Windows Unlock with IoT Devices

Sign in to queue

The Discussion

  • User profile image

    Right on!!

  • User profile image

    What happens when this happens? PC has multiple user accounts. Each user has a registered Band or other BT companion device for their own login authentication. Several users then come near the PC.

    Also, does the authentication protocol use D-H key exchange and message sequence security or some other method to secure the communication so that outside devices cannot intercept and potentially spoof the authentication?

  • User profile image

Add Your 2 Cents