Smart lock

Last updated
Electronic keypad lock Nest Yale (cropped).jpg
Electronic keypad lock

A smart lock is an electromechanical lock that is designed to perform locking and unlocking operations on a door when it receives a prompt via an electronic keypad, biometric sensor, access card, Bluetooth, or Wi-FI from a registered mobile device. These locks are called smart locks because they use advanced technology and Internet communication to enable easier access for users and enhanced security from intruders. The main components of the smart lock include the physical lock, the key (which can be electronic, digitally encrypted, or a virtual key to provide keyless entry), a secure Bluetooth or Wi-Fi connection, and a management mobile app. Smart locks may also monitor access and send alerts in response to the different events it monitors, as well as other critical events related to the status of the device. Smart locks can be considered part of a smart home. [1]

Contents

Most smart locks are installed on mechanical locks (simple types of locks, including deadbolts) and they physically upgrade the ordinary lock. Recently, smart locking controllers have also appeared at the market.

Smart locks, like the traditional locks, need two main parts to work: the lock and the key. In the case of these electronic locks, the key is not a physical key but a smartphone or a special key fob or keycard configured explicitly for this purpose which wirelessly performs the authentication needed to automatically unlock the door

Smart lock controlled by a phone app Nuki Smart Lock.jpg
Smart lock controlled by a phone app

Smart locks allow users to grant access to a third party by means of a virtual key. [2] This key can be sent to the recipient smartphone over standard messaging protocols such as e-mail or SMS, or via a dedicated application. Once this key is received, the recipient will be able to unlock the smart lock using their mobile device during the timeframe previously specified by the sender.

Certain smart locks include a built-in Wi-Fi connection that allows for monitoring features such as access notifications or cameras to show the person requesting access. [3] Some smart locks work with a smart doorbell to allow the user to see who and when someone is at a door. Many smart locks now also feature biometric features, such as fingerprint sensors. Biometrics are becoming increasingly popular because they offer more security than passwords alone. This is because they use unique physical characteristics rather than stored information.

Smart locks may use Bluetooth Low Energy and SSL to communicate, encrypting communications using 128/256-bit AES. [4]

Industry smart lock

Industrial smart locks (passive electronic lock) are a branch of the smart lock field. They are an iterative product of mechanical locks like smart locks. However, the application areas of industrial smart locks are not smart homes, but fields that have extremely high requirements for key management, such as communications, power utilities, water utilities, public safety, transportation, data centers, etc.[ citation needed ]

Industry smart locks mainly have three components: locks and keys, and management systems. Similarly, the key is no longer a physical key, but a special electronic key. When unlocking, the unlocking authority needs to be assigned before. Through the management system, the administrator needs to set the user, unlock date and time period for the key. Whenever the user unlocks or locks the lock, the unlock record will be saved in the key. [5] The unlocking record can be tracked through the management software.

Industry smart lock cylinder (passive electronic cylinder lock) Industry smart lock cylinder.jpg
Industry smart lock cylinder (passive electronic cylinder lock)

At the same time, industry smart locks can also remotely assign permissions through a mobile app.

Security

Due to the inherent complexity of digital and wireless technologies, it can be difficult for the end user to confirm or refute the security claims of various product offerings on the market. [6] The devices may also gather personal information; representations by the vendors involved concerning the care and handling of this information is also difficult for the end user to verify. [6]

See also

Related Research Articles

<span class="mw-page-title-main">Access control</span> Selective restriction of access to a place or other resource, allowing only authorized users

In physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

<span class="mw-page-title-main">Physical security</span> Measures designed to deny unauthorized access

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm. Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.

<span class="mw-page-title-main">Mobile computing</span> Human–computer interaction in which a computer is expected to be transported during normal usage

Mobile computing is human–computer interaction in which a computer is expected to be transported during normal usage and allow for transmission of data, which can include voice and video transmissions. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc networks and infrastructure networks as well as communication properties, protocols, data formats, and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.

<span class="mw-page-title-main">Smart device</span> Type of electronic device

A smart device is an electronic device, generally connected to other devices or networks via different wireless protocols that can operate to some extent interactively and autonomously. Several notable types of smart devices are smartphones, smart speakers, smart cars, smart thermostats, smart doorbells, smart locks, smart refrigerators, phablets and tablets, smartwatches, smart bands, smart keychains, smart glasses, and many others. The term can also refer to a device that exhibits some properties of ubiquitous computing, including—although not necessarily—machine learning.

<span class="mw-page-title-main">Security token</span> Device used to gain access to restricted resource

A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. Examples of security tokens include wireless key cards used to open locked doors, a banking token used as a digital authenticator for signing in to online banking, or signing transactions such as wire transfers.

<span class="mw-page-title-main">Mobile phone feature</span> Mobile phone capability or application

A mobile phone feature is a capability, service, or application that a mobile phone offers to its users. Mobile phones are often referred to as feature phones, and offer basic telephony. Handsets with more advanced computing ability through the use of native code try to differentiate their own products by implementing additional functions to make them more attractive to consumers. This has led to great innovation in mobile phone development over the past 20 years.

