Why Smartphone Apps Could Soon Replace Car Keys

Why Smartphone Apps Could Soon Replace Car Keys

Sooner or later, a smartphone app will be able to unlock your car. But what are the potential security issues that come with this new technology?

With global mobile phone usage expected to reach more than 5.5 billion users by 2022, the days without connectivity at our fingertips are long gone.

It appears that soon, the traditional car key will be extinct: firstly, replaced by contactless keys, and in the future, by smartphone apps. Here, CAT Autokeys discuss how soon this is likely to happen, and the potential security issues that come with this new technology.

How Would You Unlock Your Car via a Smartphone App?

Advancements in car connectivity technology have been ever-increasing, and it’s predicted that soon, car owners will be able to unlock – and even start their own cars – by using apps that have been downloaded on their mobile phone.

In order to lock, unlock and start their cars, owners will need a “direct link to the secure element of the device;” and this is predicted to help reduce the risk of car theft.

The information that’s sent through this link will use a secured short-range connection, which means that owners must be in close proximity of their vehicle – much like if they were to make a contactless debit or credit card payment (i.e. closer to the car than you would with a traditional car key).

The way this would work, is once next to the car, the owner would place their phone by the door handle, and scan their fingerprint to unlock their vehicle.

If the owner wants to grant someone else access, they would share a passcode with them; and that’s also a solution for anyone who wants to enter a hire car.

How Soon Is This Technology Likely to Be Rolled Out?

Plans for smartphone apps to replace traditional keys are part of new developments from the cross-industry technology body, the Car Connectivity Consortium (CCC). This brings together well-known car brands such as BMW, Audi, Volkswagen and General Motors, alongside leading technology companies including Panasonic and Apple.

Right now, this contactless car key technology exists merely in a ‘Release 1.0’ phase, which “provides a generalized deployment method that allows vehicle OEMs (suppliers) to securely transfer a digital key implementation to a smart device”.

The ‘Release 2.0’ version has an anticipated launch date of early 2019, which will enable the technology to become both more scalable and affordable to implement.

Plus, the fact that so many car makers have been directly involved in the development, it’s likely that this digital key feature will be introduced to many car brands once the technology has reached the maturity stage.

Which Brands Are Already Backing the Move?

Whilst the CCC is aiming to make the technology more widespread, you may be surprised to know that it’s not the first group to try and implement this technology. That would be Volvo, who trialed a smartphone-based system back in 2016.

In fact, even now certain brands are actively using this technology with customers. For example, Tesla owners are already able to use a dedicated app as opposed to a key, to access their Model S, Model X and Model 3 vehicles. The other feature they boast is the ability for the car owner to limit the top speed and acceleration whilst someone else is driving their car.

BMW have also created an app that enables drivers to access their car, as opposed to using a traditional car key.

Should We Be Worrying About Security Issues?

New technologies always raise security concerns, but the fact is, with technology constantly evolving, companies are aware of potential issues, and can work to limit them.

The CCC have spoken out before about the technology currently used by Tesla and BMW, and have deemed it to be less safe than what they’re developing; assuring their new system will bring about “the highest state-of-the-art security level for vehicle access”.

Existing keyless entry systems have been exploited by criminals, who have been able to gain entry and even start a car by purchasing electronic devices online. In some cases, they’ve even been able to access gadgets which can programmed blank fobs to work with specific cars in seconds – that’s not at all ideal.

One aspect introduced into the CCC’s technology to reduce the risk of theft is to revoke all keys once a car has been sold. This means that if someone were to sell their car and had shared their digital pass with someone else; the new owner won’t have to worry about other people accessing their car.

To conclude, whilst there are some examples of existing smartphone apps enabling car owners to enter their cars, this technology is still very much in the developmental stage. Security concerns will naturally rise, but the CCC has the time to review these issues, and put plans into place to minimize the risk. For the motoring industry, this is certainly an exciting breakthrough, and is one to watch over the coming months and years.

Featured

  • It Always Rains in Florida

    Over the years, and many trips to various cities, I have experienced some of the craziest memorable things. One thing I always count on when going to Orlando is a massive rainstorm after the tradeshow has concluded the first day. Count on it, it is going to rain Monday evening. Expect that it will be a gully washer. Read Now

    • Industry Events
  • Live from GSX 2024 Preview

    It’s hard to believe, but GSX 2024 is almost here. This year’s show runs from Monday, September 23 to Wednesday, September 25 at the Orange County Convention Center in Orlando, Fla. The Campus Security Today and Security Today staff will be on hand to provide live updates about the security industry’s latest innovations, trends, and products. Whether you’re attending the show or keeping tabs on it from afar, we’ve got you covered. Make sure to follow the Live from GSX page for photos, videos, interviews, product demonstrations, announcements, commentary, and more from the heart of the show floor! Read Now

    • Industry Events
  • Elevate Your Business

    In today’s dynamic business environment, companies specializing in physical security are constantly evolving to remain competitive. One strategic shift these businesses can make to give them the advantage is a full or partial transition to a recurring revenue model, popularly called a subscription service. This approach will bring numerous benefits that not only enhance business stability but also improve customer relationships and drive innovation. Recurring monthly revenue (RMR) or recurring annual revenue (RAR) are two recurring cadence choices that work simply and effectively. Read Now

  • Playing a Crucial Role

    Physical security technology plays a crucial role in detecting and preventing insider cybersecurity threats. While it might seem like a stretch to connect physical security with cyber threats, the two are closely intertwined. Here’s how physical security technology can be leveraged to address both external and internal threats. Read Now

Featured Cybersecurity

Webinars

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation. 3