SlideShare a Scribd company logo
With Narrowband Smartlock
installed on your deadbolt on
the inside of your door your
smartphone becomes your
new door key providing you
with complete, touchless and
keyless unlocking to
help stop the spread of
coronavirus.
When you arrive home
Narrowband Smartlock
detects your smartphone in
your pocket or bag, and
automatically unlocks,
enabling you to enter your
home without touching
your door handle.
Stick our cover over your separate
lock latch or remove the handle
latch completely (the deadbolt
gives you all the security you
need) allowing you to kick open
your door, or use your elbow.
When you enter your home, your door closes shut behind you (with our
doorcloser included) triggering Narrowband Smartlock to automatically lock.
Its totally touchless
NB IoT is currently
available in 120
countries on 57 mobile
operator networks
Easy to install
Attach Narrowband Smartlock over
your existing deadbolt in minutes
with only a screwdriver. ally lock.
Also includes keycard
system – in case your
phone battery dies, or
you want to go out
without your phone
Narrowband Smartlock comes
with free Digital Keys apps for
Android and iOS iPhone.
Download from the App Store and
Google Play store.
You can make a digital key in
seconds and email it to friends
and family (unlimited digital keys).
You can also cancel the digital
keys at anytime, and get an
activity log notifications - you
always remain in control of your
Narrowband Smartlock
Always Alert Like an Alarm System
Narrowband Smartlock senses any door
movement (e.g vibrations) when it’s locked. You’ll
receive a notification anywhere in the world if
anyone tampers with your door, or tries to force
your door open.
Unprecedented Security
NarrowBand Smartlock uses NB IoT
technology enabling you to take
advantage of the most sophisticated
security features and encryptions
already in-built into the mobile
networks. Over the last 50 years the
telco’s have spent tens of billions of
dollars on perfecting security features
in their mobile networks, and now it’s
finally available for all of us to use in
smartlocks and other smart home
devices. Only you have access to
your data, which is hosted at Amazon
Web Services (AWS) in local
countries.
Learn More at
https://www.digitalkeys.io/

More Related Content

What's hot

Monitronics powerpoint
Monitronics powerpointMonitronics powerpoint
Monitronics powerpoint
Keith Blake
 
Informe CLIL i video Comunicació.
Informe CLIL i video Comunicació.Informe CLIL i video Comunicació.
Informe CLIL i video Comunicació.
lluís nater
 
Enterprise Workflow Management System
Enterprise Workflow Management SystemEnterprise Workflow Management System
Enterprise Workflow Management System
NewDVR(S) Pte Ltd
 
Silentel_brochure_2015 EN 1Page
Silentel_brochure_2015 EN 1PageSilentel_brochure_2015 EN 1Page
Silentel_brochure_2015 EN 1PagePeter Doh
 
Smart home in the insurance industry
Smart home in the insurance industrySmart home in the insurance industry
Smart home in the insurance industry
markusmanniic
 
INFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile ComputingINFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile Computing
Jaymie Murray
 
Smart Home Automation System ALAYOUBI TECHNOLOGIES
Smart Home Automation System ALAYOUBI TECHNOLOGIESSmart Home Automation System ALAYOUBI TECHNOLOGIES
Smart Home Automation System ALAYOUBI TECHNOLOGIES
مهند محمد أيوب
 
Security systems for your smart home
Security systems for your smart home Security systems for your smart home
Security systems for your smart home
Abdul Rehman Al Balushi
 
Lixodex Outdoor Grounds Security System
Lixodex Outdoor Grounds Security SystemLixodex Outdoor Grounds Security System
Lixodex Outdoor Grounds Security System
Thomas Hill
 
Smart Armor Integrated 2.12.15
Smart Armor Integrated 2.12.15Smart Armor Integrated 2.12.15
Smart Armor Integrated 2.12.15Harry Danilevics
 
Security System
Security SystemSecurity System
Security System
alphasecurityconcepts.com
 
Lea 2 protective locks and Keys
Lea 2 protective locks and KeysLea 2 protective locks and Keys
Lea 2 protective locks and Keys
Colline Pecdasen
 
Wireless home security
Wireless home securityWireless home security
Wireless home security
morlesharma
 
Block Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networksBlock Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networks
Block Armour
 

What's hot (14)

Monitronics powerpoint
Monitronics powerpointMonitronics powerpoint
Monitronics powerpoint
 
Informe CLIL i video Comunicació.
Informe CLIL i video Comunicació.Informe CLIL i video Comunicació.
Informe CLIL i video Comunicació.
 
