Reflective safety sensor – OMRON E3JK

$224.85

Ship or pick up from our office.

Reflective safety sensor – OMRON E3JK

*NO/NC *AC/DC 24-240 V *Receiving Range: 40 Meters *IP 64

Relay 5-Pin 40A

$23.85

Ship or pick up from our office.

Relay 5-Pin 40A

A 5-pin 40A relay is an electromechanical switch commonly used in automotive and other applications. It allows a low-power electrical signal to control a higher-power circuit. The "5-pin" refers to the number of terminals it has, and "40A" indicates that its contacts can safely handle a maximum current of 40 amps. How it Works A relay essentially functions like a remote-controlled switch. It has two main circuits:
  • Control Circuit (Coil): This low-power circuit energizes an electromagnet inside the relay.
  • Switched Circuit (Contacts): This high-power circuit is controlled by the electromagnet, either opening or closing connections to a device.
Here's a breakdown of the pins:
  • Pins 85 and 86: These are the coil terminals. When a small current (typically 12V DC in automotive applications) is applied across these pins, it creates a magnetic field.
  • Pin 30: This is the common terminal for the switched circuit. It's usually connected to the main power source (e.g., battery) through a fuse.
  • Pin 87: This is the Normally Open (NO) contact. When the relay coil is energized, pin 30 connects to pin 87, allowing current to flow to the connected device.
  • Pin 87a: This is the Normally Closed (NC) contact. When the relay coil is not energized, pin 30 is connected to pin 87a. When the coil is energized, this connection breaks.
The presence of both Normally Open and Normally Closed contacts makes a 5-pin relay a Single Pole Double Throw (SPDT) switch, meaning it can switch power between two different circuits. Why Use a Relay? Relays are crucial for several reasons:
  • High-Current Control: They allow you to control high-current devices (like headlights, fuel pumps, or cooling fans) with a low-current switch. This protects the sensitive, smaller switches from being damaged by excessive current.
  • Reduced Voltage Drop: By placing the relay closer to the high-current device and power source, you can use shorter runs of heavier gauge wire for the high-current circuit, minimizing voltage drop and ensuring the device receives adequate power.
  • Safety: They isolate high-current circuits from the passenger compartment, enhancing safety.
  Common Applications 5-pin 40A relays are widely used in:
  • Automotive: Headlights, fog lights, horns, fuel pumps, electric cooling fans, power windows, central locking, and various aftermarket accessories.
  • Industrial Control: Switching motors, solenoids, and other heavy-duty equipment.
  • General Purpose: Any application where a low-power signal needs to control a higher-power circuit.
Wiring Diagram Example A common wiring configuration for a 5-pin relay is:
  • Pin 85: Connect to ground (-).
  • Pin 86: Connect to the positive (+) side of your control switch. When this switch is activated, it provides power to the coil.
  • Pin 30: Connect directly to the positive (+) terminal of your battery, always through an appropriately sized fuse.
  • Pin 87: Connect to the positive (+) terminal of the device you want to power when the relay is activated (Normally Open connection).
  • Pin 87a: (Optional) Connect to a device you want to power when the relay is not activated (Normally Closed connection).
This setup ensures that a small current from your control switch safely triggers the relay, which then handles the larger current required by the connected device.

Relay Mini PCB 5-Pin 10A

$3.25

Ship or pick up from our office.

