Configuration manual for 2N IP intercoms
•
•
Upload PICard Keys – select the key file and enter the valid password to upload the
PICard key.
Delete PICard Keys – delete the uploaded PICard keys.
WaveKey
The2N IPintercoms equipped with the Bluetooth module allow for user authentication via the
2NMobile Keyapplication available to devices with iOS 12 and higher (iPhone 4s and higher
phones) or Android6.0 Marshmallow and higher (Bluetooth 4.0 Smart supporting phones).
User Identification (Auth ID)
The 2N Mobile Key application authenticates itself with a unique identifier on the intercom
side:Auth ID(128-bit number) is generated randomly for every user and paired with the
intercom user and its mobile device.
You can set and edit the Auth ID value for each user in the Mobile Key section of the intercom
phone book. You can move Auth ID to another user or copy it to another intercom. By deleting
the Auth ID value you can block the user's access.
Encryption Keys and Locations
The 2NMobile Key– intercom communication is always encrypted. 2NMobile Keycannot
authenticate a user without knowing the encryption key. The primary encryption key is
automatically generated upon the intercom first launch and can be re-generated manually any
time later. Together with AuthID, the primary encryption key is transmitted to the mobile device
for pairing.
You can export/import the encryption keys and location identifier to other intercoms. Intercoms
with identical location names and encryption keys form so-called locations. In one location, a
mobile device is paired just once and identifies itself with one unique Auth ID (i.e. a user AuthID
can be copied from one intercom to another within a location).
Pairing
Pairing means transmission of user access data to a user personal mobile device. The user
access data can only be saved into one mobile device, i.e. a user cannot have two mobile devices
for authentication, for example. However, the user access data can be saved into multiple
locations in one mobile device (i.e. the mobile device is used as a key for more locations at the
same time).
•
Note
The generated Auth ID cannot be saved in more mobile devices than one. This
means that Auth ID uniquely identifies just one mobile device or its user.