se

Tire having a circumferential groove including a first groove portion and a second groove portion

A tire 1 comprises rib-shaped land portions 20 extending in a tire circumferential direction TC and has a circumferential groove 30 adjacent to the land portions 20 and extending in the tire circumferential direction TC. Tread contact surfaces 10 of the land portions 20 form smooth surfaces with no gap when a normal load is applied and the tread contact surfaces are in contact with a road surface. The circumferential groove 30 includes a shallow groove portion 40 extending in the tread-width direction TW, and a deep groove portion 50 adjacent to the shallow groove portion 40 in the tire circumferential direction and extending in the tread-width direction. A deep groove portion 50 is recessed more inwardly in a tire radial direction TR than the shallow groove portion 40 with a groove bottom 40c of the shallow groove portion 40 being an upper end of the deep groove portion 50.




se

Tire comprising carcass reinforcement wires having different perviousnesses

A tire with a radial carcass reinforcement made up of at least one layer of metal reinforcing elements, the tire comprising a crown reinforcement itself capped radially with a tread, the tread being connected to two beads via two sidewalls. At least 70% of the metal reinforcing elements of at least one layer of the carcass reinforcement are non wrapped cables which, in what is known as the air-wicking test, display a flow rate of less than 2 cm3/min, and at least 10% of the metal reinforcing elements of the at least one layer of the carcass reinforcement are cables which, in what is known as the air-wicking test, display a flow rate of greater than 4 cm3/min.




se

UPDATING EXTENSION IN RESPONSE TO OPENING ASSOCIATED DOCUMENT

A non-transitory computer-readable storage medium may comprise instructions stored thereon. When executed by at least one processor, the instructions may be configured to cause a backend server to at least receive, from an administrator webserver, an extension, store the extension and an associated timestamp in a repository, the associated timestamp indicating a time at which the extension was received from the administrator webserver, receive a request for the extension from a customer webserver, the request for the extension identifying the extension, and in response to receiving the request for the extension, fetch the extension from the repository, and send the extension to the customer webserver.




se

MAINTAINING DEPLOYMENT PIPELINES FOR A PRODUCTION COMPUTING SERVICE USING LIVE PIPELINE TEMPLATES

Techniques are presented for managing a deployment pipeline using an inheritable and extensible source code template—generally referred to as a live pipeline template (LPT). As described, live pipeline templates may be used to manage deployment pipelines which, in turn, are used to launch, maintain, and update the services and systems used to host and provide computing services.




se

SYSTEMS AND METHODS FOR EXPORTING, PUBLISHING, BROWSING AND INSTALLING ON-DEMAND APPLICATIONS IN A MULTI-TENANT DATABASE ENVIRONMENT

In accordance with embodiments, there are provided mechanisms and methods for creating, exporting, viewing and testing, and importing custom applications in a multitenant database environment. These mechanisms and methods can enable embodiments to provide a vehicle for sharing applications across organizational boundaries. The ability to share applications across organizational boundaries can enable tenants in a multi-tenant database system, for example, to easily and efficiently import and export, and thus share, applications with other tenants in the multi-tenant environment.




se

DYNAMIC SETUP OF DEVELOPMENT ENVIRONMENTS

A computer-implemented method includes receiving a request from a user at a local machine to access a project. One or more programming languages used in the project are identified. Resource availability at the local machine is analyzed. An integrated development environment (IDE) is selected for the project, based at least in part on the one or more programming languages and the resource availability of the local machine. The IDE is provisioned automatically, by a computer processor, for the user in response to the request to access the project.




se

IDENTIFYING USER MANAGED SOFTWARE MODULES

A method for identifying user managed software modules includes: receiving a query that includes an input module name or an input address range. The method further includes, responsive to determining that the input module name or input address range of the received query is not stored in one or more data structures identifying one or more software modules that have been loaded into memory without a directed load, searching a data structure identifying software modules that have been loaded into memory via directed loads for the respective input module name or input address range.




