Turning smartphones into secure and versatile keys

Jan 03, 2013
Thanks to ShareKey, digital keys can be transferred by e-mail using a smartphone. Credit: Fraunhofer SIT

It's already possible to open doors using an app—but we are a long way from seeing widespread acceptance of this in the market. Now, researchers have developed a piece of software that will make the technology even more secure and versatile.

Smartphones and tablets have become an integral part of our daily lives. The capabilities of these handily sized mini-computers seem almost boundless as we phone friends, shoot holiday snaps, lose ourselves in a new music download or access the internet to obtain the boarding card for our next fl ight in comfort. Does it not seem logical, then, that we should make use of these constant companions as the key to our cars, front doors or lockers as well? A few such solutions are already available, but what's still missing is widespread market acceptance. At this year's trade fair in Hannover (March 5-9, 2013), researchers from the Fraunhofer Institute for Secure Information Technology SIT in Darmstadt will be demonstrating their ShareKey software, a solution which will make the key app concept even more versatile and secure.

"In essence, ShareKey offers two new functions: users can issue digital keys remotely and assign these keys certain user permissions. For instance, I can grant the building superintendent access to my apartment for a short period so that he can open the door for the gas meter to be read while I'm at work," explains Alexandra Dmitrienko from the SIT. "The solution is built around modern security technologies and can be easily integrated into existing access control systems." ShareKey sends electronic keys directly to the user's mobile phone, in the form of a attached to an e-mail or MMS.

Protecting parcel stations from phishing

One thing that Dmitrienko and her team will also be demonstrating at CeBIT (Hall 9, Booth E08) is a parcel station where access rights to individual compartments are issued using ShareKey. "Recently, users of parcel stations have fallen victim to phishing attacks. Equally, hackers continue to target their efforts on smartphones. In light of this, the big challenge was to protect the electronic keys without compromising the intuitive operation of such devices," explains Dmitrienko.

ShareKey works using the Near Field Communication (NFC) transmission standard, which allows data to be exchanged wirelessly over short ranges of up to a few centimeters."To open a door, all you need to do is hold your mobile phone close to the lock," says Dmitrienko. NFC interface and door locks only operate within a narrow bandwidth and have limited computing power. Consequently, scientists at the SIT have equipped ShareKey with particularly resource-efficient communication protocols. Further, electronic keys are reliably protected on the from malware and unauthorized access. This is achieved by leveraging advanced technologies which keep sensitive data on the smartphone separate from other data and apps (e.g. Fraunhofer's BizzTrust).

Communication between the and a central server is protected by established security protocols. "And even if this communication is hacked into, it's impossible for unauthorized people to gain access to the digital key. This is because opening the door requires information contained both in the encrypted token sent to the user and in the app installed on their smartphone," clarifies Dmitrienko. Alongside front doors and parcel or locker compartments, the research scientist also suggests that the technology could potentially be applied to help administer keys in hotels or as part of car-sharing schemes. "The trend towards a 'shareconomy' will benefit the further development of this technology," concludes Dmitrienko. So the era of mobile phones as keys is one step closer.

Explore further: Cyclist's helmet, Volvo car to communicate for safety

add to favorites email to friend print save as pdf

Related Stories

Two cellphones in one

Oct 07, 2011

More and more companies are providing their employees with smartphones. While companies seek the best security available for their data, employees would also like to install apps of their own. Security experts have now developed ...

In a Stockholm hotel, mobile phones replace room keys

Nov 02, 2010

Check-in and check-out and even opening the door to your room -- a mobile phone is the only key you need at a Stockholm hotel conducting a pilot project of new mobile applications, the participating companies ...

Android mug shots have no lock and key

Mar 04, 2012

(PhysOrg.com) -- If Google loyalists will persist that this Internet Goliath can do no evil, they at least need to admit, based on new evidence this week, that Google can do a lot of mindless harm. A security ...

Recommended for you

Cyclist's helmet, Volvo car to communicate for safety

8 hours ago

Volvo calls it "a wearable life-saving wearable cycling tech concept." The car maker is referring to a connected car and helmet prototype that enables two-way communication between Volvo drivers and cyclists ...

California puzzles over safety of driverless cars

8 hours ago

California's Department of Motor Vehicles will miss a year-end deadline to adopt new rules for cars of the future because regulators first have to figure out how they'll know whether "driverless" vehicles ...

Cadillac CT6 will get streaming video mirror

Dec 20, 2014

Cadillac said Thursday it will add high resolution streaming video to the function of a rearview mirror, so that the driver's vision and safety can be enhanced. The technology will debut on the 2016 Cadillac ...

Poll: Americans skeptical of commercial drones (Update)

Dec 19, 2014

Americans broadly back tight regulations on commercial drone operators, according to a new Associated Press-GfK poll, as concerns about privacy and safety override the potential benefits of the heralded drone ...

Cheaper, more powerful VR system for engineers

Dec 17, 2014

It's like a scene from a gamer's wildest dreams: 12 high-definition, 55-inch 3D televisions all connected to a computer capable of supporting high-end, graphics-intensive gaming.

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.