<s>
Wireless	B-Operating_System
lock	I-Operating_System
is	O
a	O
protection	O
concept	O
for	O
authenticated	O
LAN	B-General_Concept
or	O
WLAN	B-Architecture
network	B-Operating_System
clients	I-Operating_System
offered	O
from	O
various	O
vendors	O
in	O
various	O
functional	O
shapes	O
and	O
physical	O
designs	O
.	O
</s>
<s>
In	O
contrast	O
to	O
wireless	O
keys	O
,	O
wireless	B-Operating_System
lock	I-Operating_System
puts	O
emphasis	O
on	O
automatic	O
locking	O
instead	O
of	O
just	O
locking	O
by	O
time-out	O
or	O
unlocking	O
.	O
</s>
<s>
The	O
wireless	B-Operating_System
lock	I-Operating_System
concept	O
supports	O
initialising	O
the	O
client	O
with	O
authentication	O
and	O
log-on	B-General_Concept
as	O
electronic	O
key	O
solutions	O
.	O
</s>
<s>
Beyond	O
that	O
a	O
wireless	B-Operating_System
lock	I-Operating_System
supports	O
automatic	O
log-off	B-General_Concept
after	O
user	O
leaves	O
unlocked	O
network	O
client	O
and	O
independent	O
from	O
time-out	O
conditions	O
.	O
</s>
<s>
Protection	O
comes	O
into	O
effect	O
,	O
while	O
integrated	O
or	O
galvanically	O
attached	O
and	O
paired	O
receiver/transceiver	O
stays	O
connected	O
with	O
protected	O
client	O
object	O
as	O
soon	O
as	O
wireless	O
token	O
gets	O
separated	O
from	O
client	O
exceeding	O
a	O
set	O
maximum	O
allowed	O
distance	O
,	O
generally	O
the	O
manual	O
reach	O
required	O
for	O
operating	O
keyboard	B-Device
attached	O
to	O
client	O
.	O
</s>
<s>
Currently	O
(	O
2011-07	O
)	O
there	O
is	O
no	O
general	O
standard	O
supporting	O
inter-operability	O
of	O
wireless	B-Operating_System
lock	I-Operating_System
concepts	O
.	O
</s>
<s>
Most	O
offered	O
air	O
interface	O
solution	O
is	O
based	O
on	O
ISO/IEC	O
18000-3	O
HF	O
(	O
13	O
,	O
56MHz	O
)	O
passive	B-Application
RFID	I-Application
tags	O
and	O
near	O
field	O
communication	O
(	O
NFC	O
)	O
-like	O
reader	O
specification	O
.	O
</s>
<s>
Most	O
offered	O
authentication	O
procedures	O
make	O
use	O
of	O
IETF	O
public	B-Architecture
key	I-Architecture
infrastructure	I-Architecture
(	O
PKI	B-Architecture
)	O
.	O
</s>
<s>
Bluetooth	B-Protocol
BLE	O
profile	O
proximity	O
is	O
said	O
to	O
support	O
such	O
application	O
.	O
</s>
<s>
Simple	O
solutions	O
make	O
use	O
of	O
passive	B-Application
RFID	I-Application
tokens	O
,	O
thus	O
requiring	O
a	O
higher	O
transmission	O
level	O
from	O
a	O
reader	O
attached	O
to	O
the	O
protected	O
object	O
and	O
illuminating	O
the	O
token	O
for	O
response	O
.	O
</s>
<s>
Protected	O
object	O
controlling	O
works	O
with	O
the	O
token	O
at	O
hands	O
working	O
as	O
a	O
transceiver	O
(	O
RFID	B-Application
passive	O
)	O
or	O
beacon	O
transmitter	O
(	O
RFID	B-Application
active	O
.	O
</s>
<s>
Relevant	O
existing	O
standard	O
for	O
such	O
application	O
is	O
Bluetooth	B-Protocol
V4.0	O
Low	O
Energy	O
of	O
2009-12-17	O
with	O
the	O
profiles	O
Find	O
Me	O
and	O
Proximity	O
.	O
</s>
<s>
Standardisation	O
in	O
IETF	O
(	O
PKI	B-Architecture
)	O
,	O
W3C	O
(	O
XML	B-Protocol
)	O
,	O
ITU	O
(	O
X.509	O
)	O
is	O
going	O
on	O
.	O
</s>
<s>
UWB	O
and	O
CSS	B-Language
)	O
,	O
the	O
cheap	O
approach	O
is	O
RSSI	O
estimate	O
with	O
just	O
variation	O
of	O
power	O
levels	O
.	O
</s>
<s>
with	O
Texas	O
Instruments	O
sample	O
offer	O
using	O
Bluetooth	B-Protocol
V4.0	O
low	O
energy	O
protocol	O
standard	O
and	O
with	O
comparable	O
proposals	O
of	O
other	O
chip	O
foundries	O
.	O
</s>
<s>
Well	O
known	O
implementation	O
is	O
Linux	B-Application
and	O
Windows	B-Application
available	O
BlueProximity	O
solution	O
.	O
</s>
<s>
The	O
hosting	O
on	O
PC	O
like	O
systems	O
allows	O
for	O
detecting	O
presence	O
of	O
mobile	O
phones	O
in	O
proximity	O
to	O
PC-attached	O
Bluetooth	B-Protocol
dongle	B-Device
or	O
equivalent	O
interface	O
.	O
</s>
<s>
However	O
this	O
Bluetooth	B-Protocol
based	O
approach	O
is	O
the	O
best	O
protected	O
solution	O
compared	O
to	O
other	O
proprietary	O
approaches	O
without	O
means	O
comparable	O
to	O
mobile	O
phone	O
SIM	O
locking	O
or	O
to	O
Bluetooth	B-Protocol
link	O
protection	O
.	O
</s>
<s>
There	O
are	O
no	O
additional	O
server	O
function	O
requirements	O
beyond	O
public	B-Architecture
key	I-Architecture
infrastructure	I-Architecture
standards	O
.	O
</s>
<s>
The	O
infrastructure	O
requirement	O
to	O
include	O
wireless	O
receiver	O
to	O
protected	O
objects	O
via	O
integration	O
or	O
using	O
dongles	B-Device
is	O
state-of-the-art	O
.	O
</s>
<s>
Attachment	O
of	O
receiver/transmitter	O
in	O
dongle	B-Device
shaping	O
to	O
protected	O
object	O
is	O
easily	O
made	O
via	O
USB	O
port	O
.	O
</s>
<s>
Neither	O
dongle	B-Device
nor	O
protected	O
unit	O
may	O
be	O
compromised	O
as	O
long	O
as	O
any	O
tampering	O
of	O
security	O
application	O
gets	O
detected	O
.	O
</s>
<s>
Major	O
advantage	O
with	O
wireless	O
locking	O
comes	O
with	O
automating	O
log-off	B-General_Concept
.	O
</s>
<s>
Continuous	O
connection	O
based	O
encrypted	O
key	O
exchange	O
between	O
active	O
token	O
and	O
receiver	O
dongle	B-Device
provides	O
a	O
sufficient	O
security	O
level	O
prepared	O
for	O
certification	O
under	O
ISO/IEC	O
15408	O
common	O
criteria	O
specification	O
.	O
</s>
<s>
Unidirectional	O
communication	O
between	O
beaconing	O
token	O
and	O
receiver	O
dongle	B-Device
may	O
be	O
hacked	O
with	O
Man-in-the-middle	O
attack	O
.	O
</s>
