Browse Definitions :
Definition

smart lock

Contributor(s): Matthew Haughn

A smart lock is an electronic and mechanical locking device that opens wirelessly with an authorized users’ authentication.

In a smart home, smart locks allow a homeowner to enter their home or provide others access without requiring a traditional key. Instead, the user uses their smartphone or a key fob to wirelessly verify and mechanically unlock the door. Smart locks are an extension of home automation into home security.  As a connected device, smart locks can be considered a part of the internet of things (IoT).

Many smart lock systems use mobile apps or websites to allow homeowners to grant access to third parties by sending a virtual key. Virtual keys can be sent by SMS text message or email, enabling access to guests or service personnel. Once received, these encrypted digital keys allow access to the smart lock for a preset period of time. On top of regulating access, many smart locks log access, providing the means to monitor use of a given secured door. Some smart locks feature a camera, which provides a picture of those accessing the door and makes for an easily referenced photo log.

Potential vulnerabilities in smart locks do create security concerns. Security advisors recommend that smart locks should not necessarily be thought of as more secure than a conventional lock and key and recommend that users think carefully about settings and options.

This was last updated in November 2017

Continue Reading About smart lock

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchSecurity

SearchHealthIT

  • Health IT (health information technology)

    Health IT (health information technology) is the area of IT involving the design, development, creation, use and maintenance of ...

  • fee-for-service (FFS)

    Fee-for-service (FFS) is a payment model in which doctors, hospitals, and medical practices charge separately for each service ...

  • biomedical informatics

    Biomedical informatics is the branch of health informatics that uses data to help clinicians, researchers and scientists improve ...

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a data center.

  • ransomware recovery

    Ransomware recovery is the process of resuming options following a cyberattack that demands payment in exchange for unlocking ...

  • natural disaster recovery

    Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.

SearchStorage

  • RAID 5

    RAID 5 is a redundant array of independent disks configuration that uses disk striping with parity.

  • non-volatile storage (NVS)

    Non-volatile storage (NVS) is a broad collection of technologies and devices that do not require a continuous power supply to ...

  • petabyte

    A petabyte is a measure of memory or data storage capacity that is equal to 2 to the 50th power of bytes.

Close