Walk up. Unlock. Walk away. Locked.
Your phone + a tiny USB dongle = automatic Windows PC security.
Zero effort.
Every day, countless PCs are left unlocked — an open invitation to data theft and unauthorized access.
Pressing Win+L every time you leave your desk? Sooner or later, you'll forget. Everyone does.
An unattended, unlocked workstation is a security breach waiting to happen. Data loss, compliance violations, insider threats.
Native Bluetooth pairing is unreliable. Screen timeout is too slow. Smart cards still require manual action.
Three simple components. One seamless experience. Your phone is the key.
The Android app on your phone handles BLE advertising, authentication, and secure pairing.
A tiny BLE-enabled dongle plugs into your PC's USB port and bridges your phone to Windows.
A background service and native Credential Provider handle lock/unlock at the OS level.
Approach with your phone, authenticate with fingerprint, and your PC unlocks. Walk away and it locks automatically.
Security and convenience, without compromise.
Automatically locks when you walk away and unlocks when you return. Hands-free, seamless.
Use your phone's fingerprint sensor as a second factor. Your biometrics never leave the device.
Lock or unlock your PC with a single tap in the app. Quick and intentional when you need it.
If BLE connection drops unexpectedly, your PC locks immediately. No gap in protection.
Native Credential Provider integration. Works with the Windows lock screen — no workarounds.
Register multiple phones as keys. Pair one dongle with multiple authorized devices.
Three components that work together as one system.
The bridge between your phone and PC. Plugs into USB, communicates via BLE.
Background service and credential provider that manage your PC's lock state.
Your phone becomes the key. Manage devices, authenticate, and control your PC.
A lock is only as strong as its weakest link. ProxiGate is built with defense in depth.
All BLE communication is encrypted. Custom protocol with CRC16 integrity checks on every packet.
Every unlock request requires a cryptographic challenge-response exchange. No static tokens.
Each phone is cryptographically bound to the dongle during pairing. Unauthorized devices are rejected.
Every command includes a nonce and timestamp to prevent replay attacks. Each message is unique.
For developers and contributors.