Patent classifications
E05B45/061
SMART LOCK AND METHOD FOR AUTOMATICALLY LOCKING SMART LOCK
The present disclosure provides a smart door lock and a method for controlling the smart door lock. The method may be implemented on a computing apparatus including a processor and a storage device. The method may include obtaining user information and determining whether the user information passes a verification. The method may further include in response to a determination that the user information passes the verification, controlling the smart door lock to perform an unlock operation. The method may further include determining whether the door on which the smart door lock is installed has a preset action within a preset time period and in response to a determination that the door has the preset action within the preset time period, controlling at least one component of the smart door lock to perform at least one operation.
NON-INTRUSIVE DIAL ROTATION DETECTION OF HIGH SECURITY LOCKS
A rotation detection system for detecting the rotation of a lock dial includes a magnet coupled to the lock dial to generate a changing magnetic field in response to rotation of the lock dial, a sensor disposed near enough to the magnet to detect the magnetic field and provide a sensor output signal indicative of the magnetic field, and a controller coupled to the sensor for receiving the sensor output signal, the controller providing a controller output signal in response to a change in the sensor output signal. An alarm interface can receive the controller output signal and provide an alarm signal.
Alarming code lock
The present disclosure provides an alarming code lock, including a lock head and a steel wire rope. A warning device, a circuit board, and a trigger switch are disposed inside the lock head. The warning device and the trigger switch are electrically connected with the circuit board. One end of the steel wire rope is fixedly connected with the lock head and is electrically connected with the circuit board. A plug is disposed on another end of the steel wire rope. The plug is inserted into the lock head and then makes contact with the trigger switch. The steel wire rope and the circuit board form a protection circuit, and the warning device is configured to raise an alarm when the plug keeps in contact with the trigger switch and the protection circuit is disconnected.
ALARMING CODE LOCK
The present disclosure provides an alarming code lock, including a lock head and a steel wire rope. A warning device, a circuit board, and a trigger switch are disposed inside the lock head. The warning device and the trigger switch are electrically connected with the circuit board. One end of the steel wire rope is fixedly connected with the lock head and is electrically connected with the circuit board. A plug is disposed on another end of the steel wire rope. The plug is inserted into the lock head and then makes contact with the trigger switch. The steel wire rope and the circuit board form a protection circuit, and the warning device is configured to raise an alarm when the plug keeps in contact with the trigger switch and the protection circuit is disconnected.
Security system with anti-tampering sensors and cybersecurity
The disclosed embodiments include a method for tamper-proof protection of containers used for shipment of goods. The system contains a lock with electronic and mechanical components and a controller. A sensor is connected to a lock so that if forms a closed loop. The sensor can be an optical fiber or a distributed arrangement with an optical or an electrical shield. The electronics in the lock provide real time monitoring of the status of the lock. The lock cannot be opened or reproduced due to the signature of the closed loop which is stored in a remote server. Intrusions detected are relayed to an authorized recipient via a variety of communication channels. The data and control of the entire system is protected with several programs targeted to provide cybersecurity.
Non-intrusive dial rotation detection of high security locks
A rotation detection system for detecting the rotation of a lock dial includes a magnet coupled to the lock dial to generate a changing magnetic field in response to rotation of the lock dial, a sensor disposed near enough to the magnet to detect the magnetic field and provide a sensor output signal indicative of the magnetic field, and a controller coupled to the sensor for receiving the sensor output signal, the controller providing a controller output signal in response to a change in the sensor output signal. An alarm interface can receive the controller output signal and provide an alarm signal.
Smart lock and method for automatically locking smart lock
The present disclosure provides a smart door lock and a method for controlling the smart door lock. The method may be implemented on a computing apparatus including a processor and a storage device. The method may include obtaining user information and determining whether the user information passes a verification. The method may further include in response to a determination that the user information passes the verification, controlling the smart door lock to perform an unlock operation. The method may further include determining whether the door on which the smart door lock is installed has a preset action within a preset time period and in response to a determination that the door has the preset action within the preset time period, controlling at least one component of the smart door lock to perform at least one operation.
SECURITY SYSTEM WITH ANTI-TAMPERING SENSORS AND CYBERSECURITY
The disclosed embodiments include a method for tamper-proof protection of containers used for shipment of goods. The system contains a lock with electronic and mechanical components and a controller. A sensor is connected to a lock so that if forms a closed loop. The sensor can be an optical fiber or a distributed arrangement with an optical or an electrical shield. The electronics in the lock provide real time monitoring of the status of the lock. The lock cannot be opened or reproduced due to the signature of the closed loop which is stored in a remote server. Intrusions detected are relayed to an authorized recipient via a variety of communication channels. The data and control of the entire system is protected with several programs targeted to provide cybersecurity.