LOGO

Unlock Computer with Phone or Watch: A Simple Guide

July 24, 2015
Unlock Computer with Phone or Watch: A Simple Guide

Passwordless Authentication: Leveraging Smart Devices

The desire for alternatives to traditional passwords is widespread. Fortunately, the prevalence of smartphones – and increasingly, smartwatches – offers a viable path forward.

These personal devices can now be utilized to authenticate users and grant access to computers, effectively replacing the need for complex passwords.

Platform Availability and Maturity

Currently, the most refined and comprehensive solutions are designed for users within the Apple ecosystem. Specifically, seamless integration exists between Mac computers and iPhones.

However, options for Windows and other operating systems are considerably less developed and offer a more limited feature set.

How Smart Device Authentication Works

The core principle involves establishing a secure connection between the computer and the smart device. This connection then verifies the user’s identity.

This method provides a more secure and convenient login experience compared to relying solely on passwords, which are vulnerable to phishing and brute-force attacks.

Future Trends

As technology advances, we can anticipate broader compatibility and enhanced security features in smart device authentication systems.

The goal is to create a future where passwords are largely obsolete, replaced by the secure and readily available devices we carry with us daily.

Mac and iPhone or Apple Watch

For Mac users who also own an iPhone, a range of convenient unlocking solutions are readily available, offering both functionality and refinement.

Knock enables unlocking your Mac using either an iPhone or an Apple Watch. As you approach your Mac with your iPhone nearby, a Bluetooth Low Energy connection is established. A simple tap on your phone’s screen – even while it remains in your pocket – will initiate the unlocking process.

The need to physically retrieve your phone or activate its display is eliminated. A dedicated Knock application for the Apple Watch is also available, enhancing security by requiring physical possession of the watch for authentication.

However, it’s important to note that if someone gains access to your phone while Knock is enabled, they could potentially unlock your Mac unless you remotely disable the feature. The iPhone app is priced at $3.99, while the Mac application is available at no cost.

how-to-unlock-your-computer-with-your-phone-or-watch-1.jpg

Tether operates exclusively through Bluetooth Low Energy. Upon approaching your Mac with your iPhone, an automatic connection is formed. Tether will then unlock your Mac without any further input.

Conversely, when you move away from your Mac with your iPhone, Tether detects the change in proximity and automatically locks the computer. An Apple Watch app is also offered. A potential security consideration is that the Mac will unlock automatically if your iPhone is nearby, even if another individual is present.

This may or may not align with your security requirements. Both the iPhone and Mac applications for Tether are free, with optional in-app purchases available for expanded features.

how-to-unlock-your-computer-with-your-phone-or-watch-2.jpg

MacID employs a distinct methodology. Instead of automatic unlocking, it facilitates unlocking your Mac from your phone. This allows you to utilize the Touch ID sensor on your iPhone to verify your identity and gain access to your Mac.

Similar to Knock and Tether, MacID provides an Apple Watch application. Unlike the other options, MacID necessitates active authentication via your phone, preventing unauthorized access by simply possessing your iPhone and Mac. This approach may be preferable if your Mac is secured with a complex password.

The MacID iPhone app is available for $3.99 on the App Store, and the corresponding Mac application can be downloaded without charge.

how-to-unlock-your-computer-with-your-phone-or-watch-3.jpg

Chromebook and Android Phone Integration

A notable mention is warranted regarding Chromebooks, as Google provides a method for unlocking them using an Android phone. This functionality, known as Smart Lock, necessitates an Android phone running Android 5.0 or a later version.

With a sufficiently updated Android phone, Smart Lock can be configured easily, establishing a connection between your Chromebook and phone without the need for any additional software installations.

Currently, Android Wear watches are not supported for this feature; an Android phone is a prerequisite for utilizing this unlocking method.

This streamlined process offers a convenient way to access your Chromebook.

how-to-unlock-your-computer-with-your-phone-or-watch-4.jpg

Windows PC and Android Phone Integration

Currently, solutions mirroring the seamlessness found on Apple devices are lacking for Windows users. A formerly favored method involved BTProximity, leveraging Bluetooth proximity to automatically authenticate access to a Windows PC. We previously detailed the implementation of BTProximity.

Unfortunately, BTProximity is no longer maintained. As of now, no equally refined alternatives have emerged to fill the void.

Despite this, a degree of functionality can be achieved through custom configurations utilizing Android tools. This approach necessitates the installation of EventGhost on the Windows machine to handle the unlocking process.

Furthermore, AutoRemote is required for communication between the Android device and the Windows PC. Tasker, an Android automation app, will then be used to transmit a signal to EventGhost via AutoRemote when pre-defined criteria are satisfied.

Comprehensive setup instructions and further details regarding this method can be found in the Unlock PC from Android discussion on StackExchange.

Utilizing Bluetooth Proximity with Mac and Android Devices

For users with a Mac computer and an Android phone – or indeed any device supporting Bluetooth connectivity – a free tool called Proximity can be employed. This allows for Bluetooth proximity detection.

With Proximity, it’s possible to configure AppleScripts that automatically lock and unlock your Mac based on the distance between your device and the computer.

Setting Up Automated Mac Control

While this method necessitates some initial manual configuration, the resulting functionality closely mirrors that of Tether once completed.

The core principle involves leveraging Bluetooth signals to trigger actions on your Mac, enhancing both security and convenience.

Resources for Implementation

Detailed AppleScript code to facilitate this process is readily available.

Lifehacker has published a comprehensive guide, including the necessary code, in a dedicated post outlining the setup procedure.

Leveraging Bluetooth with Linux Systems

For Linux users, the BlueProximity application offers a convenient method for PC access control. It enables locking and unlocking your computer based on the detected presence of a paired Bluetooth device.

While typically found within your Linux distribution’s software package manager, some manual configuration may be necessary to ensure seamless automatic locking and unlocking functionality.

Android's Smart Unlock Capabilities

Users of Android 5.0 and later versions can benefit from integrated "smart unlock" features. These functionalities provide enhanced convenience by automatically maintaining an unlocked state under specific conditions.

For instance, your Android device can remain unlocked while connected to a trusted Wi-Fi network, such as your home network, reducing the need for frequent unlocking.

Image Credit: Alejandro Pinto on Flickr

#unlock computer#phone unlock#watch unlock#computer security#smartphone unlock#smartwatch unlock