Leashing is managed by the reader, which scans the local environment for devices and detects their 802.15.x signal strength. The reader uses a configured RSSI threshold to estimate how far away each device is.
How the process works:
- When a device's signal strength reaches the leashing threshold, the reader attempts a connection to check if the device has the Safetrust Wallet and a valid credential.
- If a valid credential is found, access is granted.
- If no valid credential is detected, the reader blacklists the device from subsequent scans.
How blacklisting works:
- The blacklisted device will not be scanned again unless:
- It changes its MAC address.
- It is presented as a “touch” (very strong signal strength < -32dB).
- The blacklist timer expires (approximately 2 minutes).
This process helps the reader prioritize valid devices while reducing unnecessary authentication attempts.