Gemalto, the world leader in digital security, has partnered with Dessman to create a smart lock where users can secure doors with their smartphones as well as create digital key chains for multiple locks.
The mobile app is seen to enhance security compared to what a traditional lock can provide. The app would greatly benefit people who share accommodations as it can be used to create spare or temporary virtual keys remotely. It would enable users to track and monitor who unlocked a door recently and, if a door is forced, the application can send instant notifications and automatically trigger the lock's built-in alarm.
The smart lock market is likely to expand rapidly over the next few years. According to Transparency Market Research, its compound annual growth rate is estimated to reach up to 18.3 percent, leading to a substantial increase in market value, from US$226.7 million in 2016 to US$1.01 billion by 2024. Rising standards of living and an increased awareness about physical security and safety has made the Asia Pacific region an important market for the smart lock industry.
The new smart lock platform will make use of Gemalto's Machine Identification Modules (MIM) and Secure Elements (SE) to assure a secure and reliable connectivity for users.
"Security is at the heart of any innovative smart lock technology and remains important for us. We are constantly on the lookout for complementary technology that enhances the security of our products and services," Zhu Zhiling, CEO of Dessmann said.
"The world is turning digital at an unprecedented pace, with smart homes quickly emerging as the new cornerstone of connected living. We are expecting connected smart locks to become a natural part of people's everyday life in the near future," said Suzanne Tong-Li, Senior Vice President of Greater China and Korea for Mobiles Services and IoT, Gemalto. "Our complete suite of secure IoT solutions and services help manufacturers achieve the highest level of trust for consumers, which is essential for services like virtual keys."
|Source: https://pixabay.com/en/hacker-hacking-cyber-security-hack-1944688/ Author: typographyimages|