Smart lock

Last updated
Electronic keypad lock Nest Yale (cropped).jpg
Electronic keypad lock

A smart lock is an electromechanical lock that is designed to perform locking and unlocking operations on a door when it receives a prompt via an electronic keypad, biometric sensor, access card, Bluetooth, or Wi-FI from a registered mobile device. These locks are called smart locks because they use advanced technology and Internet communication to enable easier access for users and enhanced security from intruders. The main components of the smart lock include the physical lock, the key (which can be electronic, digitally encrypted, or a virtual key to provide keyless entry), a secure Bluetooth or Wi-Fi connection, and a management mobile app. Smart locks may also monitor access and send alerts in response to the different events it monitors, as well as other critical events related to the status of the device. Smart locks can be considered part of a smart home. [1]

Contents

Most smart locks are installed on mechanical locks (simple types of locks, including deadbolts) and they physically upgrade the ordinary lock. Recently, smart locking controllers have also appeared at the market.

Smart locks, like the traditional locks, need two main parts to work: the lock and the key. In the case of these electronic locks, the key is not a physical key but a smartphone or a special key fob or keycard configured explicitly for this purpose which wirelessly performs the authentication needed to automatically unlock the door

Smart lock controlled by a phone app Nuki Smart Lock.jpg
Smart lock controlled by a phone app

Smart locks allow users to grant access to a third party by means of a virtual key. [2] This key can be sent to the recipient smartphone over standard messaging protocols such as e-mail or SMS, or via a dedicated application. Once this key is received, the recipient will be able to unlock the smart lock using their mobile device during the timeframe previously specified by the sender.

Certain smart locks include a built-in Wi-Fi connection that allows for monitoring features such as access notifications or cameras to show the person requesting access. [3] Some smart locks work with a smart doorbell to allow the user to see who and when someone is at a door. Many smart locks now also feature biometric features, such as fingerprint sensors. Biometrics are becoming increasingly popular because they offer more security than passwords alone. This is because they use unique physical characteristics rather than stored information.

Smart locks may use Bluetooth Low Energy and SSL to communicate, encrypting communications using 128/256-bit AES. [4]

Industry smart lock

Industrial smart locks (passive electronic lock) are a branch of the smart lock field. They are an iterative product of mechanical locks like smart locks. However, the application areas of industrial smart locks are not smart homes, but fields that have extremely high requirements for key management, such as communications, power utilities, water utilities, public safety, transportation, data centers, etc.[ citation needed ]

Industry smart locks mainly have three components: locks and keys, and management systems. Similarly, the key is no longer a physical key, but a special electronic key. When unlocking, the unlocking authority needs to be assigned before. Through the management system, the administrator needs to set the user, unlock date and time period for the key. Whenever the user unlocks or locks the lock, the unlock record will be saved in the key. [5] The unlocking record can be tracked through the management software.

Industry smart lock cylinder (passive electronic cylinder lock) Industry smart lock cylinder.jpg
Industry smart lock cylinder (passive electronic cylinder lock)

At the same time, industry smart locks can also remotely assign permissions through a mobile app.

Security

Due to the inherent complexity of digital and wireless technologies, it can be difficult for the end user to confirm or refute the security claims of various product offerings on the market. [6] The devices may also gather personal information; representations by the vendors involved concerning the care and handling of this information is also difficult to verify by the end user. [6]

See also

Related Research Articles

<span class="mw-page-title-main">Access control</span> Selective restriction of access to a place or other resource, allowing only authorized users

In physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of accessing may mean consuming, entering, or using. Permission to access a resource is called authorization.

<span class="mw-page-title-main">Physical security</span> Measures designed to deny unauthorized access

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm. Physical security involves the use of multiple layers of interdependent systems that can include CCTV surveillance, security guards, protective barriers, locks, access control, perimeter intrusion detection, deterrent systems, fire protection, and other systems designed to protect persons and property.

<span class="mw-page-title-main">Mobile computing</span> Human–computer interaction in which a computer is expected to be transported during normal usage

Mobile computing is human–computer interaction in which a computer is expected to be transported during normal usage and allow for transmission of data, which can include voice and video transmissions. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc networks and infrastructure networks as well as communication properties, protocols, data formats, and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.

<span class="mw-page-title-main">Smart device</span> Type of electronic device

A smart device is an electronic device, generally connected to other devices or networks via different wireless protocols that can operate to some extent interactively and autonomously. Several notable types of smart devices are smartphones, smart speakers, smart cars, smart thermostats, smart doorbells, smart locks, smart refrigerators, phablets and tablets, smartwatches, smart bands, smart keychains, smart glasses, and many others. The term can also refer to a device that exhibits some properties of ubiquitous computing, including—although not necessarily—machine learning.

<span class="mw-page-title-main">Mobile device</span> Small, hand-held computing device

A mobile device, also referred to as a digital assistant, is a computer small enough to hold and operate in the hand. Mobile devices typically have a flat LCD or OLED screen, a touchscreen interface, and digital or physical buttons. They may also have a physical keyboard. Many mobile devices can connect to the Internet and connect with other devices, such as car entertainment systems or headsets, via Wi-Fi, Bluetooth, cellular networks, or near-field communication. Integrated cameras, the ability to place and receive voice and video telephone calls, video games, and Global Positioning System (GPS) capabilities are common. Power is typically provided by a lithium-ion battery. Mobile devices may run mobile operating systems that allow third-party applications to be installed and run.

