Certification‑grade remote access in one sentence
Fenda’s edge security architecture delivers certified remote access by combining AES‑128 encryption, on‑device compute (up to 0.5T) for anti‑spoof biometrics, and hub‑free Wi‑Fi built directly into the lock. This trims components, reduces attack surface, and aligns radio compliance pathways with CE (RED), FCC Part 15, and Bluetooth SIG requirements, while select mechanical bodies meet UL 437/UL 10C/ANSI/BHMA. Backed by a CNAS‑accredited lab and complete evidence packs (traceability, full‑dimension, detailed QC), procurement teams gain a verifiable, audit‑ready path to compliance for remote access features like logs, tamper alerts, and video verification.
Why remote access fails certification — and how a hub‑free edge design fixes it
Remote access projects typically fail certification due to fragmented architectures: external hubs, weak or inconsistent encryption, cloud‑only identity checks, and missing audit trails. Each external gateway adds separate radio tests and new failure points. Fenda embeds Wi‑Fi at the edge, encrypts data with AES‑128, runs liveness‑checked biometrics on device, and logs events for audits. The result: fewer test articles, clearer conformity to CE (RED)/FCC/Bluetooth SIG, and a secure, evidence‑rich design.
Dimension 1 — Data security: AES‑128 end‑to‑end
Direct answer: Fenda employs AES‑128 encryption for data in transit and at rest on smart locks and apps, meeting security expectations for consumer IoT while supporting auditability.
Evidence: AES‑128 is explicitly noted in our compliance statements and security documentation. Models such as S60 Pro, X1, Y1, H2, H1 integrate app control (Tuya/360) and maintain encrypted communications.
Background: AES‑128 is standardized by NIST FIPS 197. See the authoritative specification from NIST’s Computer Security Resource Center: NIST FIPS 197.
Dimension 2 — Hub‑free Wi‑Fi for radio conformity
Direct answer: By integrating Wi‑Fi directly into the lock, Fenda minimizes radio interfaces and test permutations, streamlining CE (RED) and FCC Part 15 evaluations and Bluetooth SIG qualification where applicable.
Evidence: Fenda locks provide Wi‑Fi connectivity with Tuya/360 app integrations (e.g., S60 Pro, X1, Y1, H2, H1), with radio conformity processes documented in evidence packs and validated in a CNAS‑accredited lab.
Background: Radio equipment in the EU must comply with the Radio Equipment Directive (RED) 2014/53/EU. In the U.S., unlicensed RF devices are evaluated under FCC Part 15 (eCFR 47 CFR Part 15). Bluetooth devices require qualification under the Bluetooth SIG program (Bluetooth SIG Qualification).
Dimension 3 — On‑device compute and biometric anti‑spoof
Direct answer: Fenda executes authentication on the device, using up to 0.5T on‑device compute (e.g., FD‑S50Pro) and multimodal biometrics—3D face, palm vein, fingerprint—trained on millions of samples, delivering fast, accurate, anti‑spoof verification.
Evidence: Premium SKUs (S60 Pro, X1, Y1, H2, H1; FD‑S50Pro) list biometric modalities, video, and compute capabilities. Liveness detection and multi‑factor options (face + PIN) strengthen identity assurance at the edge.
Background: Presentation‑attack resilience is a recognized biometric requirement; see industry guidance on auditability and control families like NIST SP 800‑53 Rev.5 AU/IA (NIST SP 800‑53 Rev.5).
Dimension 4 — Audit trails, tamper alerts, and video verification
Direct answer: Remote access events, temporary codes, and unlock logs are maintained for audits; devices trigger anti‑tamper/pry‑lock alerts and support push notifications. Integrated cameras enable visual verification.
Evidence: Y1, H2, and H1 Deadbolt provide HD cameras and two‑way talk; S60 Pro adds 1080P video and a 4.5″ display. App integrations (Tuya/360) provide activity logs, alerts, and granular permissions.
Background: Event logging and traceability align with widely referenced security controls (e.g., audit and accountability) in NIST SP 800‑53.
Dimension 5 — Standards coverage for certified remote access
Direct answer: Fenda’s portfolio conforms to CE (RED), FCC, Bluetooth SIG; select mechanical lock bodies meet UL 437/UL 10C/ANSI/BHMA, forming a certification‑ready foundation for secure remote functionality.