Enterprise Workflow Management System
Enterprise Workflow Management SystemEnterprise Workflow Management System
Enterprise Workflow Management System
 
Silentel_brochure_2015 EN 1Page
Silentel_brochure_2015 EN 1PageSilentel_brochure_2015 EN 1Page
Silentel_brochure_2015 EN 1Page
 
Smart home in the insurance industry
Smart home in the insurance industrySmart home in the insurance industry
Smart home in the insurance industry
 
INFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile ComputingINFOGRAPHIC: The Evolution of Secure Mobile Computing
INFOGRAPHIC: The Evolution of Secure Mobile Computing
 
Smart Home Automation System ALAYOUBI TECHNOLOGIES
Smart Home Automation System ALAYOUBI TECHNOLOGIESSmart Home Automation System ALAYOUBI TECHNOLOGIES
Smart Home Automation System ALAYOUBI TECHNOLOGIES
 
Security systems for your smart home
Security systems for your smart home Security systems for your smart home
Security systems for your smart home
 
Lixodex Outdoor Grounds Security System
Lixodex Outdoor Grounds Security SystemLixodex Outdoor Grounds Security System
Lixodex Outdoor Grounds Security System
 
Smart Armor Integrated 2.12.15
Smart Armor Integrated 2.12.15Smart Armor Integrated 2.12.15
Smart Armor Integrated 2.12.15
 
Security System
Security SystemSecurity System
Security System
 
Lea 2 protective locks and Keys
Lea 2 protective locks and KeysLea 2 protective locks and Keys
Lea 2 protective locks and Keys
 
Wireless home security
Wireless home securityWireless home security
Wireless home security
 
Block Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networksBlock Armour securing critical IoT infrastructure and 5g networks
Block Armour securing critical IoT infrastructure and 5g networks
 

Similar to Narrowband-IoT (NB IoT) Smartlock Presentation

Zahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptxZahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptx
Zahida26
 
Smart things
Smart thingsSmart things
Smart things
Priyal Bhagat
 
MNT PDF.pdf
MNT PDF.pdfMNT PDF.pdf
MNT PDF.pdf
Mahitact123
 
OTP REVIEW (1).pptx
OTP REVIEW (1).pptxOTP REVIEW (1).pptx
OTP REVIEW (1).pptx
RakeshAnna2
 
Door lock and camera system solutions
Door lock and camera system solutionsDoor lock and camera system solutions
Door lock and camera system solutions
Mobiloitte
 
Smart systems design in usa.docx
Smart systems design in usa.docxSmart systems design in usa.docx
Smart systems design in usa.docx
Graffiti digital marketing
 
2015 catalogue
2015 catalogue2015 catalogue
2015 catalogue
easyLive Systems Ltd
 
2015 catalogue
2015 catalogue2015 catalogue
2015 catalogue
Ndaiga Ngatia
 
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULEOTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
KethavathSrinu
 
easyLive 2015 catalogue smart solutions
easyLive 2015 catalogue smart solutionseasyLive 2015 catalogue smart solutions
easyLive 2015 catalogue smart solutions
easyLive Systems Ltd
 
Acrotics Automation Brochure
Acrotics Automation Brochure Acrotics Automation Brochure
Acrotics Automation Brochure
Ritesh Bhagat
 
Smart home faq
Smart home faqSmart home faq
Smart home faq
Reena Arya
 
9 Internet of Things Devices You Must Try
9 Internet of Things Devices You Must Try9 Internet of Things Devices You Must Try
9 Internet of Things Devices You Must Try
IQVIS
 
Sushil Shinde - Copy
Sushil Shinde - CopySushil Shinde - Copy
Sushil Shinde - CopyAkshit Shah
 
Smart Home.docx
Smart Home.docxSmart Home.docx
Smart Home.docx
pritishah76
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET Journal
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf
 

Similar to Narrowband-IoT (NB IoT) Smartlock Presentation (20)

Zahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptxZahida_IOTDevice_Presentation.pptx
Zahida_IOTDevice_Presentation.pptx
 
