Frequently Asked Questions

What do I need to use Proxy?
Install the "Proxy Pass" app on your iPhone or Android, and sign up for an account using your work email address.
What phones do you support?
Proxy app works on all modern iPhone and Android phones. You need at least an iPhone 5 running iOS 8+, or an Android phone with Lollipop (5.0) or newer. Your phone must also support Bluetooth Low Energy (Bluetooth 4.0).
Does the app need to be open for it to work?
No, Proxy works in the background, so you don't need to launch the app to unlock the door.
Does Proxy support my existing key card?
No, however Proxy can be installed alongside existing card readers, allowing you to use your existing card as a fallback.
Won't Bluetooth drain my battery?
Proxy app uses Bluetooth Low Energy technology, which is different to the older Classic Bluetooth devices you may have used before. Bluetooth Low Energy requires very little power and will have minimal impact on your phone's battery life.
What if my phone runs out of power anyway?
If your phone is out of power, you will not be able to use it to unlock the door.
Do I have to enable Bluetooth?
Yes, without a Bluetooth signal the sensor will not "see" you and you will not be able to use your phone to unlock the door.
Do I need to pair my phone?
No, Bluetooth Low Energy works differently to Classic Bluetooth, and does not require you to pair your phone.
Can I grant access to people outside my organisation?
Yes, you can grant temporary or permanent access to people outside your organisation. You can also restrict the times and days when they have access directly from your dashboard.
Can I revoke access?
Yes, absolutely. You can revoke access at any time for an individual user, or for an entire group, from your dashboard. Revocation is effective immediately, no need to go out and re-program the sensors.
How secure is this, really?
Very secure. Proxy uses strong cryptographic protocols in combination with a one-time tokenization scheme that ensures that your user's credentials cannot be intercepted and stolen, because they are never transmitted over the airwaves.
I heard that Bluetooth locks can be hacked.
That's not a question. Nevertheless, many Bluetooth-based locks have indeed been hacked. However, we at Proxy take your security very seriously. We have addressed all common attack vectors against Bluetooth-based locks, and would be happy to discuss the details with you.
Can I configure the range of the sensor?
Proxy sensors can be operated in two modes: hands-free mode, where a person is detected from a distance and the door unlocked as they approach, and two-factor mode, where the person must unlock their phone and explicitly trigger the door. These modes offer a balance between added security and convenience.
How does hands-free mode work?
Hands-free mode allows our sensor to detect the user's phone and verify access permissions at a distance, unlocking the door just as the user approaches without sacrificing the security of the user's credentials. We think it is quite magical.
Hands-free mode sounds scary, can I restrict that?
Hands-free mode uses the same one-time tokenization scheme to keep your credentials secure. If you still wish to disable it and require your users to pull out and unlock their phones instead, you can do that on a per-door basis from the dashboard.
What if my employee's phone is lost or stolen?
We suggest that you take the same precautions you would for securing any other sensitive information: revoke the account on the compromised device, and remote wipe.
Can I get Proxy installed for my office doors, which are currently accessed with typical locks and keys?
Yes, Proxy works with all standard electrified hardware. Most common locksmiths are well versed in installing electrified hardware or, if you prefer, we’d be happy to coordinate with one from our installation partner network.
After I replace my current lock and key set with the electrified one, can I continue to use the same keys as I use today?
Yes, just tell the locksmith that you’d like to keep using your current keys.
Can I get Proxy installed for my office doors, which are currently accessed by key cards/fobs/number pads?
Yes, Proxy works with all standard access control configurations. The Proxy Reader will be installed next to the door and operate in parallel with your existing readers (so you can continue to use your key cards/fobs/number pads as back-up). The installation can be performed by any common security professional or, if you prefer, we’d be happy to coordinate with one from our installation partner network.
My office currently has some doors accessed via card readers and other doors with just locks and keys. Will I need to manage each separately with Proxy?
No, since we manage access credentials in the cloud, all doors with Proxy can be managed through the same web dashboard.
I have multiple offices, each with its own key card. Would I need separate instances of Proxy for each office?
No, since we manage all access credentials in the cloud, all locations with Proxy can be managed through the same web dashboard.