The Future of P2P Car Rental

Leverage smartphone technology to free your car owners from the burden of a physical exchange of keys. Use the leading technology to fuel explosive growth in your P2P business.

Keyfree is here to facilitate that growth with a solution that is affordable, simple and secure.


Free hardware. Free install.
$9.99/month subscription fee.


A quick installation that doesn’t modify your vehicle in any way.


Protect your vehicle with the leading digital security.

Features for Car Owners

Share digital keys with your renters so they can lock and unlock vehicle doors through their smartphone. Eliminate the complications of having to meet up to exchange physical keys.

Secure your vehicle[s] between rentals with the “rental mode” feature.  When turned ‘on’, your engine will not start unless the doors have been unlocked by an authorized digital key.

The Keyfree solution is compatible with many makes and models meaning your personal fleet of vehicles is covered. You can expect reasonable installation times of less than an hour per vehicle.

Place your vehicle[s] anywhere including remote locations such as underground parking lots.  By using Bluetooth and not cellular data, your renters won’t have to worry about poor connection areas.

Have the option of time-stamping your vehicle[s] so you know exactly when they’ve been picked up and dropped off. Keep tabs on rentals with ease with the Keyfree timestamp feature.

Revoke digital keys with the same ease as sharing them. Simply log in to your account, select the digital key after a rental and revoke that renter’s ability to access your vehicle.

The Keyfree System

Keyfree in-car device
  • Bluetooth Smart technology
  • CAN Bus integration
  • Automotive grade components
  • Low power consumption
Keyfree app for iOS ad Android
  • White label integration
  • Interacts with device through Bluetooth
  • Available on iOS and Android
  • Modular design and add-ons
Keyfree cloud platform
  • API integrates with reservation system
  • Keys created with hashing algorithm
  • Keys are time sensitive
  • Virtually impossible to jam or hack