<span class="mw-page-title-main">Wi-Fi hotspot</span> Wi-Fi access point

A hotspot is a physical location where people can obtain Internet access, typically using Wi-Fi technology, via a wireless local-area network (WLAN) using a router connected to an Internet service provider.

<span class="mw-page-title-main">Security token</span> Device used to access electronically restricted resource

A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to, or in place of, a password. It acts like an electronic key to access something. Examples of security tokens include wireless keycards used to open locked doors, or a banking token used as a digital authenticator for signing in to online banking, or signing a transaction such as a wire transfer.

<span class="mw-page-title-main">Smart key</span> Electronic access and authorization system

A smart key is an electronic access and authorization system that is available either as standard equipment, or as an option in several car designs. It was first developed by Siemens in 1995 and introduced by Mercedes-Benz under the name "Keyless-Go" in 1998 on the W220 S-Class, after the design patent was filed by Daimler-Benz on May 17, 1997.

<span class="mw-page-title-main">Electronic lock</span> Locking device which operates by means of electric current

An electronic lock is a locking device which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock. Electric locks may be connected to an access control system, the advantages of which include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where activity is recorded. Electronic locks can also be remotely monitored and controlled, both to lock and to unlock.

<span class="mw-page-title-main">Home network</span> Type of computer network

A home network or home area network (HAN) is a type of computer network that facilitates communication among devices within the close vicinity of a home. Devices capable of participating in this network, for example, smart devices such as network printers and handheld mobile computers, often gain enhanced emergent capabilities through their ability to interact. These additional capabilities can be used to increase the quality of life inside the home in a variety of ways, such as automation of repetitive tasks, increased personal productivity, enhanced home security, and easier access to entertainment.

Proximity marketing is the localized wireless distribution of advertising content associated with a particular place. Transmissions can be received by individuals in that location who wish to receive them and have the necessary equipment to do so.

A keycard lock is a lock operated by a keycard, a flat, rectangular plastic card. The card typically, but not always, has identical dimensions to that of a credit card or American and EU driver's license. The card stores a physical or digital pattern that the door mechanism accepts before disengaging the lock.

Mobile security, or mobile device security, is the protection of smartphones, tablets, and laptops from threats associated with wireless computing. It has become increasingly important in mobile computing. The security of personal and business information now stored on smartphones is of particular concern.

Wireless lock is a protection concept for authenticated LAN or WLAN network clients offered from various vendors in various functional shapes and physical designs. In contrast to wireless keys, wireless lock puts emphasis on automatic locking instead of just locking by time-out or unlocking.

AT&T Digital Life, headquartered in Dallas, Texas, was a maker of wireless home security systems with burglary and fire monitoring for homes and apartments in the United States. Digital Life services are no longer supported starting September 1, 2022.

<span class="mw-page-title-main">UniKey</span>

UniKey Technologies is an alternative access control company based in the United States that designs and licenses keyless entry technology worldwide. Its first product in partnership with Kwikset is Kēvo, a Bluetooth-enabled deadbolt door lock.

Mobile location analytics (MLA) is a type of customer intelligence and refers to technology for retailers, including developing aggregate reports used to reduce waiting times at checkouts, improving store layouts, and understanding consumer shopping patterns. The reports are generated by recognizing the Wi-Fi or Bluetooth addresses of cell phones as they interact with store networks.

<span class="mw-page-title-main">August Home</span>

August, Inc is a San Francisco home automation company, focusing on Wi-Fi connected door locks and doorbell cameras. The company was founded in November 2012 by Yves Béhar and Jason Johnson.

<span class="mw-page-title-main">Hearables</span> Electronic ear-based devices

Hearables or smart headphones or earbuds are electronic in-ear devices designed for multiple purposes. The category is split between hearables for hearing health, and hearables for other applications.

A smart ring is a compact wearable electronic device that combines mobile technology with features for convenient on-the-go use. These devices, typically designed to fit on a finger like a traditional ring, offer functionalities like mobile payments, access control, gesture control, and activity tracking. Smart rings can connect to smartphones or other devices, and some can operate independently, communicating with cloud-based systems or performing standalone tasks. While lacking traditional displays, they respond to contextual cues, such as proximity to payment terminals or specific gestures.

References

  1. "Your Door Is About to Get Clever: 5 Smart Locks Compared". Wired . 2013-06-19.
  2. "6 Top Reasons Commercial Smart Locks Save Time & Money". VIZpin. 2021-01-25. Retrieved 2021-06-04.
  3. "Goji's Smart Lock snaps pictures, welcomes you by name". Engadget . 2013-06-04.
  4. "Smart Locks, Secure or Just Dumb?". Gizmodo . 2013-06-05.
  5. CN 203334826,Zhang, Yihui,"Passive electronic lock and key",published 2013-12-11
  6. 1 2 Cox, Kate (7 April 2020). "Easy-to-pick "smart" locks gush personal data, FTC finds". arstechnica.com. Ars Technica . Retrieved 8 April 2020.