Can key copies of identification media be created unnoticed? - LSM 3.6 Basic Online

No. During initial programming, each identification medium is assigned a component-specific password in the system, which can only be used with this credential and individual PHI (Physical Hardware Identifier). If the same data is stored on a different credential, this alters the calculated result during decryption, and the authenticity of the copied credential cannot be verified.