摘要:
Various enhancements are provided to a pushbutton lock to enhance its security. One is the provision of button tips that are mounted on the ends of the button assemblies and spring-loaded to protrude from the face of the lock, regardless of whether the underlying button is 'in' or 'out'. By this arrangement, a bystander cannot readily see the button combination by the pattern of depressed buttons. This arrangement also reduces tactile feedback between the underlying button assembly and the externally available button tips, increasing resistance to pick attacks. A further enhancement is the provision of button bars between adjacent pairs of button tips. Whenever any of the button tips is manually depressed, the corresponding button bar is pressed into engagement with, and prevents movement of, a member that must be moved in order to unlock the lock. This arrangement further increases lock security by preventing an attacker from experimentally pressing buttons and judging the tactile effect thereon in attempted unlockings of the lock.
摘要:
An electric power line communication system (20) operates with an electric power distribution system to provide through premises power distribution lines (28) highly reliable communication links among receiving devices (26, 32, 40, 46, 68, 112) electrically coupled orlocated in proximity to the premises power distribution lines. A power line transceiver (22,30, 34) is designed to transmit and receive through the premises power distribution lines modulated carrier signals conveying information over the communication links. The powerline transceiver operates in a transmitter mode as an intentional radiator to emit modulated carrier signals by transmitting them at a frequency band and a power level sufficient to form by electrical conduction a communication link with a modulated carrier signal receiving device.
摘要:
A system and method for determining the position of a radio frequency identification (RFID) transponder (520) with respect to a sensor. In one embodiment, the system comprises a plurality of stationary sensors (402) located in an array (404, 406, 408) within certain physical areas. Each sensor comprises a plurality of antenna coils (1002, 1032, 1062) arranged in unique physical orientations and capable of transmitting radio frequency signals of differing phase. The RFID transponder includes an antenna (1402) which receives the plurality of signals generated by the antenna coils, and compares (1912) the phase of at least two of the signals to determine the relative position of the transponder. In a second aspect of the invention, the aforementioned antenna coils emit two direction finding mode (DFM) signals in succession; the first signal (1804) with all antenna coils turned on, the second (1810) with one of the coils turned off (1808). The spatial relationship of the transponder antenna and individual antenna coils precludes all of the signals in each sensor from being rejected by the transponder during emission of both the first and second DFM signal. Hence, the transponder is kept in constant communication with the sensor in all orientations. In another embodiment, the location of the transponder with respect to two or more sensor(s) is determined through measurement of the intensity of the signals received by the antenna coil of the transponder. The invention also includes a system and method for transmitting data between a sensor and a dormant (motionless) RFID transponder using a hand-held high intensity RF probe (2002).
摘要:
A wireless alarm system (10) employs two-way transceivers (32, 60) in a network of smoke detectors (16), a base station (12), and other sensors. A keypad (14) is not needed because the system is reset by pressing a Test/Silence button (66) built into every detector or sensor. A siren is also eliminated because a sounder (64) in every detector sounds an alarm when any sensor is triggered. This is possible because every detector includes a transceiver that can receive alarm messages from any other detector. AC power wiring is also eliminated because the base station and sensors are battery powered. Only a telephone connection (48) is needed if the system is to be monitored. In apartments or dormitory installations, smoke detectors in one apartment relay alarm messages to the next apartment, and onto the next, and so on, to a centralized base station for the entire facility. The centralized base station can be located in an apartment manager's office for immediate notification of an alarm, improper smoke detector operation, low or missing battery indications, and dirty smoke detector indications. The two-way wireless alarm system can save many lives in apartments, where smoke detectors batteries are often depleted or removed.
摘要:
Various enhancements are provided to a pushbutton lock to enhance its security. One is the provision of button tips that are mounted on the ends of the button assemblies and spring-loaded to protrude from the face of the lock, regardless of whether the underlying button is "in" or "out". By this arrangement, a bystander cannot readily see the button combination by the pattern of depressed buttons. This arrangement also reduces tactile feedback between the underlying button assembly and the externally available button tips, increasing resistance to pick attacks. A further enhancement is the provision of button bars between adjacent pairs of button tips. Whenever any of the button tips is manually depressed, the corresponding button bar is pressed into engagement with, and prevents movement of, a member that must be moved in order to unlock the lock. This arrangement further increases lock security by preventing an attacker from experimentally pressing buttons and judging the tactile effect thereon in attempted unlockings of the lock.
摘要:
An improved environmental alarm system having centralized control of local sensor display capabilities displays, on the sensor (4) itself, a variety of sensor data including sensor address and detected levels of one or more environmental conditions. Alphanumeric characters are displayed at individual sensors (4) in response to commands from a master microprocessor (9) directing local sensor display content and timing. A local microcontroller (17) within each sensor (4) interprets the detected signal and prepares a resulting data signal that is available for downloading into the alphanumeric display (7) in compliance with a coded message from the master microprocessor (9).
摘要:
Various enhancements are provided to a pushbutton lock to enhance its security. One is the provision of button tips that are mounted on the ends of the button assemblies and spring-loaded to protrude from the face of the lock, regardless of whether the underlying button is 'in' or 'out'. By this arrangement, a bystander cannot readily see the button combination by the pattern of depressed buttons. This arrangement also reduces tactile feedback between the underlying button assembly and the externally available button tips, increasing resistance to pick attacks. A further enhancement is the provision of button bars between adjacent pairs of button tips. Whenever any of the button tips is manually depressed, the corresponding button bar is pressed into engagement with, and prevents movement of, a member that must be moved in order to unlock the lock. This arrangement further increases lock security by preventing an attacker from experimentally pressing buttons and judging the tactile effect thereon in attempted unlockings of the lock.
摘要:
Security systems and methods control access at remote locations protected by electronic locks (120). Users open or otherwise manipulate an electronic lock (120) via an electronic key device (114). The electronic key device (114) may be an open architecture PDA programmed to function as an electronic key device, while retaining its general-purpose PDA functionality. Alternatively, the electronic key device (114) may be a special-purpose device designed to function as an electronic key device. The key device (114) and the lock box (120) communicate with each other, preferably, by infrared techniques. The lock box (120) and the key device (114) are administered by a central authority via a central computer, which coordinates all security measures through the use of , e.g. frequent updates; tokens that the key device cannot read; checksums, including Message Authentication Codes; and encryption. A plurality of key devices (114) may be programmed to open the same lock box (120). A key device (114) may open a plurality of lock boxes.