When the supply voltage is switched on, the information is transmitted to a non-volatile memory in the module from a plugged in HOPKEY. Then this HOPKEY can be used to "train" other receivers. In the last receiver, the HOPKEY can be preserved. If no HOPKEY is plugged in, the information in the module is used.
Innovations for your success – experience them now.Discover the HIGHLIGHTS
Follow us! Get the latest information about cyber security, remote services, and much more.mGuard Cyber Security on Twitter