HOME
*





Anti-theft
Anti-theft systems protect valuables such as vehicles and personal property like wallets, phones, and jewelry. They are also used in retail settings to protect merchandise in the form of security tags and labels. Anti-theft systems include devices such as locks and keys, RFID tags, and GPS locators. Anti-theft Under normal circumstances, theft is prevented simply through the application, and social acceptance, of property law. The best anti-theft device ownership-marking, e.g. license plates, name tags, RFID. When clear owner identification is not possible, and when there is a lack of social observance, people may be inclined to take possession of items to their own benefit at the expense of the original owner. ''Motive'' and ''opportunity'' are two enabling factors for theft. Given that motives for theft are varied and complex, and are, generally speaking, not within the control of the victim, most methods of theft prevention rely on reducing opportunities for theft. Motive ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Steering-wheel Lock
A steering-wheel lock is a visible anti-theft deviceSeelhorst, Mary"Think It's New? Think Again!" March 2002.''Popular Mechanics'', Retrieved 8 February 2017. that immobilizes the steering wheel of a car. Also known as a crook lock, or club lock, the first generation of steering-wheel locks, known as canes,Raven, Greg & Chad Erickson (2011)''Water-Cooled VW Performance Handbook: 3rd Edition'', p. 192. MBI Publishing Company.Google Books. Retrieved 8 February 2017. consisted of a lockable bar that connected the steering wheel to the brake pedal or clutch pedal. Later models include devices which lock across the steering wheel and extend out over the dashboardPhillips, Bill (1993)''Home Mechanix Guide to Security: Protecting Your Home, Car, & Family'', p. 124. Wiley.Google Books. Retrieved 8 February 2017. preventing the steering wheel from being turned. Wheel-locks have been used since at least the early 1920s, when many cars were open touring cars and roadsters (later known as co ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Passive Immobilizer
An immobiliser or immobilizer is an electronic security device fitted to a motor vehicle that prevents the engine from being started unless the correct key (''transponder'' or ''smart key'') is present. This prevents the vehicle from being " hot wired" after entry has been achieved and thus reduces motor vehicle theft. Research shows that the uniform application of immobilisers reduced the rate of car theft by 40%. Description The electric immobiliser/alarm system was invented by St. George Evans and Edward Birkenbuel and patented in 1919. They developed a 3x3 grid of double-contact switches on a panel mounted inside the car so when the ignition switch was activated, current from the battery (or magneto) went to the spark plugs allowing the engine to start, or immobilizing the vehicle and sounding the horn. The system settings could be changed each time the car was driven. Modern immobiliser systems are automatic, meaning the owner does not have to remember to activate it. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Immobilizer
An immobiliser or immobilizer is an electronic security device fitted to a motor vehicle that prevents the engine from being started unless the correct key (''transponder'' or ''smart key'') is present. This prevents the vehicle from being " hot wired" after entry has been achieved and thus reduces motor vehicle theft. Research shows that the uniform application of immobilisers reduced the rate of car theft by 40%. Description The electric immobiliser/alarm system was invented by St. George Evans and Edward Birkenbuel and patented in 1919. They developed a 3x3 grid of double-contact switches on a panel mounted inside the car so when the ignition switch was activated, current from the battery (or magneto) went to the spark plugs allowing the engine to start, or immobilizing the vehicle and sounding the horn. The system settings could be changed each time the car was driven. Modern immobiliser systems are automatic, meaning the owner does not have to remember to activate it. ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