se

METHOD AND APPARATUS FOR EXECUTION OF DISTRIBUTED WORKFLOW PROCESSES

The system provides a method and apparatus for the dynamic distribution, deployment, and configuration of optimizable code modules for use with software workflows running on a single compute device or across a network connected grid of compute devices. The system comprises one or more collections of software and data modules stored in a content catalog, conforming to a defined interface, and having metadata conforming to a schema that enables the modules to be statically or dynamically optimized by the controlling workflow and a workflow manager. The system provides a service that enables code modules to be located, deployed, configured, and updated by the controlling workflow, the workflow manager, or a remote manager.




se

MANAGING CHANGE-SET DELIVERY

An approach that analyzes and manages unresolved (i.e., pending, outgoing) change-sets is provided. Specifically, this approach parses the change-set into a plurality (i.e., one or more) of changes having interdependencies within a java class file to determine the impact each change may have. More specifically, a change-set management tool provides this capability. The change-set management tool includes a parsing module configured to receive an outgoing change-set and to parse the change-set into a plurality of changes having interdependencies within a java class file. The change-set management tool further comprises an evaluation module configured to evaluate an impact that each of the plurality of changes within the change-set has on source code external to the change-set in the java class file based on the interdependencies.




se

IDENTIFYING USER MANAGED SOFTWARE MODULES

A computer system for identifying user managed software modules includes program instructions for: receiving a request for a directed load of a software module into memory, wherein the request includes an address; storing the software module at the address in the received request; adding a name and an address range of the stored software module to a data structure identifying software modules that have been loaded into memory via directed loads; receiving a query that includes an input module name or an input address range; and responsive to determining that the input module name or input address range of the received query is not stored in one or more data structures identifying one or more software modules that have been loaded into memory without directed loads, searching the data structure identifying software modules that have been loaded into memory via directed loads for the respective query.




se

AUTOMATIC GENERATION OF VALIDATORS TO VALIDATE DEPLOYMENT CODE USED FOR CONFIGURING SERVERS

A validation system is configured to automatically generate validators for one or more target systems. The validation system includes: a memory storing a computer process, a network interface configured to interface with the one or more target systems over a computer network, and a processor executing the computer process. The computer process is configured to parse the deployment code to identify components in deployment code, generate validator code for each identified component, and use the network interface to transmit the validator codes to the one or more target systems.




se

ANALYZING DEPLOYMENT PIPELINES USED TO UPDATE PRODUCTION COMPUTING SERVICES USING A LIVE PIPELINE TEMPLATE PROCESS

Techniques are presented for managing a deployment pipeline using an inheritable and extensible source code template—generally referred to as a live pipeline template (LPT). As described, live pipeline templates may be used to manage deployment pipelines which, in turn, are used to launch, maintain, and update the services and systems used to host and provide computing services.




se

Adaptive Function-Based Dynamic Application Extension Framework

A mobile device includes a processor and a non-transitory computer-readable medium storing instructions. The instructions include, in response to a state of a first application being instantiated from a first state template of the first application, selecting a first function module identifier from a plurality of predetermined function module identifiers. Each predetermined function module identifier corresponds to a first function offered by the first state template. The instructions include transmitting a function module request to a developer exchange system using a wireless transceiver. The function module request includes the first function module identifier, which uniquely identifies a first function module. The instructions include receiving the first function module from the developer exchange system, storing and executing the first function module, and presenting display data generated by execution of the first function module. The display data is presented in an area reserved for the first function by the first state template.




se

DYNAMIC RECONNECT OF WORK PROCESSES IN A ZERO DOWNTIME MAINTENANCE PROCEDURE

The disclosure generally describes methods, software, and systems, including a method for updating an application. At least one application instance of an application is managed. Each application instance is associated with a plurality of executing work processes connected with a first database schema. A bridge database schema is generated that is related to the first database schema. The bridge database schema represents a copy of the first database schema and is generated in response to initiation of an update to the application. In response to determining that the generation of the bridge database schema is complete, for each of the plurality of work processes, a commit work action performed by the particular work process is determined. In response to determining performance of the commit work action, the particular work process is connected to the bridge database schema.




se

Data valuation based on development and deployment velocity

One or more metrics indicative of velocity attributes associated with development and deployment of an application program are obtained. The one or more velocity metrics are stored in an application run-time environment in association with the application program and one or more data sets output by the application program. A valuation is computed for the one or more data sets based on the one or more velocity metrics.




se

Data flow programming of computing apparatus with vector estimation-based graph partitioning

In various embodiments, a spectral graph partitioner (“SP”) of a graph partitioning system (“GPS”) may partition a data flow graph associated with a program into a plurality of subgraphs to be used to perform analysis or debugging. The SP may generate estimated eigenvectors for a matrix representing the graph through minimization of a function on the vectors. The SP may generate multiple eigenvectors to perform the clustering in a multi-dimensional space described by the eigenvectors. The SP may refine the clustering by repeating generation of eigenvectors to describe higher-dimensional spaces and perform further clustering. The SP may also determine quality metrics for the clusters and may stop refinement based on the quality metrics. The GPS may select between utilizing the SP or utilizing one or more other partitioners based on various factors such as, for example, graph size or quality metrics. Other embodiments may be described and/or claimed.




se

USER TERMINAL DEVICE, AND MODE CONVERSION METHOD AND SOUND SYSTEM FOR CONTROLLING VOLUME OF SPEAKER THEREOF

A user terminal apparatus is disclosed. The user terminal apparatus includes a touch screen which senses a multi gesture that is performed by using at least two fingers or other input tools, and a controller which provides an individual volume control mode by which a volume of one speaker apparatus is independently controllable with respect to a volume of the remainder of a plurality of speaker apparatuses, and which is convertible into a group volume control mode in order to combine a plurality of speaker apparatuses into a group such that volumes of the plurality of speaker apparatuses can be jointly controlled in response to the multi gesture sensed via the touch screen while the individual volume control mode is provided.




se

USER INTERFACES IN A COMPUTER SYSTEM

The disclosure relates to generation of at least one second instance of a user interface presented by a first device. The first device stores data objects comprising event information associated with user interfaces presented by the first device based on data from a source of data. The first device can generate a user interface based on data from the source of data and at least one of the stored data objects. The at least one data object is communicated from the first device for use by at least one second device in generation of a second instance of the generated user interface by the at least one second device.




se

METHOD AND SYSTEM FOR GENERATING AND CONTROLLING COMPOSITE USER INTERFACE CONTROL

Embodiments of the present disclosure relate to the field of multimedia technologies and disclose methods for generating and controlling a composite user interface control and an electronic device. The method for generating a composite user interface control includes the following steps: creating at least one composite control, where the composite control includes at least two subcontrols; adding each subcontrol to the composite control; respectively setting a general attribute and a unique attribute of each subcontrol; acquiring a resource of each subcontrol and transmitting the resource to a corresponding subcontrol; and adding an event response mechanism to the composite control. In some embodiments of the present disclosure, the method for generating a composite user interface control may enable a manner for generating a user interface control to be relatively simple, which facilitates control over and modification on all user interface controls or a single user interface control on a user interface.




se

TECHNIQUES FOR PROVIDING PERSONALIZED BEHAVIOR-BASED CONTENT

Techniques for providing personalized content in substantially real time are disclosed. In one embodiment, a method for providing personalized content in substantially real time includes providing first content including a plurality of user-selectable content elements, detecting an interaction of a user with respect to the provided content including a selection by the user of one of the plurality of the user-selectable content elements displayed on a page of the first content, and providing second content in response to a request. The second content includes at least a portion of the first content modified according to the detected interaction by moving the user-selectable content element up on a page of the second content relative to a position of the content element on the page of the first content.