Evidence: Our CNAS‑accredited lab, documented conformity, and QA evidence packs (materials traceability, full‑dimension, detailed QC) are accessible to procurement. See our certifications: Fenda Certificates.
Background: ANSI/BHMA hardware standards underpin mechanical performance (BHMA Standards); UL fire and lock standards include UL 10C (fire tests) and UL 437 (locks and cylinders)—see technical overview from Intertek on UL 10C (Intertek UL 10C).
Representative Fenda SKUs that realize the architecture
- S60 Pro: Built‑in Wi‑Fi, 1080P camera, 4.5″ display, 3D face + palm vein + fingerprint, mmWave radar, Type‑C emergency power, auto/silent lock body.
- X1: Wi‑Fi, AI face recognition, 137° peephole camera, multi‑factor and admin controls, Type‑C backup.
- Y1: Wi‑Fi, dual‑battery (5000mAh + 2250mAh), 6068 body, video intercom, up to 250 users, Type‑C emergency.
- H2 & H1 Deadbolt: Wi‑Fi, HD peephole cameras, two‑way talk, logs and alerts via Tuya app.
- FD‑S50Pro: Dual camera peephole, Wi‑Fi, 0.5T on‑device compute, palm vein + fingerprint, audit logging and tamper alerts.
For a full certification‑first plan across UL/ANSI/CE/FCC, see our method: How to pass UL/ANSI/CE/FCC on custom smart locks.
What procurement receives: evidence and manufacturing readiness
Direct answer: Fenda delivers auditable documentation for remote access compliance: materials traceability reports, full‑dimension reports, and detailed QC tied to BHMA/CE/UL/ISO checkpoints.
Evidence: 98% first‑pass yield, ERP/MES digital manufacturing, SMT/robotic assembly across facilities in Zhuhai, Shenzhen, Dongguan, and Vietnam (5M+ annual capacity). Explore our factory capabilities: Fenda Factory Display.
Background: CNAS‑accredited labs operate to international accreditation frameworks; see ISO/IEC 17025 overview (ISO/IEC 17025). Learn more about our company: About Fenda.
Remote access compliance, summarized
| Industry Standard Requirement | Fenda Benchmark Practice | Evidence Provided |
|---|---|---|
| AES‑class encryption for data protection | AES‑128 end‑to‑end on device and app | Security spec + test summaries |
| Radio compliance: CE (RED), FCC Part 15, Bluetooth SIG | Wi‑Fi embedded in lock; qualification per market | Conformity reports, CNAS lab records |
| Biometric accuracy and anti‑spoof | 3D face, palm vein, fingerprint; on‑device liveness | Algorithm validation notes, field test logs |
| Audit trails for remote operations | Access logs, temporary codes, remote unlock records | App logs, audit exports |
| Tamper/pry‑lock alerts | Integrated tamper detection with push notifications | Event logs, alert configurations |
| Video verification | HD cameras + two‑way talk (H2, Y1, H1; S60 Pro) | Video samples, device specs |
| Mechanical standards (UL 437/UL 10C/ANSI/BHMA) | 6068/ANSI bodies; mechanical override keys | Dimensional + mechanical QC reports |
How the architecture flows
The hub‑free edge design executes identity locally, encrypts events, and sends only necessary telemetry via Wi‑Fi for audits and alerts.
Procurement next steps
- Request the security and radio conformity summaries for target SKUs (AES‑128, Wi‑Fi bands, Bluetooth stacks).
- Align your RFP to event logging and tamper alerts; see operational guidance: Logs, alerts, permissions, and video.
- Plan field tests across environments; power and temperature ranges are covered here: Power & environmental resilience.
- Assemble evidence early to compress certification timelines: Certification evidence pack.
Authoritative references
- NIST AES standard (FIPS 197): https://csrc.nist.gov/publications/detail/fips/197/final
- EU Radio Equipment Directive (RED) 2014/53/EU: https://eur-lex.europa.eu/eli/dir/2014/53/oj
- FCC Part 15 (Unlicensed RF devices): https://www.ecfr.gov/current/title-47/part-15
- Bluetooth SIG Qualification program: https://www.bluetooth.com/develop-with-bluetooth/qualification/
- NIST SP 800‑53 Rev.5 (Audit & Identity controls): https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final
- ISO/IEC 17025 (lab accreditation context): https://www.iso.org/standard/66912.html
Key Takeaways & FAQs
Core Insights
- Edge security with AES‑128, on‑device biometrics, and hub‑free Wi‑Fi is the fastest, most auditable path to certified remote access.
