Frequently Asked Questions

What do I need to operate my Intellipost?

Primary connection is by secure 256bit encrypted Bluetooth enabling operation directly from any Apple or Android Phone / Tablet, making it useable in underground carparks and remote areas. Bluetooth range is around 20m outdoors.

With connection to your sufficiently strong WiFi network, you are able to control your Intellipost remotely, from anywhere in the world. Please note it is likely that a wifi booster/repeater is installed to extend the coverage to your Intellipost(s). As wifi is subject to your 3rd party hardware, Intellipost has no liability over the stability of such a connection.

What happens if my battery runs out or it won’t connect?

There’s an integral manual key-override enabling manual removal of the Intellipost using your supplied removal tool. Alternatively we can supply additional battery packs, or our emergency battery converter, which uses AA batteries to provide a small number of operations.

How do I update the software in my Intellipost?

Over the air updates can be pushed to your Intellipost while in-range and using the Intellipost app.

How long does the battery last between charges?

A)  Average use is 8 raising/ lowering cycles a day, so approximately 30 days. The battery level will decrease slowly even without operation, the receivers and internal circuit boards are always on waiting for commands to move. 

What happens if I damage my Intellipost?

In 90% of cases you can replace the post, leaving the ground unit where it is. We can supply just the post as a spare part. We designed it this way so that once installed there should be no further excavation or disturbance of the driveway/ installation area.

Could someone hack my connection?

Keys are generated during setup and are only stored on your smartphone and your Intellipost itself. Your keys are not stored anywhere else. Even the setup process is protected against hackers trying to get your virtual keys as it uses the highly secure, state-of-the-art Ephemeral Elliptic Curve Diffie-Hellman key exchange method, which together with the additional certificate validation and digital signature scheme, is resistant to eavesdropping, man-in-the-middle and other attacks.