Roger Mobile Key Operating instructions

Type
Operating instructions
Roger Access Control System
Roger Mobile Key app
Operating Manual
Software version: 2.0
Document version: Rev. E
Roger Mobile Key Operating Manual.doc 2019-05-08
2
/
5
1. DESCRIPTION
Roger Mobile Key is a mobile app which enables user identification at RACS 5 terminals by means of
mobile device (Android, iOS) with BLE, NFC (Android only) or QR code. Logging at the terminal
requires manual key selection on app screen or mobile device gesture.
2. INSTALLATION AND CONFIGURATION
Roger Mobile Key app requires Android 5.0/iOS 10.0 or newer. The app for Andoid is available at
www.roger.pl , iOS version is available in App Store.
After installation the app is ready for configuration.
Fig. 1 App settings
2.1 GENERAL SETTINGS
Background service
When the option is selected then logging with default key after detection of defined gesture (mobile
device shaking or rotating) is enabled. Mobile device must be unlocked for such logging.
Gesture logging
The option enables selection of gesture logging method – shaking or rotating. The second one
requires clockwise rotating of mobile device by 90 degrees from vertical position and then returning
to vertical position.
Roger Mobile Key Operating Manual.doc 2019-05-08
3
/
5
Shake sensitivity
The sensitivity of mobile device accelerometer depends on its manufacturer and model. The option
is used to adjust activation threshold for shaking.
2.2 KEY SETTINGS
BLE factor class
The parameter defines method of BLE identification that will be used in the newly created key:
UCEFast secure login
REK authentication with a high level of security.
NFC/BLE factor encryption key
The parameter defines password for BLE High Security or NFC key encryption. It must be the same
as the corresponding password configured at RACS 5 terminals (readers).
NFC/BLE communication encryption key
The parameter defines password for wireless Communications with the reader.
QR factor encryption key
The parameter defines password for QR code key encryption. It must be the same as the
corresponding password configured at RACS 5 terminals (readers).
3. SOFTWARE FUNCTIONALITIES
Fig. 2 App main screen
Roger Mobile Key Operating Manual.doc 2019-05-08
4
/
5
3.1 KEY ENROLMENT
Add new key selecting in the top right corner and then
Add key
command. Select logging method
(BLE, NFC, QR code), enter key name and value (number). When configured, the key is displayed
on the main screen of the app.
3.2 KEY USING
When key is selected on the screen the app starts logging process at RACS 5 terminal. Proceed
according to description below depending on defined key type (BLE, NFC).
3.2.1 BLE
When key is selected on the screen, then the app searches for available reader and starts
authorization process. Login status window is closed automatically both in case of communication
error and successful authorization. Start the procedure again in case of unsuccessful logging.
3.2.2 NFC
When key is selected on the screen, then place your mobile device at the terminal. Depending on
the location of NFC antenna in your mobile device (usually it is located in the centre or in the top
back part of device) it is necessary to determine experimentally the positioning of mobile device
against the terminal for optimal reading results.
3.2.3 QR code
When key is selected on the screen, then QR Code to the terminal’s camera (eg. MD70). Code
should be clearly visible in the preview image.
3.3 KEY MANAGEMENT
Press the key on the screen for a few seconds in order to display context menu with following
commands:
Set as default/Remove as default
The command is used to make/unmake selected key a default one. Default key is used for logging
based on mobile device gesture.
Assign reader
The command is available only for BLE keys. When selected then the terminal which is the closest
to the mobile device is marked as default one. The mobile device will automatically attempt to log
at this reader when the app is started and the terminal is in proper distance. If the app cannot
connect with default reader then it automatically searches for another closest terminal.
Rename
The command enables key renaming.
Delete
The command enables key deleting.
3.4 GESTURE LOGGING
Gesture logging requires mobile device unlocking and then making previously specified gesture
(shaking, rotating or automatically after unlock device). When the gesture is detected then the
procedure of logging at terminal is started in the same way as if the key was selected manually on
the screen. In case automatically logging in, communication with the terminal is performed in the
background.
In the case of iOS, you must additionally confirm the process in the system window, which will be
displayed after the defined motion has been executed.
Roger Mobile Key Operating Manual.doc 2019-05-08
5
/
5
Contact:
ROGER sp. z o.o. sp. k.
82-400 Sztum
Gościszewo 59
Tel.: +48 55 272 0132
Faks: +48 55 272 0133
Tech. support: +48 55 267 0126
E-mail: biuro@roger.pl
Web: www.roger.pl
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5

Roger Mobile Key Operating instructions

Type
Operating instructions

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI