Answer the question
In order to leave comments, you need to log in
How is the control system of barriers from key fobs arranged?
He drowned the keychain from the barrier (Nice SM2) installed in the yard. The chairman of the initiative group that provided the installation refuses to sell more than one key fob per apartment (they generally introduced draconian rules there), and I wanted to take three at once - not the last time, I feel, I drowned. I read that they can be cloned, bought an "empty" keychain, but when selling, the seller somehow confusedly said that only one of them could work anyway.
From Google, I learned that it is possible to somehow fill in the authorization code on the key fob only on the equipment of the company that installs the barrier:
"In our opinion, the most convenient coding system is when the firmware is flashed directly at the time of sale, on the equipment of the seller. Without this equipment, it is impossible to flash the key fob, and the seller sells additional key fobs only with the consent of the main customer. The codes are stored in the code log, go to the object is not needed, the number of key fobs is controlled."
But even there everything ended with a not very clear phrase "If the user gives someone a keychain, then he himself will be left with nothing."
I really want to understand how the process of binding key fobs takes place and what "unauthorized" cloning is fraught with.
Answer the question
In order to leave comments, you need to log in
on special equipment
it is not fraught with anything,
so giving the chairman is not so difficult, a written refusal to issue a key fob and you can safely threaten a court.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question