This is how easy it is
1. A smartphone creates a connection between the server and the key
2. The key verifies the access rights
3. The system gives predefined access rights for the key
4. The software gathers audit trail from the whole time the key is used