How does Safetrust Leashing work when multiple phones are near a door?

Leashing is managed by the reader, which scans the local environment for devices and detects their 802.15.x signal strength. The reader uses a configured RSSI threshold to estimate how far away each device is.

How the process works:

  1. When a device's signal strength reaches the leashing threshold, the reader attempts a connection to check if the device has the Safetrust Wallet and a valid credential.
  2. If a valid credential is found, access is granted.
  3. If no valid credential is detected, the reader blacklists the device from subsequent scans.

How blacklisting works:

  • The blacklisted device will not be scanned again unless:
    • It changes its MAC address.
    • It is presented as a “touch” (very strong signal strength < -32dB).
    • The blacklist timer expires (approximately 2 minutes).

This process helps the reader prioritize valid devices while reducing unnecessary authentication attempts.

 
Was this article helpful?

We’re sorry to hear that. Let us know how we can improve:

Thanks for your feedback! Let us know how this article helped:

Thanks for your feedback!