SlideShare a Scribd company logo
Designing A
Market-Ready
Digital Key
Solution
auto.bambooapps.eu
Challenges of designing digital key
solutions:
Fragmented adoption of wireless technologies
Stability of data exchange in any scenarios
Implementation and operational costs
Security of user’s data and vehicle resources
Power consumption
design and software studio auto.bambooapps.eu
design and software studio auto.bambooapps.eu
Creating a secure and efficient device-to-vehicle
communication flow
Choosing the right communication protocols
How can the challenges be
addressed in the R&D stage?
Device-to-vehicle communication
models
Back-еnd based communication
design and software studio auto.bambooapps.eu
Special mobile app
sends a request to the
cloud to open
a vehicle
If cloud authorizes the
access, it sends
a message to a vehicle
to unlock the door
design and software studio auto.bambooapps.eu
Device-to-vehicle communication
models
Direct communication
Back-End based model Direct model
Communication protocols for
data exchange models
design and software studio auto.bambooapps.eu
Cellular UWB NFC
Wi-Fi BLE
Bamboo Apps combined two data exchange methods and BLE to
design a lean smartphone-to-car communication flow.
design and software studio auto.bambooapps.eu
Benefits of using both
device-to-vehicle communication
models
design and software studio auto.bambooapps.eu
Guaranteed data transmission in any environments
High level of security of all connections
Sufficient functionality for all use cases
Interoperability and ease of adoption
Benefits of using BLE for digital
key solution
design and software studio auto.bambooapps.eu
High level of adoption in cars and smart devices
High data transmission capability and short delay time
High reliability
Low power consumption
Security
TLS encryption of all connections
Multiple authorization options (PIN, Face ID, Touch ID)
Additional security features
Additional layers of authorization and encryption
design and software studio auto.bambooapps.eu
User can lock/
unlock the
vehicle
User can view
status of the
vehicle
No BLE signal. User
can see last status of
the vehicle
30m3m
‘Read’ and ‘write’ modes
design and software studio auto.bambooapps.eu
Additional security features
If during data transmission a car or a smartphone doesn’t receive a
response from a counterpart, a session is automatically ended. This
prevents:
replay
amplified replay
man-in-the-middle attacks
design and software studio auto.bambooapps.eu
Integrity control of sessions
Additional security features
Read the full case study on
designing market-ready digital
key solutions with BLE
design and software studio auto.bambooapps.eu
Download
Device-to-Vehicle
Communication Flow
For Market-Ready Digital
Key Solutions
About Bamboo Apps
At Bamboo Apps, we design and develop solutions in connectivity,
infotainment and HMI domains. Our expertise and experience help our
clients successfully respond to digital disruption and shape new trends in
automotive.
Harju maakond, Tallinn, Kesklinna linnaosa,
Maakri tn 19-7k, 10145, Estonia
www.auto.bambooapps.eu
contact@bambooapps.eu
+372 602-7353
design and software studio auto.bambooapps.eu

More Related Content

What's hot

Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
PortalGuard dba PistolStar, Inc.
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
IBM Security
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
CTM360
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
Dilip Kr. Jangir
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
Fortytwo
 
API SECURITY by krishna murari and vikas maurya
API SECURITY by krishna murari and vikas mauryaAPI SECURITY by krishna murari and vikas maurya
API SECURITY by krishna murari and vikas maurya
Krishna Murari
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
Salesforce Admins
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
Hai Nguyen
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
Hai Nguyen
 
MARS User Login Logout MIS for Cisco Call Manager
MARS User Login Logout MIS for Cisco Call ManagerMARS User Login Logout MIS for Cisco Call Manager
MARS User Login Logout MIS for Cisco Call Manager
PRANJOL SAIKIA
 
SYPHERSAFE
SYPHERSAFESYPHERSAFE
SYPHERSAFE
Mustafa Kuğu
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
Fortytwo
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptx
Ankit Giri
 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android App
Appknox
 
Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API Management
Eldert Grootenboer
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
Carahsoft
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing Passwords
CA API Management
 
Jun 29 - 2016-MultiFactorAuthentication
Jun 29 - 2016-MultiFactorAuthentication Jun 29 - 2016-MultiFactorAuthentication
Jun 29 - 2016-MultiFactorAuthentication
banerjeea
 
Tamper Resistant Application Fortifies your Defense Against Hacking
Tamper Resistant Application Fortifies your Defense Against HackingTamper Resistant Application Fortifies your Defense Against Hacking
Tamper Resistant Application Fortifies your Defense Against Hacking
Flexera
 
STRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSSTRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDS
RapidSSLOnline.com
 

What's hot (20)

Two-factor Authentication
Two-factor AuthenticationTwo-factor Authentication
Two-factor Authentication
 
Combat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion TechniquesCombat the Latest Two-Factor Authentication Evasion Techniques
Combat the Latest Two-Factor Authentication Evasion Techniques
 
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDETWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
Why Two-Factor Authentication?
Why Two-Factor Authentication?Why Two-Factor Authentication?
Why Two-Factor Authentication?
 
API SECURITY by krishna murari and vikas maurya
API SECURITY by krishna murari and vikas mauryaAPI SECURITY by krishna murari and vikas maurya
API SECURITY by krishna murari and vikas maurya
 
Two Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major ImpactTwo Factor Authentication: Easy Setup, Major Impact
Two Factor Authentication: Easy Setup, Major Impact
 
Session 7 e_raja_kailar
Session 7 e_raja_kailarSession 7 e_raja_kailar
Session 7 e_raja_kailar
 
Sp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guideSp 29 two_factor_auth_guide
Sp 29 two_factor_auth_guide
 
MARS User Login Logout MIS for Cisco Call Manager
MARS User Login Logout MIS for Cisco Call ManagerMARS User Login Logout MIS for Cisco Call Manager
MARS User Login Logout MIS for Cisco Call Manager
 
SYPHERSAFE
SYPHERSAFESYPHERSAFE
SYPHERSAFE
 
3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication3 reasons your business can't ignore Two-Factor Authentication
3 reasons your business can't ignore Two-Factor Authentication
 
The curious case of mobile app security.pptx
The curious case of mobile app security.pptxThe curious case of mobile app security.pptx
The curious case of mobile app security.pptx
 
The Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android AppThe Ultimate Security Checklist Before Launching Your Android App
The Ultimate Security Checklist Before Launching Your Android App
 
Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API Management
 
User Authentication for Government
User Authentication for GovernmentUser Authentication for Government
User Authentication for Government
 
Mobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing PasswordsMobile SSO: Give App Users a Break from Typing Passwords
Mobile SSO: Give App Users a Break from Typing Passwords
 
Jun 29 - 2016-MultiFactorAuthentication
Jun 29 - 2016-MultiFactorAuthentication Jun 29 - 2016-MultiFactorAuthentication
Jun 29 - 2016-MultiFactorAuthentication
 
Tamper Resistant Application Fortifies your Defense Against Hacking
Tamper Resistant Application Fortifies your Defense Against HackingTamper Resistant Application Fortifies your Defense Against Hacking
Tamper Resistant Application Fortifies your Defense Against Hacking
 
STRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDSSTRONG AUTHENTICATION ... NO PASSWORDS
STRONG AUTHENTICATION ... NO PASSWORDS
 

Similar to Designing A Market-Ready Digital Key Solution

Rc corporate profile_ss
Rc corporate profile_ssRc corporate profile_ss
Rc corporate profile_ss
Seema Abhilash
 
Manjunath_manikumar
Manjunath_manikumarManjunath_manikumar
Manjunath_manikumar
Manjunath Manikumar
 