se

Mnemonic Support of Users in Guided Activity Floorplans

Methods and systems that facilitate the generation, presentation, and adaptation of an anchored information bar, associated with a guided activity floorplan or wizard, in support of assisting users as they complete the different steps of a complex task as the user employs software applications (and associated user interfaces) on their devices to go about their different activities.




se

REUSE SUPPORT SYSTEM AND METHOD

A reuse support system of an embodiment includes a display controller which displays, on a display, an image including an image of a boundary sample which serves as a reference for reuse of a facility in response to operation of a worker, an acceptor which accepts selection of a reuse mode of the facility, and a manager which manages a delivery destination of the facility based at least in part on the reuse mode of the facility selected by the acceptor.




se

REUSE SUPPORT SYSTEM AND METHOD

A reuse support system is provided. The system includes an acquisitor which acquires skill data of workers, a grantor which grants a work license to the workers based on the acquired skill data of the workers and stores the granted work license for each of the workers in a storage, and a provider which reads the work license from the storage in response to authentication operation of the workers and provides an image according to the read work license.




se

USER INTERFACE CONTROL LAYOUT METHOD AND ELECTRONIC DEVICE

Embodiments of this disclosure relate to the field of multimedia technologies, and disclose a user interface control layout method and an electronic devices. The user interface control layout method includes the following steps: creating a relative layout container, where the relative layout container is used to contain child controls, and the child controls are a relative layout container or a normal control; specifying an attribute of a child control for the relative layout container; generating the child control; and if the child control is a relative layout container, repeating the foregoing steps, until all the child controls in the relative layout container are normal controls. In some embodiments of this disclosure, multiple UI controls of different sizes or types may be generated one by one through layout and arrangement, and the UI controls of different sizes or types may be nested with each other, and thereby UI interfaces based on different rules can be quickly implemented to meet different requirements of various products for UI control arrangement.




se

MEMORY CONSERVING VERSIONING OF AN ELECTRONIC DOCUMENT

Memory conserving versioning of an electronic document is provided. Client versioning factors are analyzed by a client versioning engine and server versioning factors are analyzed by a server versioning engine for determining when an electronic document should be stored as a new version. Accordingly, new versions of an electronic document are only created when determined to be sufficiently important, thus reducing the amount of memory required for increased version payload.




se

WEB-BASED TOOL FOR COLLABORATIVE, SOCIAL LEARNING

A computerized-social network provides a community of users with features and tools facilitating an immersive, collaborative environment where users can learn a language or help others learn a language. One user (user A) can view another user's (user B) Web page or document and make suggestions or comments for selected content on that Web page. These suggestions are linked specifically to the selected content. User B can review the suggestions, and accept or reject the suggestions by user A and others.




se

TRIGGER-BASED CONTENT PRESENTATION

An apparatus, method, and computer program product are disclosed for trigger-based content presentation. A trigger module detects a triggering event. A response module determines a content element to present to a user in response to the triggering event. The content element may include a multimedia element and one or more interactive content elements that are synchronized with the multimedia element such that the one or more interactive content elements are presented at predetermined points during presentation of the multimedia element. A presentation module presents the determined content element on a device of the user.




se

UNIVERSAL ADAPTOR FOR RAPID DEVELOPMENT OF WEB-BASED DATA VISUALIZATIONS

A method of web-based data visualization includes: a Frontend sending a request over a computer network to a server configured as a Backend; a web server of the second server fetching data responsive to the request; the web server sending a response to the Frontend in a format compatible with a plurality software adaptors located on the Frontend, the response including information about objects to be presented on a web component; logic of the Frontend passing the response to a selected one of the software adaptors; and the selected software adaptor rendering the using a web visualization library associated with selected software adaptor.




