HOME
*



picture info

Keyless Entry System
A remote keyless system (RKS), also known as keyless entry or remote central locking, is an electronic lock that controls access to a building or vehicle by using an electronic remote control (activated by a handheld device or automatically by proximity). Widely used in automobiles, an RKS performs the functions of a standard car key without physical contact. When within a few yards of the car, pressing a button on the remote can lock or unlock the doors, and may perform other functions. A remote keyless system can include both ''remote keyless entry'' (RKE), which unlocks the doors, and ''remote keyless ignition'' (RKI), which starts the engine. History One of the first introductions was in 1980 on the Ford Thunderbird, Mercury Cougar, Lincoln Continental Mark VI, and Lincoln Town Car, which Ford called ''Keyless Entry System'' (later renamed SecuriCode). It was a keypad on the driver-side exterior door above the door handle. It consisted of a keypad with five bu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Remote Central Locking
Remote may refer to: Arts, entertainment, and media * ''Remote'' (1993 film), a 1993 movie * ''Remote'' (2004 film), a Tamil-language action drama film * ''Remote'' (album), a 1988 album by Hue & Cry * Remote (band), ambient chillout band * ''Remote'' (manga), a 2002 manga * Remote broadcast, commonly known in broadcasting as a person or a live remote Computing and technology * Remote (Apple software), software application made by Apple Inc. for the iOS * Remote control, commonly known as a remote * Remote control car, a car that can be controlled from a distance * Remote desktop or operating system, can be controlled by another system device * Remote operation Places * Remote, Oregon * Remote Peninsula, Canada * Remote Western Australia Other uses * Remote and isolated community, a community in a remote location * Remote learning, distance learning * Remote, to implement a remotion, withdrawal of a ''privatdozent'' academic teaching license See also * Remote access (di ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Radio Transmitter
In electronics and telecommunications, a radio transmitter or just transmitter is an electronic device which produces radio waves with an antenna. The transmitter itself generates a radio frequency alternating current, which is applied to the antenna. When excited by this alternating current, the antenna radiates radio waves. Transmitters are necessary component parts of all electronic devices that communicate by radio, such as radio and television broadcasting stations, cell phones, walkie-talkies, wireless computer networks, Bluetooth enabled devices, garage door openers, two-way radios in aircraft, ships, spacecraft, radar sets and navigational beacons. The term ''transmitter'' is usually limited to equipment that generates radio waves for communication purposes; or radiolocation, such as radar and navigational transmitters. Generators of radio waves for heating or industrial purposes, such as microwave ovens or diathermy equipment, are not usually called transmitters, ev ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Security Token
A security token is a peripheral device used to gain access to an electronically restricted resource. The token is used in addition to or in place of a password. It acts like an electronic key to access something. Examples of security tokens include wireless keycards used to open locked doors, or in the case of a customer trying to access their bank account online, bank-provided tokens can prove that the customer is who they claim to be. Some security tokens may store cryptographic keys that may be used to generate a digital signature, or biometric data, such as fingerprint details. Some may also store passwords. Some designs incorporate tamper resistant packaging, while others may include small keypads to allow entry of a PIN or a simple button to start a generating routine with some display capability to show a generated key number. Connected tokens utilize a variety of interfaces including USB, near-field communication (NFC), radio-frequency identification (RFID), or Blu ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Torsion Spring
A torsion spring is a spring that works by twisting its end along its axis; that is, a flexible elastic object that stores mechanical energy when it is twisted. When it is twisted, it exerts a torque in the opposite direction, proportional to the amount (angle) it is twisted. There are various types: *A torsion bar is a straight bar of metal or rubber that is subjected to twisting (shear stress) about its axis by torque applied at its ends. *A more delicate form used in sensitive instruments, called a torsion fiber consists of a fiber of silk, glass, or quartz under tension, that is twisted about its axis. *A helical torsion spring, is a metal rod or wire in the shape of a helix (coil) that is subjected to twisting about the axis of the coil by sideways forces ( bending moments) applied to its ends, twisting the coil tighter. *Clocks use a spiral wound torsion spring (a form of helical torsion spring where the coils are around each other instead of piled up) sometimes ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Hydraulic Cylinder
A hydraulic cylinder (also called a linear hydraulic motor) is a mechanical actuator that is used to give a unidirectional force through a unidirectional stroke. It has many applications, notably in construction equipment ( engineering vehicles), manufacturing machinery, elevators, and civil engineering. Operation Hydraulic cylinders get their power from pressurized hydraulic fluid, which is incompressible. Typically oil is used as hydraulic fluid. The hydraulic cylinder consists of a cylinder barrel, in which a piston connected to a piston rod moves back and forth. The barrel is closed on one end by the cylinder bottom (also called the cap) and the other end by the cylinder head (also called the gland) where the piston rod comes out of the cylinder. The piston has sliding rings and seals. The piston divides the inside of the cylinder into two chambers, the bottom chamber (cap end) and the piston rod side chamber (rod end/head-end). Flanges, trunnions, clevises, and lugs ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Car Alarm