Development tools : a key driver for the M2M market take-off
Development tools : a key driver for the M2M market take-offDevelopment tools : a key driver for the M2M market take-off
Development tools : a key driver for the M2M market take-off
simon_anyware
 
Android auto
Android autoAndroid auto
Android auto
dhiraj007
 
poster presentation
poster presentationposter presentation
poster presentation
Bhanuprakash K
 
Mobile Application Developer
Mobile Application DeveloperMobile Application Developer
Mobile Application Developer
Er. Amreesh Kumar
 
Voip automation framework
Voip automation frameworkVoip automation framework
Voip automation framework
Happiest Minds Technologies
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected Car
Angel Villar Garea
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
ParthaS
 
Introducing ThinkPhone
Introducing ThinkPhoneIntroducing ThinkPhone
Introducing ThinkPhone
Richard Marshall
 
Automated Driving: Innovative Product Development & Safety
Automated Driving: Innovative Product Development & SafetyAutomated Driving: Innovative Product Development & Safety
Automated Driving: Innovative Product Development & Safety
AssociationofEquipmentManufacturers
 
NexGen Software Inc
NexGen Software IncNexGen Software Inc
NexGen Software Inc
pervinder
 
Litmus Automation_Connected Car Solution
Litmus Automation_Connected Car SolutionLitmus Automation_Connected Car Solution
Litmus Automation_Connected Car Solution
David Sidhu
 
Corporate profile
Corporate profileCorporate profile
Corporate profile
Rain Concert Technologies
 
Brochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentBrochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software development
Luxoft
 
Voice automator
Voice automatorVoice automator
Voice automator
Prafull Agrawal
 
IBM ARDIGO - SOIEL MOBILE BUSINESS ROMA 020713
IBM ARDIGO - SOIEL MOBILE BUSINESS ROMA 020713IBM ARDIGO - SOIEL MOBILE BUSINESS ROMA 020713
IBM ARDIGO - SOIEL MOBILE BUSINESS ROMA 020713
Max Ardigó 🇦🇷
 
Welcome.pdf
Welcome.pdfWelcome.pdf
Welcome.pdf
KARIA
 
Product Guide
Product GuideProduct Guide
Product Guide
NKonnect Infoway
 
Mobile Distillery professional services
Mobile Distillery professional servicesMobile Distillery professional services
Mobile Distillery professional services
Mobile Distillery
 

Similar to Designing A Market-Ready Digital Key Solution (20)

Rc corporate profile_ss
Rc corporate profile_ssRc corporate profile_ss
Rc corporate profile_ss
 
Manjunath_manikumar
Manjunath_manikumarManjunath_manikumar
Manjunath_manikumar
 
Development tools : a key driver for the M2M market take-off
Development tools : a key driver for the M2M market take-offDevelopment tools : a key driver for the M2M market take-off
Development tools : a key driver for the M2M market take-off
 
Android auto
Android autoAndroid auto
Android auto
 
poster presentation
poster presentationposter presentation
poster presentation
 
Mobile Application Developer
Mobile Application DeveloperMobile Application Developer
Mobile Application Developer
 
Voip automation framework
Voip automation frameworkVoip automation framework
Voip automation framework
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected Car
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
Introducing ThinkPhone
Introducing ThinkPhoneIntroducing ThinkPhone
Introducing ThinkPhone
 
Automated Driving: Innovative Product Development & Safety
Automated Driving: Innovative Product Development & SafetyAutomated Driving: Innovative Product Development & Safety
Automated Driving: Innovative Product Development & Safety
 
NexGen Software Inc
NexGen Software IncNexGen Software Inc
NexGen Software Inc
 
Litmus Automation_Connected Car Solution
Litmus Automation_Connected Car SolutionLitmus Automation_Connected Car Solution
Litmus Automation_Connected Car Solution
 
Corporate profile
Corporate profileCorporate profile
Corporate profile
 
Brochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software developmentBrochure of luxoft automotive software by luxoft software development
Brochure of luxoft automotive software by luxoft software development
 
