Skip to main content

How secure is Parakey

Written by Cecilia Rubinstein

Security is a top priority at Parakey, and all communication is two-way encrypted to prevent unauthorized access. The connection between the mobile device and Parakey’s servers is encrypted using HTTPS (SSL/TLS), 128–256 bit.

The mobile device connects to Parakey hardware via Bluetooth (BLE), and this connection is encrypted with AES, 128 bit. The hardware is completely offline and communicates directly with the electric lock or access system.

For additional security, the SSL/TLS certificate is rotated every 90 days, and each hardware unit has a unique encryption key.

System robustness

  • Parakey’s hardware is not connected to the internet, which increases protection against intrusion attempts.

  • The communication is two-way encrypted, and unique messages make it impossible to reuse an opening message.

  • Logs with high traceability make it easy to detect suspicious activity.

Secure unlocking in the app

  • As a user, you can only be logged in on one phone at a time. If you log in on a new device, a warning email is automatically sent to your registered email address.

  • If a user has been offline for too long, the key is no longer stored in the app and must be reverified via internet connection.

  • A door cannot be opened via the internet – you must be physically in front of the door to unlock it.

💡What does it mean in practice to be offline?

  • Any time restrictions on your keys remain in effect even when you don’t have an internet connection.

  • After a certain period offline, your keys will stop working until their validity has been verified, which happens automatically when you are connected to the internet.

  • Restarting your phone requires a connection again to retrieve your keys.

Certifications

Parakey complies with relevant Swedish standards for digital access systems.

We are certified according to SSF 1075, which covers the secure distribution, storage, and use of digital keys. This means that digital access is managed in accordance with established requirements, ensuring a secure and controlled handling.

Did this answer your question?