se

AUTO GROUPING BROWSER TABS

A computer implemented method and system for managing browser tabs includes identifying a plurality of URLs (Uniform Resource Locator(s)) in response to detecting the URLs in a web browser running on a computer. The plurality of URLs are organized based on each of the URLs, and each of the plurality of URLs correspond to a tab opened by the web browser. The tabs of the web browser are grouped based on the URLs.




se

GENERATING LABELS FOR IMAGES ASSOCIATED WITH A USER

A method includes identifying an image associated with a user, where the image is identified as at least one of captured by a user device associated with the user, stored on the user device associated with the user, and stored in cloud storage associated with the user. The method also includes determining one or more labels for the image, where the one or more labels are based on at least one of metadata, a primary annotation, and a secondary annotation and the secondary annotation is generated by performing label expansion on at least one of the metadata and the primary annotation. The method also includes generating a mapping of the one or more labels to one or more confidence scores, wherein the one or more confidence scores indicate an extent to which the one or more labels apply to the image.




se

RECOMMENDING PAGES OF CONTENT TO AN ONLINE SYSTEM USER BY IDENTIFYING CONTENT FROM RECOMMENDED PAGES TO THE USER

An online system, such as a social networking system, recommends pages of content to users. The recommendation is presented in a recommendation unit presenting one or more representations of pages to a user. Additionally, the user may interact with the recommendation unit to change representations of pages presented by the recommendation unit. A representation of a page presented by the recommendation unit includes content from one or more content items on the page selected based on interaction with the content items on the page and types of content included in content items on the page (e.g., image data, video data, destination address). Representations of different pages may differ based on the types of content included in content items selected from the different pages.




se

AUTO GROUPING BROWSER TABS

A computer implemented method and system for managing browser tabs includes identifying a plurality of URLs (Uniform Resource Locator(s)) in response to detecting the URLs in a web browser running on a computer. The plurality of URLs are organized based on each of the URLs, and each of the plurality of URLs correspond to a tab opened by the web browser. The tabs of the web browser are grouped based on the URLs.




se

SYSTEMS AND METHODS FOR PROCESSING REAL-TIME AND HISTORICAL DATA AND GENERATING PREDICTIVE GRAPHICAL USER INTERFACES

Computer implemented systems and methods are provided for generating a predictive graphical user interface. In some embodiments, a system for generating a predictive graphical user interface may comprise at least one processor configured to receive real-time and historical data associated with utilization of a facility. The at least one processor may be configured to generate, based on the real-time and historical data, instructions to display a user interface depicting a first representation of utilization of the facility at a first time. The at least one processor may be configured to receive a request to display a second representation of utilization of the facility, the request including a selection of a second time, and generate, based on the real-time and historical data, instructions to display, within the interface, a second representation of utilization of the facility, the second representation reflecting utilization at the second time, wherein the second time is a future time relative to the first time.




se

REPRESENTATION OF OVERLAPPING VISUAL ENTITIES

Various embodiments present a combined visual entity that represents overlapping visual entities. The combined visual entity can include a primary visualization that represents one of the overlapping visual entities and annotations that represent others of the overlapping visual entities. For example, a map view can include multiple geographical entities that overlap. A primary visualization can be rendered that represents one of the multiple geographical entities. The primary visualization can be visually annotated (e.g., with symbols, letters, or other visual indicators) to indicate others of the multiple geographical entities. In some embodiments, a zoom operation can cause visual entities to be added and/or removed from the combined visual entity.




se

SIMULTANEOUS INPUT SYSTEM FOR WEB BROWSERS AND OTHER APPLICATIONS

In a computing environment having a multiple input detection system including a detector that detects and transmits multiple simultaneous user inputs from different users at a same time, a method for processing inputs from different users across multiple application windows of one or more applications displayed on a single display of a user interface, resulting in a multi-user graphical user interface (GUI), the computing environment running an operating system (OS) designed to run with a single user GUI, the method including determining, in a primary application, separate from the OS, that a first user input corresponds to a first window and a second user input corresponds to a second window, the primary application sending the first and second user inputs to first and second secondary applications that run in parallel with the primary application, the first and second secondary applications being designed to run with the OS.




