Remote access anywhere, anytime

SMART Access & Identity 2023 Access Control & Identity Management

NoKey from Secutel Technologies is an enterprise-grade, cloud-based access control solution with no need for access control cards, fingerprint readers, tags, or keys.

The NoKey.io cloud platform ensures end-to-end security and is applicable for access control and key control in commercial applications. Businesses can manage credentials from a central access control system and easily issue mobile keys to mobile phones using Bluetooth technology.

A secure Bluetooth connection can be established from the distance of a few metres, giving it a noticeable edge over traditional RFID card technologies, which have a read range of about a few centimetres.

A secure encrypted link has been developed for the Bluetooth connection between a registered phone and NoKey access points, without the need to pair the devices. Phone-specific certificates are stored and presented from the phone directly to the access point. NOKEY uses a proprietary protocol between the web app and NOKEY access point for additional security and performance. The system can support multiple alarms per access point device to allow for different partitions (or partition sets) to be armed or disarmed. Events can be viewed on both the phone app and the web app.

Mobile access credentials are a secure way for authorised key holders to access a specific location. The registered mobile-enabled employees can enter a specific physical location with a few clicks on their phones. As opposed to printed identity cards and physical documents, mobile access control offers a more convenient experience for both workers and administrators. Users can use fingerprint or facial recognition on smartphones, and/or PINs on any Android (IOS to follow soon) mobile phone with Bluetooth.

The NoKey system has been designed to take all security aspects into account, to ensure private and secure access control. The system’s security relies heavily on the proven security of asymmetric cryptography. Each interface, and functional unit, are protected by utilising proven security cryptographic technologies and principles.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...
Access & identity expectations for 2024
Technews Publishing IDEMIA ZKTeco Gallagher Salto Systems Africa Regal Distributors SA Reditron Editor's Choice Access Control & Identity Management Information Security AI & Data Analytics
What does 2024 have in store for the access and identity industry? SMART Security Solutions asked several industry players for their brief thoughts on what they expect this year.

Read more...