SlideShare a Scribd company logo
Designing A
Market-Ready
Digital Key
Solution
auto.bambooapps.eu
Challenges of designing digital key
solutions:
Fragmented adoption of wireless technologies
Stability of data exchange in any scenarios
Implementation and operational costs
Security of user’s data and vehicle resources
Power consumption
design and software studio auto.bambooapps.eu
design and software studio auto.bambooapps.eu
Creating a secure and efficient device-to-vehicle
communication flow
Choosing the right communication protocols
How can the challenges be
addressed in the R&D stage?
Device-to-vehicle communication
models
Back-еnd based communication
design and software studio auto.bambooapps.eu
Special mobile app
sends a request to the
cloud to open
a vehicle
If cloud authorizes the
access, it sends
a message to a vehicle
to unlock the door
design and software studio auto.bambooapps.eu
Device-to-vehicle communication
models
Direct communication
Back-End based model Direct model
Communication protocols for
data exchange models
design and software studio auto.bambooapps.eu
Cellular UWB NFC
Wi-Fi BLE
Bamboo Apps combined two data exchange methods and BLE to
design a lean smartphone-to-car communication flow.
design and software studio auto.bambooapps.eu
Benefits of using both
device-to-vehicle communication
models
design and software studio auto.bambooapps.eu
Guaranteed data transmission in any environments
High level of security of all connections
Sufficient functionality for all use cases
Interoperability and ease of adoption
Benefits of using BLE for digital
key solution
design and software studio auto.bambooapps.eu
High level of adoption in cars and smart devices
High data transmission capability and short delay time
High reliability
Low power consumption
Security
TLS encryption of all connections
Multiple authorization options (PIN, Face ID, Touch ID)
Additional security features
Additional layers of authorization and encryption
design and software studio auto.bambooapps.eu
User can lock/
unlock the
vehicle
User can view
status of the
vehicle
No BLE signal. User
can see last status of
the vehicle
30m3m
‘Read’ and ‘write’ modes
design and software studio auto.bambooapps.eu
Additional security features
If during data transmission a car or a smartphone doesn’t receive a
response from a counterpart, a session is automatically ended. This
prevents:
replay
amplified replay
man-in-the-middle attacks
design and software studio auto.bambooapps.eu
Integrity control of sessions
Additional security features
Read the full case study on
designing market-ready digital
key solutions with BLE
design and software studio auto.bambooapps.eu
Download
Device-to-Vehicle
Communication Flow
For Market-Ready Digital
Key Solutions
About Bamboo Apps
At Bamboo Apps, we design and develop solutions in connectivity,
infotainment and HMI domains. Our expertise and experience help our
clients successfully respond to digital disruption and shape new trends in
automotive.
Harju maakond, Tallinn, Kesklinna linnaosa,
Maakri tn 19-7k, 10145, Estonia
www.auto.bambooapps.eu
contact@bambooapps.eu
+372 602-7353
design and software studio auto.bambooapps.eu

More Related Content

PDF
Automotive Cybersecurity Best Practices
PPTX
Two factor authentication presentation mcit
PPTX
Two Factor Authentication Made Easy ICWE 2015
PDF
Adding Two Factor Authentication to your App with Authy
PDF
Two-factor Authentication
PDF
Role of Cyber security in Automotive
PPTX
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
PDF
API Security and OAuth for the Enterprise
Automotive Cybersecurity Best Practices
Two factor authentication presentation mcit
Two Factor Authentication Made Easy ICWE 2015
Adding Two Factor Authentication to your App with Authy
Two-factor Authentication
Role of Cyber security in Automotive
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
API Security and OAuth for the Enterprise

What's hot (20)

