MCPO Bluetooth smart lock, password lock, phone unlock, hotel security door locks, electronic locks
HONG KONG MCPO COMPANY
MCPO Bluetooth smart lock, password lock, phone unlock, hotel security door locks, electronic locks
Door locks Do Not need ONLINE networking
NO NEED Traditional KEY,JUST TAKE OUT SMART PHONE CAN UNLOCK
Share digital E-keys WHEREEVER YOU ARE, view access history, receive notifications, Create pin codes and customize settings only using the lock app.
Touch-to-OpenBluetooth Smart Lock
·
· Share digital E-keys WHEREVER YOU ARE
· NO NEED ONLINE WORKING
Unlock your door lock with just your smartphone or Digital Touchscreen Keypad or NFC card
Share digital E-keys wherever you are, view access history, receive notifications, create pin codes and customize settings only using the lock app
YourSmartphone is now your key - touch to open convenience with the 2ndgeneration.:If you wish to perform a system reset,press and hold theResetbutton on the back panel for 3 seconds until the phone screen appear+ ,then press it.OK
Share access, create pin codes and customize lock settings from the free lock app
*Works with select iOS and Android devices
Send and manage eKey access via smartphone - receive notifications and monitorlock history
When your phone is outside, MCPO LOCK will recognize you approaching your front door and will unlock when touched,but the lock app must be in open mode.
Touch-to-Open Bluetooth Smart Lock
Touchscreen keypad: backlit and capacitive touch so that numbers won't ever wear off
Unlock your door lock with just your smartphone or Digital Touchscreen Keypad.or NFC card
· Send only electronic signatures to stop being intercepted and cracked
After the phone receives the signature, password will be calculated on the phone and exist in the phone, the network is only used to transfer the electronic key signature, no need to worry about being hijacked crack, Eliminate all worries.
Using the United States TI Company Texas Instruments central processing chip
*High-speed operation
*Ultra-low power consumption
*Anti-hacking system
*AES 128 bit encryption
* Dynamic encryption verification