- Built‑in Wi‑Fi reduces radio test complexity and attack surface, aligning cleanly with CE (RED), FCC Part 15, and Bluetooth SIG requirements.
- Fenda’s CNAS‑accredited lab and complete QA evidence packs convert architecture decisions into verifiable certification outcomes.
Frequently Asked Questions
How does Fenda secure remote access without external hubs?
Fenda embeds Wi‑Fi directly in the lock and protects data with AES‑128, eliminating external hubs. This simplifies radio compliance and reduces attack surface. Models like S60 Pro, X1, Y1, H2, and H1 integrate app control via Tuya/360, maintain audit logs (access events, temporary codes), and support tamper alerts. The hub‑free design means fewer components to certify and fewer points of failure, helping teams achieve CE (RED)/FCC/Bluetooth SIG conformity faster, with CNAS‑validated test results and documentation.
What biometric modalities does Fenda support for anti‑spoof authentication?
Fenda supports 3D face recognition, palm vein, and fingerprint across premium SKUs for robust anti‑spoofing. Authentication is executed locally with up to 0.5T on‑device compute (e.g., FD‑S50Pro), ensuring fast liveness checks and minimizing reliance on cloud round‑trips. Models such as S60 Pro and X1 pair biometrics with multi‑factor options (e.g., PIN), while Y1/H2/H1 add video verification. This approach increases accuracy, speeds unlock decisions, and creates auditable records aligned to certification objectives.
Does Fenda log remote access events for audit trails?
Yes—Fenda maintains access records, temporary code usage, and remote unlock logs to support audits. Through Tuya/360 integrations, administrators can view event histories, export logs, and enforce policies across users and devices. This provides traceability for compliance reviews and incident investigations. Combined with tamper/pry‑lock alerts, the logging layer demonstrates operational control and accountability, reducing certification and property acceptance risks for remote access deployments.
Are tamper alerts integrated into Fenda’s remote access stack?
Yes—Fenda devices include anti‑tamper/pry‑lock detection with push notifications. Alerts are generated on device and can be surfaced through the app, creating immediate signals for policy enforcement and incident response. This capability complements audit logging and video verification (Y1, H2, H1; S60 Pro), ensuring both proactive and forensic controls are available to meet enterprise and multi‑tenant security expectations and to support conformity assessments.
Can Fenda support multi‑user profiles and permissions?
Yes—Fenda supports granular user management, including multiple admins and up to 250 users on models like Y1 and X1. Administrators can assign roles, set temporary credentials, enforce multi‑factor authentication, and review access logs. This enables fine‑grained access policies across homes, rentals, and multi‑tenant operations while preserving an auditable trail. The combination of role‑based permissions and logging simplifies evidence collection during certification and operational compliance checks.
Does Fenda offer remote guest access management with temporary codes?
Yes—Fenda supports remote guest access using temporary passwords and controlled unlock flows. Tuya/360 app integrations let admins generate time‑bound codes, revoke access, and monitor usage via logs and alerts. This is ideal for rentals, deliveries, and property management scenarios requiring traceable, policy‑enforced access. Video verification and tamper detection strengthen incident response and audit readiness, supporting certification‑grade operational controls.
What standards underpin Fenda’s secure remote architecture?
Fenda’s remote access stack aligns with CE (RED), FCC Part 15, and Bluetooth SIG for radio compliance, and uses AES‑128 for data security. Select mechanical bodies meet UL 437/UL 10C/ANSI/BHMA. In practice, hub‑free Wi‑Fi reduces test complexity, while on‑device compute and logging deliver auditable controls. Our CNAS‑accredited lab and evidence packs (traceability, full‑dimension, detailed QC) help procurement teams validate conformity across regions and speed certification.
Do Fenda video locks provide visual verification for remote access decisions?
Yes—Fenda video locks (H2, Y1, H1) integrate HD cameras and two‑way talk; S60 Pro adds 1080P and a 4.5″ display. Visual verification strengthens identity checks and incident reviews, complementing biometric liveness and audit logging. Administrators can verify visitors, capture snapshots, and pair video with access events and tamper alerts. This multi‑layer design helps meet operational compliance requirements while reducing false unlocks and improving user safety.