Locking IDs (Lock priority) - G2 protocols
You assign and withdraw authorisations in the LSM or block and deactivate identification media and transfer the authorisation changes to the locking devices with a gateway via identification media.
The authorisations stored on the identification media themselves are normally used in a virtual network. If an identification medium is to be blocked and the authorisations on this identification medium are still used, this identification medium could continue to open locking devices as long as the authorisations on this identification medium are not changed by a gateway.
This is prevented by a lock priority set for the ID of the identification medium. If an identification medium is no longer authorised for a locking device, a lock priority is set for its ID. The gateway transmits the lock priority to the locking devices via other identification media.
If a lock priority is set in a locking device for an ID of an identification medium, the authorisation for this locking device that may still exist on this identification medium and is normally used is ignored. Instead, the authorisations that are stored in the locking device itself and are updated in a virtual network by the identification media apply (and are therefore more up-to-date).
At the same time, the ID of the identification medium blocked in this way is stored in a blacklist and can therefore not be reactivated accidentally.