Is the remote programming with EURIDIS secure?
For security, each programming of data is preceded by an authentication exchange. Authentication is carried out by an exchange of random numbers ciphered using a secret key specific to each Secondary Station. EURIDIS offers also, for some particular appliances, programming with no authentication and broadcast remote transfer.