Authorisations in the G2 protocol - LSM 3.5 SP3 Basic Online
Authorisations are stored on all components in the G2 protocol. This enables a new transponder to operate an authorised locking device without needing to reprogramme the locking device in question. Blocks (what are know as block IDs) can be transferred in the same way. When a new replacement transponder is activated on a locking device for the first time, its original authorisation is deleted from the locking device.