PDF
Two-factor Authentication
PDF
Combat the Latest Two-Factor Authentication Evasion Techniques
PDF
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
PPTX
Seminar-Two Factor Authentication
PDF
Why Two-Factor Authentication?
PDF
API SECURITY by krishna murari and vikas maurya
PPTX
Two Factor Authentication: Easy Setup, Major Impact
PDF
Session 7 e_raja_kailar
PDF
Sp 29 two_factor_auth_guide
PDF
MARS User Login Logout MIS for Cisco Call Manager
PDF
SYPHERSAFE
PDF
3 reasons your business can't ignore Two-Factor Authentication
PPTX
The curious case of mobile app security.pptx
PDF
The Ultimate Security Checklist Before Launching Your Android App
PPTX
Building better security for your API platform using Azure API Management
PPTX
User Authentication for Government
PDF
Mobile SSO: Give App Users a Break from Typing Passwords
PDF
Jun 29 - 2016-MultiFactorAuthentication
PDF
Tamper Resistant Application Fortifies your Defense Against Hacking
PDF
STRONG AUTHENTICATION ... NO PASSWORDS
Two-factor Authentication
Combat the Latest Two-Factor Authentication Evasion Techniques
TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE
Seminar-Two Factor Authentication
Why Two-Factor Authentication?
API SECURITY by krishna murari and vikas maurya
Two Factor Authentication: Easy Setup, Major Impact
Session 7 e_raja_kailar
Sp 29 two_factor_auth_guide
MARS User Login Logout MIS for Cisco Call Manager
SYPHERSAFE
3 reasons your business can't ignore Two-Factor Authentication
The curious case of mobile app security.pptx
The Ultimate Security Checklist Before Launching Your Android App
Building better security for your API platform using Azure API Management
User Authentication for Government
Mobile SSO: Give App Users a Break from Typing Passwords
Jun 29 - 2016-MultiFactorAuthentication
Tamper Resistant Application Fortifies your Defense Against Hacking
STRONG AUTHENTICATION ... NO PASSWORDS
Ad

Similar to Designing A Market-Ready Digital Key Solution (20)

PPSX
information highway
PDF
AN UNIQUE SECURE AUTHENTICATION MECHANISM FOR CONTROL OF VEHICLE USING SMARTP...
PDF
VISIONFC Automotive Summit
DOCX
Seminar on Android Auto
PPT
Yared Hankins Wireless Key
PPTX
Bamboo Apps. Automotive Software Development.
KEY
Adaptive Intelligence: Dansby, Graham, Seley Final IXD Presentation
PPT
Telematics & Wireless Carriers
PDF
CARRemote
PPTX
Smart phones, big data & your car
PDF
V2V- Vehicle to Vehicle Communication
PPTX
The Connected Car: Impact on Wireless Communication
PDF
droidcon 2012: The Android passenger, Joerg Decker, Capgemini
PPTX
Vanets
PPSX
Connected Cars by Akshat Kant
PDF
Rugged Industrial Tablet - BTAL BT77
PDF
Meetup #7 Voiture Connectée et Autonome à Paris
PDF
Connections Summit - Security & Blockchain Track
PDF
Smartphone & Embedded Connectivity Vehicle Integration 2014 - Embedded System...
PDF
Grand theft-auto-digital-key-hacking
information highway
AN UNIQUE SECURE AUTHENTICATION MECHANISM FOR CONTROL OF VEHICLE USING SMARTP...
VISIONFC Automotive Summit
Seminar on Android Auto
Yared Hankins Wireless Key
Bamboo Apps. Automotive Software Development.
Adaptive Intelligence: Dansby, Graham, Seley Final IXD Presentation
Telematics & Wireless Carriers
CARRemote
Smart phones, big data & your car
V2V- Vehicle to Vehicle Communication
The Connected Car: Impact on Wireless Communication
droidcon 2012: The Android passenger, Joerg Decker, Capgemini
Vanets
Connected Cars by Akshat Kant
Rugged Industrial Tablet - BTAL BT77
Meetup #7 Voiture Connectée et Autonome à Paris
Connections Summit - Security & Blockchain Track
Smartphone & Embedded Connectivity Vehicle Integration 2014 - Embedded System...
Grand theft-auto-digital-key-hacking
Ad

Recently uploaded (20)

PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
Digital Systems & Binary Numbers (comprehensive )
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Nekopoi APK 2025 free lastest update
PPTX
history of c programming in notes for students .pptx
PPTX
Transform Your Business with a Software ERP System
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
PDF
Salesforce Agentforce AI Implementation.pdf
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PPTX
Oracle Fusion HCM Cloud Demo for Beginners
PPTX
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PDF
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
Designing Intelligence for the Shop Floor.pdf
Monitoring Stack: Grafana, Loki & Promtail
Digital Systems & Binary Numbers (comprehensive )
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
wealthsignaloriginal-com-DS-text-... (1).pdf
Nekopoi APK 2025 free lastest update
history of c programming in notes for students .pptx
Transform Your Business with a Software ERP System
Design an Analysis of Algorithms I-SECS-1021-03
CHAPTER 2 - PM Management and IT Context
CCleaner Pro 6.38.11537 Crack Final Latest Version 2025
Salesforce Agentforce AI Implementation.pdf
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Oracle Fusion HCM Cloud Demo for Beginners
AMADEUS TRAVEL AGENT SOFTWARE | AMADEUS TICKETING SYSTEM
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Advanced SystemCare Ultimate Crack + Portable (2025)
iTop VPN 6.5.0 Crack + License Key 2025 (Premium Version)
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf

Designing A Market-Ready Digital Key Solution

  • 2. Challenges of designing digital key solutions: Fragmented adoption of wireless technologies Stability of data exchange in any scenarios Implementation and operational costs Security of user’s data and vehicle resources Power consumption design and software studio auto.bambooapps.eu
  • 3. design and software studio auto.bambooapps.eu Creating a secure and efficient device-to-vehicle communication flow Choosing the right communication protocols How can the challenges be addressed in the R&D stage?
  • 4. Device-to-vehicle communication models Back-еnd based communication design and software studio auto.bambooapps.eu Special mobile app sends a request to the cloud to open a vehicle If cloud authorizes the access, it sends a message to a vehicle to unlock the door
  • 5. design and software studio auto.bambooapps.eu Device-to-vehicle communication models Direct communication
  • 6. Back-End based model Direct model Communication protocols for data exchange models design and software studio auto.bambooapps.eu Cellular UWB NFC Wi-Fi BLE
  • 7. Bamboo Apps combined two data exchange methods and BLE to design a lean smartphone-to-car communication flow. design and software studio auto.bambooapps.eu
  • 8. Benefits of using both device-to-vehicle communication models design and software studio auto.bambooapps.eu Guaranteed data transmission in any environments High level of security of all connections Sufficient functionality for all use cases Interoperability and ease of adoption
  • 9. Benefits of using BLE for digital key solution design and software studio auto.bambooapps.eu High level of adoption in cars and smart devices High data transmission capability and short delay time High reliability Low power consumption Security
  • 10. TLS encryption of all connections Multiple authorization options (PIN, Face ID, Touch ID) Additional security features Additional layers of authorization and encryption design and software studio auto.bambooapps.eu
  • 11. User can lock/ unlock the vehicle User can view status of the vehicle No BLE signal. User can see last status of the vehicle 30m3m ‘Read’ and ‘write’ modes design and software studio auto.bambooapps.eu Additional security features
  • 12. If during data transmission a car or a smartphone doesn’t receive a response from a counterpart, a session is automatically ended. This prevents: replay amplified replay man-in-the-middle attacks design and software studio auto.bambooapps.eu Integrity control of sessions Additional security features
  • 13. Read the full case study on designing market-ready digital key solutions with BLE design and software studio auto.bambooapps.eu Download Device-to-Vehicle Communication Flow For Market-Ready Digital Key Solutions
  • 14. About Bamboo Apps At Bamboo Apps, we design and develop solutions in connectivity, infotainment and HMI domains. Our expertise and experience help our clients successfully respond to digital disruption and shape new trends in automotive. Harju maakond, Tallinn, Kesklinna linnaosa, Maakri tn 19-7k, 10145, Estonia www.auto.bambooapps.eu contact@bambooapps.eu +372 602-7353 design and software studio auto.bambooapps.eu