oldest key will be removed. The card shows the generation time for each key.

If Mobile Key has no access to any of the valid encryption keys, the application cannot be used for user authentication. To restore the function, re-pair the application with the device connected to Access Commander, which results in uploading the valid encryption keys to Mobile Key.

Note|/-/media/Images/Manuals/css/note.png Note

The access to the device depends on the access rights of the given user.

Can we advise you on anything else?

Take advantage of our technical support and sales specialists.