Voice automator
Voice automatorVoice automator
Voice automator
 
IBM ARDIGO - SOIEL MOBILE BUSINESS ROMA 020713
IBM ARDIGO - SOIEL MOBILE BUSINESS ROMA 020713IBM ARDIGO - SOIEL MOBILE BUSINESS ROMA 020713
IBM ARDIGO - SOIEL MOBILE BUSINESS ROMA 020713
 
Welcome.pdf
Welcome.pdfWelcome.pdf
Welcome.pdf
 
Product Guide
Product GuideProduct Guide
Product Guide
 
Mobile Distillery professional services
Mobile Distillery professional servicesMobile Distillery professional services
Mobile Distillery professional services
 

Recently uploaded

E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
pavan998932
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 

Recently uploaded (20)

E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
What is Augmented Reality Image Tracking
What is Augmented Reality Image TrackingWhat is Augmented Reality Image Tracking
What is Augmented Reality Image Tracking
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 

Designing A Market-Ready Digital Key Solution

  • 2. Challenges of designing digital key solutions: Fragmented adoption of wireless technologies Stability of data exchange in any scenarios Implementation and operational costs Security of user’s data and vehicle resources Power consumption design and software studio auto.bambooapps.eu
  • 3. design and software studio auto.bambooapps.eu Creating a secure and efficient device-to-vehicle communication flow Choosing the right communication protocols How can the challenges be addressed in the R&D stage?
  • 4. Device-to-vehicle communication models Back-еnd based communication design and software studio auto.bambooapps.eu Special mobile app sends a request to the cloud to open a vehicle If cloud authorizes the access, it sends a message to a vehicle to unlock the door
  • 5. design and software studio auto.bambooapps.eu Device-to-vehicle communication models Direct communication
  • 6. Back-End based model Direct model Communication protocols for data exchange models design and software studio auto.bambooapps.eu Cellular UWB NFC Wi-Fi BLE
  • 7. Bamboo Apps combined two data exchange methods and BLE to design a lean smartphone-to-car communication flow. design and software studio auto.bambooapps.eu
  • 8. Benefits of using both device-to-vehicle communication models design and software studio auto.bambooapps.eu Guaranteed data transmission in any environments High level of security of all connections Sufficient functionality for all use cases Interoperability and ease of adoption
  • 9. Benefits of using BLE for digital key solution design and software studio auto.bambooapps.eu High level of adoption in cars and smart devices High data transmission capability and short delay time High reliability Low power consumption Security
  • 10. TLS encryption of all connections Multiple authorization options (PIN, Face ID, Touch ID) Additional security features Additional layers of authorization and encryption design and software studio auto.bambooapps.eu
  • 11. User can lock/ unlock the vehicle User can view status of the vehicle No BLE signal. User can see last status of the vehicle 30m3m ‘Read’ and ‘write’ modes design and software studio auto.bambooapps.eu Additional security features
  • 12. If during data transmission a car or a smartphone doesn’t receive a response from a counterpart, a session is automatically ended. This prevents: replay amplified replay man-in-the-middle attacks design and software studio auto.bambooapps.eu Integrity control of sessions Additional security features
  • 13. Read the full case study on designing market-ready digital key solutions with BLE design and software studio auto.bambooapps.eu Download Device-to-Vehicle Communication Flow For Market-Ready Digital Key Solutions
  • 14. About Bamboo Apps At Bamboo Apps, we design and develop solutions in connectivity, infotainment and HMI domains. Our expertise and experience help our clients successfully respond to digital disruption and shape new trends in automotive. Harju maakond, Tallinn, Kesklinna linnaosa, Maakri tn 19-7k, 10145, Estonia www.auto.bambooapps.eu contact@bambooapps.eu +372 602-7353 design and software studio auto.bambooapps.eu