摘要:
A cable lock device includes a housing, a tampering subsystem, and a cable having a first end and a second end. The first end is attached to the housing and is electrically connected to the tampering subsystem and the second end is selectively attached to the housing. In addition, a switch is disposed within the housing and is electrically connected to the tampering subsystem. The switch is movable between an open state and a closed state to indicate when the second end is attached to the housing. The tampering subsystem includes control circuitry that monitors the position of the switch and the status of the cable to detect removal of the second end from the housing and/or severance of the cable. The control circuitry relays status information of the cable lock device to a control unit via a transmitter to alert a property owner of a security breach.
摘要:
An asset monitoring and security system includes at least one asset assigned a unique identifier and operable wirelessly transmit an identification signal embodying the identifier. A data store maintains a list of the assets and privileges associated with the assets for authorized users of the assets. A control unit is adapted to receive identification signals from the assets and monitor positions of the assets within a defined area. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given asset for authorized users of the asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated. The control unit activates the lock-out mechanism of a given asset when the privileges associated with the asset for authorized users of the asset are exceeded.
摘要:
An asset monitoring and security system includes at least one asset and at least one user identification device assigned a unique identifier and operable to transmit an identification signal embodying the identifier over a wireless communications link. A data store maintains lists of the assets, users authorized to use the assets, and privileges associated with the assets for each of the authorized users. A control unit is adapted to receive identification signals from the assets and user identification devices and monitor positions of the assets and user identification devices within a defined area based on the identification signals. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given authorized user for a given asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated.
摘要:
An asset monitoring and security system includes at least one asset assigned a unique identifier and operable wirelessly transmit an identification signal embodying the identifier. A data store maintains a list of the assets and privileges associated with the assets for authorized users of the assets. A control unit is adapted to receive identification signals from the assets and monitor positions of the assets within a defined area. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given asset for authorized users of the asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated. The control unit activates the lock-out mechanism of a given asset when the privileges associated with the asset for authorized users of the asset are exceeded.
摘要:
An asset monitoring and security system includes at least one asset assigned a unique identifier and operable wirelessly transmit an identification signal embodying the identifier. A data store maintains a list of the assets and privileges associated with the assets for authorized users of the assets. A control unit is adapted to receive identification signals from the assets and monitor positions of the assets within a defined area. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given asset for authorized users of the asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated. The control unit activates the lock-out mechanism of a given asset when the privileges associated with the asset for authorized users of the asset are exceeded.
摘要:
An asset monitoring and security system includes at least one asset assigned a unique identifier and operable wirelessly transmit an identification signal embodying the identifier. A data store maintains a list of the assets and privileges associated with the assets for authorized users of the assets. A control unit is adapted to receive identification signals from the assets and monitor positions of the assets within a defined area. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given asset for authorized users of the asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated. The control unit activates the lock-out mechanism of a given asset when the privileges associated with the asset for authorized users of the asset are exceeded.
摘要:
An asset monitoring and security system includes at least one asset and at least one user identification device assigned a unique identifier and operable to transmit an identification signal embodying the identifier over a wireless communications link. A data store maintains lists of the assets, users authorized to use the assets, and privileges associated with the assets for each of the authorized users. A control unit is adapted to receive identification signals from the assets and user identification devices and monitor positions of the assets and user identification devices within a defined area based on the identification signals. The control unit communicates with the data store and is further operable to initiate an alarm event when privileges associated with a given authorized user for a given asset are exceeded. Each of the assets includes a lock-out mechanism that impedes use of the asset when the lock-out mechanism is activated.
摘要:
A system of cordless power tools includes a cordless power tool adapted to removably receive a rechargeable battery pack. The battery pack and the power tool can have complementary grooves and rails or L-shaped surfaces that aid in aligning the positive and negative blade terminals of the battery pack to the positive and negative tool terminals, respectively, of the power tool.
摘要:
A system of cordless power tools includes a cordless power tool adapted to removably receive a rechargeable battery pack. The system further includes a battery pack charger and a converter for converting AC electricity to DC electricity. A battery pack interface block is captured between clam shell halves of a battery pack housing and includes a plurality of male blade terminals. The male blade terminals are received within recessed female terminals of a tool terminal block and similarly received by recessed female terminals of the charger. The tool terminal block further includes a pair of male terminals which engage recessed female terminals of the converter.
摘要:
A system of cordless power tools includes a cordless power tool adapted to removably receive a rechargeable battery pack. The battery pack and the power tool can have complementary grooves and rails or L-shaped surfaces that aid in aligning the positive and negative blade terminals of the battery pack to the positive and negative tool terminals, respectively, of the power tool.