Virtual network (VN) - G2 protocols
In a virtual network, the locking devices are only given basic information when they are first programmed and are permitted in your locking system. Authorisations are stored exclusively on the identification media.
If the authorisations change, the authorisations only need to be updated in the identification media. In virtual networks there are so-called gateways for this purpose. The users operate the identification media on the gateways and thus start data transmission. If authorisation changes have been made, the gateway updates the authorisations in the identification media. As the locking system administrator, you no longer have to reprogram locking devices or identification media if you change authorisations.