se

Methods and Systems for Managing Multiple Communication Sessions from a Single On-Screen User Interface

An exemplary communication session management system concurrently presents a plurality of session icons within a single on-screen user interface, each session icon representative of a respective communication session and configured to visually indicate a session status of the respective communication session. The communication session management system further detects a user action performed by a user with respect to one of the plurality of session icons, modifies a communication session in response to the user action, and graphically indicates the modification of the session status of the communication session. Corresponding systems and methods are also described.




se

SOUND OBJECT CONTROL APPARATUS AND METHOD BASED ON ADDITIONAL IMAGE OBJECT

Disclosed is an apparatus and method for controlling a sound object based on an additional image object. A sound object controlling method includes displaying image objects synchronized with a plurality of sound objects, respectively, on a display; and controlling a sound object synchronized with an image object selected by a user from among the image objects displayed on the display. The sound object includes metadata that includes playback location information of the sound object on a specific space, sound level information of the sound object, and display location information of the image object synchronized with the sound object on the display.




se

Latch assembly

A latch assembly is described. The latch assembly includes a casing. The latch assembly provides for the transfer of rotational force to translation plates. The rotational force drives translation plates and extends the translation plates from the latch assembly. A first translation plate is mechanically engaged to the casing. A second translation plate is mechanically engaged to the casing. The latch assembly includes a key assembly including a rotatable cam. A toggle cam is pivotally engaged to the casing via a pivot axle, and rotating the cam contacts the toggle cam to extend or retract both the first translation plate and the second translation plate from the casing.




se

Magnetically repelling lock assembly

A lock assembly (10) including a plug (12) having a keyway (14) for inserting therein a key (16), and a movable element (18) movingly disposed in the plug (12), the movable element (18) being divided into at least two separate magnetic portions (20, 22) arranged to move relative to one another and having identical magnetic polarity, wherein the magnetic portions (20, 22) are sufficiently near one another such that one of the magnetic portions (20, 22) applies a magnetic repelling force on the other magnetic portion (20, 22).




se

Lever type handle and lock assembly for the same

A lock assembly for a lever type handle is disclosed. In the lock assembly for the lever type handle according to an aspect to the invention, the lever type handle is for opening and closing a door by a rotation of a handle portion. The lock assembly includes a key module rotated by a key member, wherein the key module being positioned in the handle portion, a rotary shaft rotated by a rotation of the key module and locking or unlocking the door through a dead lock member, and a rotation transmitter for transmitting the rotation of the key module to the rotary shaft.




se

System for securing equipment

The system for securing equipment includes a locking device attached to equipment to be secured, a plurality of fasteners, and an anchoring device. The locking device can be a U-bolt with threaded ends to attach to a backflow valve of a sprinkler system or locking bolts attached to a park bench or barbecue grill. Each fastener has a first surface with a first threaded hole in alignment with the locking device and a second surface orthogonal to the first surface with a second threaded hole aligned with anchoring device. The anchoring device can be a flat bar fixedly attached to the fasteners at one connector end and permanently mounted in place at an anchoring end. Each fastener has an L-shape, so that a first surface engages the locking device and opposing second surfaces engage the anchoring device. A concrete plug for outdoor use holds the anchoring end in place for permanency.




se

Adjustable latch assembly

A method of setting a gap or margin between an edge of a decklid and a vehicle surface includes providing a powered cinching latch assembly including a powered actuator that moves a striker member between a presented position and a fully cinched position. The cinched position of the striker is adjusted to provide an acceptable gap or margin between an edge of the decklid and an adjacent vehicle surface.




