Remote access anywhere, anytime

SMART Access & Identity 2023 Access Control & Identity Management

NoKey from Secutel Technologies is an enterprise-grade, cloud-based access control solution with no need for access control cards, fingerprint readers, tags, or keys.

The NoKey.io cloud platform ensures end-to-end security and is applicable for access control and key control in commercial applications. Businesses can manage credentials from a central access control system and easily issue mobile keys to mobile phones using Bluetooth technology.

A secure Bluetooth connection can be established from the distance of a few metres, giving it a noticeable edge over traditional RFID card technologies, which have a read range of about a few centimetres.

A secure encrypted link has been developed for the Bluetooth connection between a registered phone and NoKey access points, without the need to pair the devices. Phone-specific certificates are stored and presented from the phone directly to the access point. NOKEY uses a proprietary protocol between the web app and NOKEY access point for additional security and performance. The system can support multiple alarms per access point device to allow for different partitions (or partition sets) to be armed or disarmed. Events can be viewed on both the phone app and the web app.

Mobile access credentials are a secure way for authorised key holders to access a specific location. The registered mobile-enabled employees can enter a specific physical location with a few clicks on their phones. As opposed to printed identity cards and physical documents, mobile access control offers a more convenient experience for both workers and administrators. Users can use fingerprint or facial recognition on smartphones, and/or PINs on any Android (IOS to follow soon) mobile phone with Bluetooth.

The NoKey system has been designed to take all security aspects into account, to ensure private and secure access control. The system’s security relies heavily on the proven security of asymmetric cryptography. Each interface, and functional unit, are protected by utilising proven security cryptographic technologies and principles.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

You cannot bribe a computer
Access Control & Identity Management Security Services & Risk Management
Corruption is a cancer that destroys the prospects and stability of countries and businesses. It widens wealth gaps and punishes the poor. It costs countries many billions in lost revenue.

Read more...
Heightening physical security at military base
Turnstar Systems Access Control & Identity Management Government and Parastatal (Industry) Products
Turnstar Systems recently installed two 3-metre Velocity Raptor traffic spikes at the South African National Defence Force (SANDF) Randfontein military base on Gauteng’s West Rand.

Read more...
Zero Trust to dominate 2023
Cyber Security Access Control & Identity Management
Traditional ways of safeguarding data are no longer sufficient in 2023. Zero Trust has emerged as a more proactive way for businesses to keep their systems, data, and networks protected against compromise.

Read more...
Turnstar opens an office in the UK
Turnstar Systems News Access Control & Identity Management
Turnstar Systems recently established an office in the Greater Manchester borough in the North East of England, as part of the company’s ongoing expansion strategy.

Read more...
Enkulu Technologies to distribute Brazil’s Control iD
News Access Control & Identity Management Products
Enkulu Technologies has been appointed as the first South African distributor of Control iD products; a Brazilian company offering a T&A range of solutions based on its range of biometric products.

Read more...
HID Technology Seminar
Technews Publishing HID Global News Access Control & Identity Management Products
HID Global’s technology seminar introduced partners and distributors to the company’s new Signo range of readers and highlighted the benefits and global growth of mobile access credentials.

Read more...
Celebrating a successful year
Gallagher Technews Publishing News Access Control & Identity Management Products
Gallagher Security hosted an end-of year event at the Steyn City Equestrian Centre in which it thanked its partners for another successful year and provided a glimpse into what the company will be releasing in 2023.

Read more...
Innovation and service, 37 years and counting
Technews Publishing Impro Technologies Access Control & Identity Management Integrated Solutions
Innovation, simplicity and trust underpin the nearly 40 years of success of local access control brand, Impro Technologies, which is still run as an independent entity despite being acquired by ASSA ABLOY in 2016.

Read more...
Secure and private access in the cloud
Secutel Technologies Education (Industry)
Combining the idea of touchless and mobile access control, Secutel Technologies has developed NoKey, a secure keyless access control system using biometrics and BLE technology to ensure the user is present to open the door.

Read more...
Access control for one of Britain’s oldest boarding schools
Access Control & Identity Management Education (Industry) Products
In 2022, Christ’s Hospital School, which hosts 18 boarding houses on site, needed to replace its access control security system with a new solution that would be simple to manage and maintain.

Read more...