翻訳と辞書
Words near each other
・ Wireless integrated network sensors
・ Wireless Intelligent Network
・ Wireless Intelligent Stream Handling
・ Wireless intercom
・ Wireless Internet Protocol
・ Wireless Internet service provider
・ Wireless intrusion prevention system
・ Wireless keyboard
・ Wireless LAN
・ Wireless LAN controller
・ Wireless LAN Interoperability Forum
・ Wireless Latin Entertainment
・ Wireless Leiden
・ Wireless light switch
・ Wireless local loop
Wireless lock
・ Wireless Markup Language
・ Wireless Matrix
・ Wireless Medical Telemetry Service
・ Wireless mesh network
・ Wireless microphone
・ Wireless mobility management
・ Wireless Monitoring Organisation
・ Wireless Multimedia Extensions
・ Wireless network
・ Wireless network interface controller
・ Wireless network organizations by size
・ Wireless Nomad
・ Wireless Oakland
・ Wireless Personal Communications


Dictionary Lists
翻訳と辞書 辞書検索 [ 開発暫定版 ]
スポンサード リンク

Wireless lock : ウィキペディア英語版
Wireless lock
Wireless lock is a protection concept for authenticated LAN or WLAN network clients offered from various vendors in various functional shapes and physical designs. In contrast to wireless keys, wireless lock puts emphasis on automatic locking instead of just locking by time-out or unlocking.
The wireless lock concept supports initialising the client with authentication and log-on as electronic key solutions. Beyond that a wireless lock supports automatic log-off after user leaves unlocked network client and independent from time-out conditions. Protection comes into effect, while integrated or galvanically attached and paired receiver/transceiver stays connected with protected client object as soon as wireless token gets separated from client exceeding a set maximum allowed distance, generally the manual reach required for operating keyboard attached to client.
Currently (2011-07) there is no general standard supporting inter-operability of wireless lock concepts.
* Most offered air interface solution is based on ISO/IEC 18000-3 HF (13,56 MHz) passive RFID tags and near field communication (NFC)-like reader specification.
* Most offered authentication procedures make use of IETF public key infrastructure (PKI).
* Comfortable solutions support single sign-on servicing.
* Bluetooth BLE profile ''proximity'' is said to support such application.〔(Mass market proximity sensing and security )〕
== Usage principles ==

The wireless token serves as an independent second authentication factor. Local pairing of token with protected networked client object is the authentication procedure. Personalisation of token with user is a preparative action that may be administered apart from network. Allocated user credentials shall be served from networked authorisation server for allowed access to data and function and from authentication server for allowed access to network and clients.
A wireless communication distance metrics sets the protected object to "locked", as soon as the set distance level between paired transmitter and receiver of a wireless signal transmission is exceeded. The protected object returns to status "unlocked" as soon as the distance gets lesser and the received signal strength level higher than set limit.
Transmitters may be worn by the owner of an object, whereas the other receiver item gets attached to the protected object for logically protecting it to usage by the owner only.
Basic electronic gadget is a wireless token that communicates with a counterpart attached to the object to be controlled wirelessly. User guides for mode of operation recommend to bear a very light designed alarm token with a necklace, a wristband or similarly directly bound to the body. Very low transmission power levels secure low electromagnetic interference as well as entirely biologically harmless operation
After setting the object to protect to work and initially pairing the two wireless token devices with each other, the protected object refuses operation when exceeding the set distance between token and protected object.
Advanced solutions offer communications on the basis of standardized communication protocols and based on standardized air interface links.
Simple solutions make use of passive RFID tokens, thus requiring a higher transmission level from a reader attached to the protected object and illuminating the token for response. Chosen frequency band and allowed maximum transmission power level define the possible reach for the response from the token in the vicinity of the protected object.

抄文引用元・出典: フリー百科事典『 ウィキペディア(Wikipedia)
ウィキペディアで「Wireless lock」の詳細全文を読む



スポンサード リンク
翻訳と辞書 : 翻訳のためのインターネットリソース

Copyright(C) kotoba.ne.jp 1997-2016. All Rights Reserved.