se

Removable key cassette assembly

A lock assembly is provided that includes: a lock cylinder having a bore disposed therein and at least one pocket located adjacent the periphery of the bore; a plug including a cassette slot; a plunger that fits in the plug; a locking tab having a slot disposed therein; the slot of the locking tab receives a portion of the plunger; a cassette having a key slot configured to receive a key; the cassette includes a tool slot configured to receive a tool to selectively engage the plunger to selectively move at least a portion of the locking tab into and out of the pocket; when a portion of the locking tab is located in the pocket the locking tab does not block the cassette from being removed from the plug.




se

Locking insert mechanism and receiver to secure personal weapons, valuables and other items

A personal security apparatus to house weapons, valuables, and/or items requiring concealment includes a lockable insert mechanism to securely house items and at least one receiving apparatus adapted to mount the insert mechanism into or onto various structures and a lockable access door that provides convenient, rapid access to the items contained in the personal security apparatus and further prevents access by unauthorized persons.




se

Security device

A security device for securing an item, the security device comprising a housing configured to house a circuit board comprising electronics configured to send a telecommunication signal to a receiver when the electronics is activated; a cable configured to establish a conductive path with the circuit board when the housing is closed, thereby activating the electronics; a lock assembly configured to be activated when the housing is closed; and a cover configured to close the housing, the cover having a first pin configured to engage a first end of the cable to prevent removal of a first end of the cable from the housing when housing is closed, and the cover having a second pin configured to activate the lock assembly to prevent removal of a second end of the cable from the housing when the housing is closed.




se

Multiple user lockbox

A lockbox includes a body and a lid connected to body and pivotable between a closed position and an open position. The body defines an enclosure and includes a body aperture and the lid includes a first lid aperture positioned adjacent to the body aperture when the lid is in the closed position, such that insertion of a padlock shackle through the body aperture and the lid aperture prevents pivoting movement of the lid from the closed position to the open position. The lockbox includes a slot intersecting one of the body aperture and the lid aperture for insertion of an item into the enclosure when the lid is in the closed position. A padlock shackle inserted through the body aperture and the lid aperture prevents passage of an item through the slot.




se

Method for maintaining a door in a closed position on an over-the-road vehicle

A method of preventing a first door on an over-the-road vehicle from moving from a closed position into an open position. The first door has a first latch assembly that cooperates with a second latch assembly to releasably maintain the first door in its closed position. One of the first and second latch assemblies is maintained in place by at least one fastener extended into a first opening. With the at least one fastener loosened, the first locking assembly is placed on one of: a) one of the doors; or b) the vehicle frame after which a fastener is tightened into the first opening to thereby: i) maintain one of the first and second latch assemblies in place and secure the operatively placed first locking assembly. With the first door in the closed position, a locking device can be connected to the first locking assembly and another part on the vehicle to thereby maintain the first door in the closed position.




se

Vessel locking system

A vessel locking system which provides a locking cap which secures in locked engagement with a vessel releasable by mated engagement of a cap key with the locking cap.




se

Hasp seal lock assembly

A hasp seal lock assembly includes a base member that is attached via a hinge to a cover member. The cover member, when rotated such that the cover member engages the base member, is functionally adapted to overlay a latch and seal. The base member and the cover member each have a plurality of apertures defined in adjacent side walls that allow the horizontal latch arm to extend through the assembly. The base member and the cover member also include a second plurality of cooperating apertures whereby the base member and the cover member may be locked together by use of a padlock. In a first preferred embodiment, each cover side wall includes a tab and tab-receiving apertures are defined within the base member. The tabs require that the cover be lifted vertically prior to rotation of the cover member about the base member.




se

Capacitive data transfer in an electronic lock and key assembly

An electronic key may include a partial capacitor comprising a capacitive metal plate in communication with a processor. The capacitive metal plate of the partial capacitor is configured to form a capacitor with a corresponding capacitive metal plate of a lock when brought into proximity with the metal plate of the lock. Data may be transferred from the key to the lock using a capacitor formed by combining the two metal plates, wherein a common ground is established between the metal plate of the key and the metal plate of the lock through a parasitic capacitance present between the key and lock circuitry.