A car alarm is an electronic device installed in a vehicle in an attempt to discourage theft of the vehicle itself, its contents, or both. Car alarms work by emitting high-volume sound (often a vehicle-mounted siren, klaxon, pre-recorded verbal warning, the vehicle's own horn, or a combination of these) when the conditions necessary for triggering it are met. Such alarms may also cause the vehicle's headlights to flash, may notify the car's owner of the incident via a paging system, and may interrupt one or more electrical circuits necessary for the car to start. Although inexpensive to acquire and install, the effectiveness of such devices in deterring vehicle burglary or theft when their only effect is to emit sound appears to be negligible. History An early version of a car alarm for use as a theft deterrent was invented by an unknown prisoner from Denver in 1913. This version was manually armed, and triggered when someone tried to crank the engine. A later alarm inspired b ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Panic Button
A panic alarm is an electronic device that can easily be activated to request help during an emergency situation where danger to persons or property exists. It is designed to minimize time until assistance can arrive. A panic alarm is frequently but not always controlled by a concealed panic alarm button. These buttons can be connected to a monitoring center or locally via a silent alarm or an audible bell/siren. The alarm can be used to request emergency assistance from local security, police or emergency services. Some systems can also activate closed-circuit television to record or assess the event. Many panic alarm buttons lock on when pressed, and require a key to reset them. Others may have a short delay during which time the request of help can be cancelled. Alarm Examples of alarm panic buttons are: * A button in a critical system (such as a nuclear weapons system) used to quickly activate an extreme measure to mitigate an emergency situation. * A red button int ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Power Window
Power windows or electric windows are automobile windows which can be raised and lowered by pressing a button or switch, as opposed to using a crank handle. History Packard had introduced hydraulic window lifts (power windows) in fall of 1940, for its new 1941 Packard 180 series cars. This was a hydro-electric system. In 1941, the Ford Motor Company followed with the first power windows on the Lincoln Custom (only the limousine and seven-passenger sedans). Cadillac had a straight-electric divider window (but not side windows) on their series 75. Power assists originated in the need and desire to move convertible body-style tops up and down by some means other than human effort. The earliest power assists were vacuum-operated and were offered on Chrysler Corporation vehicles, particularly the low-cost Plymouth convertibles in the late 1930s. Shortly before World War II, General Motors developed a central hydraulic pump for working convertible tops. This system was introd ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Ignition System
An ignition system generates a spark or heats an electrode to a high temperature to ignite a fuel-air mixture in spark ignition internal combustion engines, oil-fired and gas-fired boilers, rocket engines, etc. The widest application for spark ignition internal combustion engines is in petrol (gasoline) road vehicles such as cars and motorcycles. Compression ignition Diesel engines ignite the fuel-air mixture by the heat of compression and do not need a spark. They usually have glowplugs that preheat the combustion chamber to allow starting in cold weather. Other engines may use a flame, or a heated tube, for ignition. While this was common for very early engines it is now rare. The first electric spark ignition was probably Alessandro Volta's toy electric pistol from the 1780s. Siegfried Marcus patented his "Electrical igniting device for gas engines" on 7 October 1884. History Magneto systems The simplest form of spark ignition is that using a magneto. The engine s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Key Fob
A keychain (also key fob or keyring) is a small ring or chain of metal to which several keys can be attached. The length of a keychain allows an item to be used more easily than if connected directly to a keyring. Some keychains allow one or both ends the ability to rotate, keeping the keychain from becoming twisted, while the item is being used. A keychain can also be a connecting link between a keyring and the belt of an individual. It is usually employed by personnel whose job demands frequent use of keys, such as a security guard, prison officer, janitor, or retail store manager. The chain is often retractable, and therefore may be a nylon rope, instead of an actual metal chain. The chain ensures that the keys remain attached to the individual using them, makes accidental loss less likely, and saves on wear and tear on the pockets of the user. Use of keychains Keychains are one of the most common souvenir and advertising items. Keychains are commonly used to promote busin ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Spoofing Attack
In the context of information security, and especially network security, a spoofing attack is a situation in which a person or program successfully identifies as another by falsifying data, to gain an illegitimate advantage. Internet Spoofing and TCP/IP Many of the protocols in the TCP/IP suite do not provide mechanisms for authenticating the source or destination of a message, leaving them vulnerable to spoofing attacks when extra precautions are not taken by applications to verify the identity of the sending or receiving host. IP spoofing and ARP spoofing in particular may be used to leverage man-in-the-middle attacks against hosts on a computer network. Spoofing attacks which take advantage of TCP/IP suite protocols may be mitigated with the use of firewalls capable of deep packet inspection or by taking measures to verify the identity of the sender or recipient of a message. Domain name spoofing The term 'Domain name spoofing' (or simply though less accurately, 'Domain s ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Encryption
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is possible to decrypt the message without possessing the key but, for a well-designed encryption scheme, considerable computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients but not to unauthorized users. Historically, various forms of encryption have been used to aid in cryptography. Early encryption techniques were often used in mil ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]