<span class="mw-page-title-main">Electronic lock</span> Locking device which operates by means of electric current

An electronic lock is a locking device which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock. Electric locks may be connected to an access control system, the advantages of which include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where activity is recorded. Electronic locks can also be remotely monitored and controlled, both to lock and to unlock.

<span class="mw-page-title-main">Home network</span> Type of computer network

A home network or home area network (HAN) is a type of computer network that facilitates communication among devices within the close vicinity of a home. Devices capable of participating in this network, for example, smart devices such as network printers and handheld mobile computers, often gain enhanced emergent capabilities through their ability to interact. These additional capabilities can be used to increase the quality of life inside the home in a variety of ways, such as automation of repetitive tasks, increased personal productivity, enhanced home security, and easier access to entertainment.

Proximity marketing is the localized wireless distribution of advertising content associated with a particular place. Transmissions can be received by individuals in that location who wish to receive them and have the necessary equipment to do so.

A keycard lock is a lock operated by a keycard, a flat, rectangular plastic card. The card typically, but not always, has identical dimensions to that of a credit card, that is ID-1 format. The card stores a physical or digital pattern that the door mechanism accepts before disengaging the lock.

Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern.

Wireless lock is a protection concept for authenticated LAN or WLAN network clients offered from various vendors in various functional shapes and physical designs. In contrast to wireless keys, wireless lock puts emphasis on automatic locking instead of just locking by time-out or unlocking.

AT&T Digital Life, Inc., headquartered in Dallas, Texas, was a maker of wireless home security systems with burglary and fire monitoring for homes and apartments in the United States. Digital Life services are no longer supported starting September 1, 2022.

<span class="mw-page-title-main">Lockitron</span> Device able to remotely lock and unlock doors

Lockitron is a device which can lock and unlock doors via remote control, typically via a smartphone. Starting with installations in 2010, it is one of the earliest examples of a smart lock. Lockitron was made by Apigy Inc., a start-up based in Mountain View, California. Apigy was a graduate of the Y Combinator start-up accelerator.

<span class="mw-page-title-main">UniKey</span> Security technologies company

UniKey Technologies is an alternative access control company based in the United States that designs and licenses keyless entry technology worldwide. Its first product in partnership with Kwikset was Kēvo, a Bluetooth-enabled deadbolt door lock.

<span class="mw-page-title-main">HomeKit</span> Software framework by Apple for home automation

HomeKit, also known as Apple Home, is a software framework and communication protocol developed by Apple Inc. that lets users configure, communicate with and control smart-home appliances using Apple devices. It provides users with a way to automatically discover such devices and configure them. By designing rooms, items and actions in HomeKit, users can enable automations in the home through a voice command to Siri or through Apple's Home app or third party apps. With HomeKit, developers are able to create complex applications in order to manage accessories at a high level.

Mobile location analytics (MLA) is a type of customer intelligence and refers to technology for retailers, including developing aggregate reports used to reduce waiting times at checkouts, improving store layouts, and understanding consumer shopping patterns. The reports are generated by recognizing the Wi-Fi or Bluetooth addresses of cell phones as they interact with store networks.

<span class="mw-page-title-main">August Home</span>

August, Inc. is a San Francisco-based home automation company, focusing on Wi-Fi connected door locks and doorbell cameras. The company was founded in November 2012 by Yves Béhar and Jason Johnson.

<span class="mw-page-title-main">Hearables</span> Electronic ear-based devices

Hearables or smart headphones or earbuds are electronic in-ear devices designed for multiple purposes. The category is split between hearables for hearing health, and hearables for other applications.

A smart ring is a compact wearable electronic device that combines mobile technology with features for convenient on-the-go use. These devices, typically designed to fit on a finger like a traditional jewelry ring, can offer functionalities like mobile payments, access control, gesture control, and activity tracking. Their most common feature is near-field communication (NFC), providing similar capability to what is built into many smart cards such as credit cards and employee security badges. Thus, they can be used for identification and payments.

References

  1. "Your Door Is About to Get Clever: 5 Smart Locks Compared". Wired . 2013-06-19.
  2. "6 Top Reasons Commercial Smart Locks Save Time & Money". VIZpin. 2021-01-25. Retrieved 2021-06-04.
  3. "Goji's Smart Lock snaps pictures, welcomes you by name". Engadget . 2013-06-04.
  4. "Smart Locks, Secure or Just Dumb?". Gizmodo . 2013-06-05.
  5. CN 203334826,Zhang, Yihui,"Passive electronic lock and key",published 2013-12-11
  6. 1 2 Cox, Kate (7 April 2020). "Easy-to-pick "smart" locks gush personal data, FTC finds". arstechnica.com. Ars Technica . Retrieved 8 April 2020.