Smart things
Smart thingsSmart things
Smart things
 
MNT PDF.pdf
MNT PDF.pdfMNT PDF.pdf
MNT PDF.pdf
 
Smartthings
SmartthingsSmartthings
Smartthings
 
OTP REVIEW (1).pptx
OTP REVIEW (1).pptxOTP REVIEW (1).pptx
OTP REVIEW (1).pptx
 
Door lock and camera system solutions
Door lock and camera system solutionsDoor lock and camera system solutions
Door lock and camera system solutions
 
Smart systems design in usa.docx
Smart systems design in usa.docxSmart systems design in usa.docx
Smart systems design in usa.docx
 
2015 catalogue
2015 catalogue2015 catalogue
2015 catalogue
 
2015 catalogue
2015 catalogue2015 catalogue
2015 catalogue
 
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULEOTP BASED SMART LOCK SYSTEM USING GSM MODULE
OTP BASED SMART LOCK SYSTEM USING GSM MODULE
 
easyLive 2015 catalogue smart solutions
easyLive 2015 catalogue smart solutionseasyLive 2015 catalogue smart solutions
easyLive 2015 catalogue smart solutions
 
Acrotics Automation Brochure
Acrotics Automation Brochure Acrotics Automation Brochure
Acrotics Automation Brochure
 
Smart home faq
Smart home faqSmart home faq
Smart home faq
 
9 Internet of Things Devices You Must Try
9 Internet of Things Devices You Must Try9 Internet of Things Devices You Must Try
9 Internet of Things Devices You Must Try
 
Sushil Shinde - Copy
Sushil Shinde - CopySushil Shinde - Copy
Sushil Shinde - Copy
 
ppt2 (1).pptx
ppt2 (1).pptxppt2 (1).pptx
ppt2 (1).pptx
 
Smart Home.docx
Smart Home.docxSmart Home.docx
Smart Home.docx
 
IRJET- Design and Implementation of Smart Home Security System based on IoT
IRJET-  	  Design and Implementation of Smart Home Security System based on IoTIRJET-  	  Design and Implementation of Smart Home Security System based on IoT
IRJET- Design and Implementation of Smart Home Security System based on IoT
 
NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2NWSLTR_Volume5_Issue2
NWSLTR_Volume5_Issue2
 
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdfidsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
idsecconf2023 - Rama Tri Nanda - Hacking Smart Doorbell.pdf
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Narrowband-IoT (NB IoT) Smartlock Presentation

  • 1.
  • 2. With Narrowband Smartlock installed on your deadbolt on the inside of your door your smartphone becomes your new door key providing you with complete, touchless and keyless unlocking to help stop the spread of coronavirus.
  • 3. When you arrive home Narrowband Smartlock detects your smartphone in your pocket or bag, and automatically unlocks, enabling you to enter your home without touching your door handle.
  • 4. Stick our cover over your separate lock latch or remove the handle latch completely (the deadbolt gives you all the security you need) allowing you to kick open your door, or use your elbow.
  • 5. When you enter your home, your door closes shut behind you (with our doorcloser included) triggering Narrowband Smartlock to automatically lock.
  • 7.
  • 8. NB IoT is currently available in 120 countries on 57 mobile operator networks
  • 9. Easy to install Attach Narrowband Smartlock over your existing deadbolt in minutes with only a screwdriver. ally lock.
  • 10. Also includes keycard system – in case your phone battery dies, or you want to go out without your phone
  • 11.
  • 12. Narrowband Smartlock comes with free Digital Keys apps for Android and iOS iPhone. Download from the App Store and Google Play store. You can make a digital key in seconds and email it to friends and family (unlimited digital keys). You can also cancel the digital keys at anytime, and get an activity log notifications - you always remain in control of your Narrowband Smartlock
  • 13. Always Alert Like an Alarm System Narrowband Smartlock senses any door movement (e.g vibrations) when it’s locked. You’ll receive a notification anywhere in the world if anyone tampers with your door, or tries to force your door open.
  • 14. Unprecedented Security NarrowBand Smartlock uses NB IoT technology enabling you to take advantage of the most sophisticated security features and encryptions already in-built into the mobile networks. Over the last 50 years the telco’s have spent tens of billions of dollars on perfecting security features in their mobile networks, and now it’s finally available for all of us to use in smartlocks and other smart home devices. Only you have access to your data, which is hosted at Amazon Web Services (AWS) in local countries.
  • 15.
  • 16.
  • 17.