Why Smartphone Apps Could Soon Replace Car Keys

Why Smartphone Apps Could Soon Replace Car Keys

Sooner or later, a smartphone app will be able to unlock your car. But what are the potential security issues that come with this new technology?

With global mobile phone usage expected to reach more than 5.5 billion users by 2022, the days without connectivity at our fingertips are long gone.

It appears that soon, the traditional car key will be extinct: firstly, replaced by contactless keys, and in the future, by smartphone apps. Here, CAT Autokeys discuss how soon this is likely to happen, and the potential security issues that come with this new technology.

How Would You Unlock Your Car via a Smartphone App?

Advancements in car connectivity technology have been ever-increasing, and it’s predicted that soon, car owners will be able to unlock – and even start their own cars – by using apps that have been downloaded on their mobile phone.

In order to lock, unlock and start their cars, owners will need a “direct link to the secure element of the device;” and this is predicted to help reduce the risk of car theft.

The information that’s sent through this link will use a secured short-range connection, which means that owners must be in close proximity of their vehicle – much like if they were to make a contactless debit or credit card payment (i.e. closer to the car than you would with a traditional car key).

The way this would work, is once next to the car, the owner would place their phone by the door handle, and scan their fingerprint to unlock their vehicle.

If the owner wants to grant someone else access, they would share a passcode with them; and that’s also a solution for anyone who wants to enter a hire car.

How Soon Is This Technology Likely to Be Rolled Out?

Plans for smartphone apps to replace traditional keys are part of new developments from the cross-industry technology body, the Car Connectivity Consortium (CCC). This brings together well-known car brands such as BMW, Audi, Volkswagen and General Motors, alongside leading technology companies including Panasonic and Apple.

Right now, this contactless car key technology exists merely in a ‘Release 1.0’ phase, which “provides a generalized deployment method that allows vehicle OEMs (suppliers) to securely transfer a digital key implementation to a smart device”.

The ‘Release 2.0’ version has an anticipated launch date of early 2019, which will enable the technology to become both more scalable and affordable to implement.

Plus, the fact that so many car makers have been directly involved in the development, it’s likely that this digital key feature will be introduced to many car brands once the technology has reached the maturity stage.

Which Brands Are Already Backing the Move?

Whilst the CCC is aiming to make the technology more widespread, you may be surprised to know that it’s not the first group to try and implement this technology. That would be Volvo, who trialed a smartphone-based system back in 2016.

In fact, even now certain brands are actively using this technology with customers. For example, Tesla owners are already able to use a dedicated app as opposed to a key, to access their Model S, Model X and Model 3 vehicles. The other feature they boast is the ability for the car owner to limit the top speed and acceleration whilst someone else is driving their car.

BMW have also created an app that enables drivers to access their car, as opposed to using a traditional car key.

Should We Be Worrying About Security Issues?

New technologies always raise security concerns, but the fact is, with technology constantly evolving, companies are aware of potential issues, and can work to limit them.

The CCC have spoken out before about the technology currently used by Tesla and BMW, and have deemed it to be less safe than what they’re developing; assuring their new system will bring about “the highest state-of-the-art security level for vehicle access”.

Existing keyless entry systems have been exploited by criminals, who have been able to gain entry and even start a car by purchasing electronic devices online. In some cases, they’ve even been able to access gadgets which can programmed blank fobs to work with specific cars in seconds – that’s not at all ideal.

One aspect introduced into the CCC’s technology to reduce the risk of theft is to revoke all keys once a car has been sold. This means that if someone were to sell their car and had shared their digital pass with someone else; the new owner won’t have to worry about other people accessing their car.

To conclude, whilst there are some examples of existing smartphone apps enabling car owners to enter their cars, this technology is still very much in the developmental stage. Security concerns will naturally rise, but the CCC has the time to review these issues, and put plans into place to minimize the risk. For the motoring industry, this is certainly an exciting breakthrough, and is one to watch over the coming months and years.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • ComNet CNGE6FX2TX4PoE

    The ComNet cost-efficient CNGE6FX2TX4PoE is a six-port switch that offers four Gbps TX ports that support the IEEE802.3at standard and provide up to 30 watts of PoE to PDs. It also has a dedicated FX/TX combination port as well as a single FX SFP to act as an additional port or an uplink port, giving the user additional options in managing network traffic. The CNGE6FX2TX4PoE is designed for use in unconditioned environments and typically used in perimeter surveillance. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3