RFID Tag
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory number, back to the reader. This number can be used to track inventory goods. Passive tags are powered by energy from the RFID reader's interrogating radio waves. Active tags are powered by a battery and thus can be read at a greater range from the RFID reader, up to hundreds of meters. Unlike a barcode, the tag does not need to be within the line of sight of the reader, so it may be embedded in the tracked object. RFID is one method of automatic identification and data capture (AIDC). RFID tags are used in many industries. For example, an RFID tag attached to an automobile during production can be used to track it ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Safe
A safe (also called a strongbox or coffer) is a secure lockable box used for securing valuable objects against theft or fire. A safe is usually a hollow cuboid or cylinder, with one face being removable or hinged to form a door. The body and door may be cast from metal (such as steel) or formed out of plastic through blow molding. Bank teller safes typically are secured to the counter, have a slit opening for dropping valuables into the safe without opening it, and a time-delay combination lock to foil thieves. One significant distinction between types of safes is whether the safe is secured to a wall or structure or if it can be moved around. A less secure version (only suitable for petty cash) is usually called a cash-box. History The first known safe dates back to the 13th century BC and was found in the tomb of Pharaoh Ramesses II. It was made of wood and consisted of a locking system resembling the modern pin tumbler lock. In the 16th century, blacksmiths in souther ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Engine Control Module
An engine control unit (ECU), also commonly called an engine control module (ECM), is a type of electronic control unit that controls a series of actuators on an internal combustion engine to ensure optimal engine performance. It does this by reading values from a multitude of sensors within the engine bay, interpreting the data using multidimensional performance maps (called lookup tables), and adjusting the engine actuators. Before ECUs, air–fuel mixture, ignition timing, and idle speed were mechanically set and dynamically controlled by mechanical and pneumatic means. If the ECU has control over the fuel lines, then it is referred to as an electronic engine management system (EEMS). The fuel injection system has the major role of controlling the engine's fuel supply. The whole mechanism of the EEMS is controlled by a stack of sensors and actuators. Workings Control of air–fuel ratio Most modern engines use some type of fuel injection to deliver fuel to the cylinde ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Theft
Theft is the act of taking another person's property or services without that person's permission or consent with the intent to deprive the rightful owner of it. The word ''theft'' is also used as a synonym or informal shorthand term for some crimes against property, such as larceny, robbery, embezzlement, extortion, blackmail, or receiving stolen property. In some jurisdictions, ''theft'' is considered to be synonymous with ''larceny'', while in others, ''theft'' is defined more narrowly. Someone who carries out an act of theft may be described as a "thief" ( : thieves). ''Theft'' is the name of a statutory offence in California, Canada, England and Wales, Hong Kong, Northern Ireland, the Republic of Ireland, and the Australian states of South Australia Theft (and receiving). and Victoria. Theft. Elements The '' actus reus'' of theft is usually defined as an unauthorized taking, keeping, or using of another's property which must be accompanied by a '' mens rea'' of dish ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Vehicle Registration Plate
A vehicle registration plate, also known as a number plate (British English), license plate (American English), or licence plate ( Canadian English), is a metal or plastic plate attached to a motor vehicle or trailer for official identification purposes. All countries require registration plates for road vehicles such as cars, trucks, and motorcycles. Whether they are required for other vehicles, such as bicycles, boats, or tractors, may vary by jurisdiction. The registration identifier is a numeric or alphanumeric ID that uniquely identifies the vehicle or vehicle owner within the issuing region's vehicle register. In some countries, the identifier is unique within the entire country, while in others it is unique within a state or province. Whether the identifier is associated with a vehicle or a person also varies by issuing agency. There are also electronic license plates. Legal requirements In Europe, most governments require a registration plate to be attached to b ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

RFID
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory number, back to the reader. This number can be used to track inventory goods. Passive tags are powered by energy from the RFID reader's interrogating radio waves. Active tags are powered by a battery and thus can be read at a greater range from the RFID reader, up to hundreds of meters. Unlike a barcode, the tag does not need to be within the line of sight of the reader, so it may be embedded in the tracked object. RFID is one method of automatic identification and data capture (AIDC). RFID tags are used in many industries. For example, an RFID tag attached to an automobile during production can be used to track ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Radio-frequency Identification
Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electromagnetic interrogation pulse from a nearby RFID reader device, the tag transmits digital data, usually an identifying inventory number, back to the reader. This number can be used to track inventory goods. Passive tags are powered by energy from the RFID reader's interrogating radio waves. Active tags are powered by a battery and thus can be read at a greater range from the RFID reader, up to hundreds of meters. Unlike a barcode, the tag does not need to be within the line of sight of the reader, so it may be embedded in the tracked object. RFID is one method of automatic identification and data capture (AIDC). RFID tags are used in many industries. For example, an RFID tag attached to an automobile during production can be used to track ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Locks-and-keys
Locks-and-keys is a solution to dangling pointers in computer programming languages. The locks-and-keys approach represents pointers as ordered pairs (key, address) where the key is an integer value. Heap-dynamic variables are represented as the storage for the variable plus a cell for an integer lock value. When a variable is allocated, a ''lock value'' is created and placed both into the variable's cell and into the pointer's key cell. Every access to the pointer compares these two values, and access is allowed only if the values match. When a variable is deallocated, the key of its pointer is modified to hold a value different from the variable's cell. From then on, any attempt to dereference the pointer can be flagged as an error. Since copying a pointer also copies its cell value, changing the key of the ordered pair safely disables all copies of the pointer. See also * Tombstone (programming) Tombstones are a mechanism to detect dangling pointers and mitigate the problems th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Electronic Article Surveillance
Electronic article surveillance is a technological method for preventing shoplifting from retail stores, pilferage of books from libraries or removal of properties from office buildings. Special tags are fixed to merchandise; these tags are removed or deactivated by the clerks when the item is properly bought or checked out. At the exits of the store, a detection system sounds an alarm or otherwise alerts the staff when it senses active tags. Some stores also have detection systems at the entrance to the restrooms that sound an alarm if someone tries to take unpaid merchandise with them into the restroom. For high-value goods that are to be manipulated by the patrons, wired alarm clips called spider wrap may be used instead of tags. History Surveillance tags that could be attached to items in stores were first invented by Arthur Minasy in 1966. Initially the concept of pilferage becoming a real concern to retailers started in 1964 when a requirement was raised by a retailer in Ohi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]