Relay Mini PCB 5-Pin 10A

A Relay Mini PCB 5-Pin 10A is a compact, electromechanical switch designed to be mounted directly onto a printed circuit board (PCB). It uses a small control voltage to switch a larger current, making it useful for isolating control circuits from power circuits or for switching higher-power loads with a low-power signal. Key Features and Specifications
  • Mini: This indicates its small physical size, making it suitable for applications where space is limited.
  • PCB: This means it's designed for Printed Circuit Board mounting. Its pins are typically configured to be soldered directly into holes on the PCB.
  • 5-Pin: These five pins usually consist of:
    • Two pins for the coil: These are where the control voltage is applied to energize the coil and activate the relay.
    • Three pins for the contacts: These typically include a common (COM) pin, a normally open (NO) pin, and a normally closed (NC) pin.
  • 10A: This is the maximum current rating that the relay's contacts can safely switch. It means the relay is capable of handling up to 10 amperes of current through its switched contacts.
How It Works A relay fundamentally operates on the principle of electromagnetism. When a small electrical current flows through the coil of the relay, it generates a magnetic field. This magnetic field attracts an armature, causing a set of electrical contacts to either close (making a connection) or open (breaking a connection).
  • Normally Open (NO): The contact is open when the coil is de-energized and closes when the coil is energized.
  • Normally Closed (NC): The contact is closed when the coil is de-energized and opens when the coil is energized.
  Common Applications These relays are widely used in various electronic circuits and systems, including:
  • Automotive applications: For controlling lights, motors, and other accessories.
  • Home automation: Switching lights, appliances, and HVAC systems.
  • Industrial control: In PLCs (Programmable Logic Controllers) and other control panels.
  • Appliance control: In washing machines, refrigerators, and microwave ovens.
  • DIY electronics projects: Where low-power signals need to control higher-power devices.

Relay Mini PCB 8-Pin 1A

$7.65

Ship or pick up from our office.

Relay Mini PCB 8-Pin 1A

A Relay Mini PCB 8-Pin 1A is a small, electronic switch designed to be mounted directly onto a Printed Circuit Board (PCB). It has eight pins for connections and its contacts can safely switch a maximum current of 1 Ampere (1A).   Key Characteristics
  • Miniature Size: The "Mini" in its name indicates its compact dimensions, making it suitable for circuits where space is limited.
  • PCB Mountable: It's designed for through-hole soldering onto a PCB, integrating seamlessly into electronic designs.
  • 8-Pin Configuration: These pins serve various purposes, including connecting the coil (which activates the relay) and the switch contacts (which control the electrical load).
  • 1A Current Rating: This is the maximum current that can safely flow through the relay's contacts when they are closed.
  • Coil Voltage: The relay's coil operates on a specific DC voltage (e.g., 3V, 5V, 12V, 24V). Applying this voltage to the coil creates a magnetic field that mechanically opens or closes the contacts.
  • Contact Configuration: Many 8-pin mini PCB relays are DPDT (Double Pole, Double Throw), meaning they have two sets of contacts, each with both normally open (NO) and normally closed (NC) positions. This allows for versatile switching operations.
  • Isolation: Relays provide electrical isolation between the control circuit (coil) and the load circuit (contacts), enhancing safety and preventing interference.
Applications Mini PCB relays like the 8-pin 1A version are widely used in various electronic devices and systems where a low-power signal needs to control a higher-power circuit. Some common applications include:
  • Remote Control Systems: Used to switch power to devices based on signals from a remote.
  • Communication Equipment: For routing or switching signals in telecommunications and data networks.
  • Automatic Control Systems: In automation processes to control motors, lights, or other actuators.
  • Household Appliances: Found in various home electronics to manage power to different components.
  • Automotive Systems: Employed in vehicles to control functions like lights, locks, and windows.
  • Instrumentation and Measurement Devices: For precise signal routing and control in sensitive equipment.

Remote Control Radio Receiver

$59.45

Ship or pick up from our office.

Remote Control Radio Receiver

  • NC/NO Output
  • Easy to program new remotes
  • The remote control button is covered to prevent accidental pressing.
  • This radio receiver can be added to almost all the gate operators such as Italian, Chinese, swing gate operators, sliding gate operators, and overhead garage doors.
  • Compatible with 100 remotes.
  • Small case and easy to install
  • The wireless RF signals can pass through walls, floors, doors, or windows. You can use two or more units in the same place.
A gate opener's remote control radio receiver is a device that receives radio signals from a handheld remote control, triggering the gate opener's motor to open or close the gate.
Here's a more detailed explanation:
  • Receives Signals:
    The receiver picks up radio waves transmitted by the remote control. 
  • Decodes Commands:
    It interprets the specific signal pattern to understand the desired action (e.g., open, close, stop). 
  • Controls Devices:
    The receiver then sends signals to the gate opener's motor, causing it to move the gate accordingly. 
  • Part of a System:
    It's a crucial component of the remote control system, working with the transmitter (remote) to enable wireless control of the gate. 
  • Frequency:
    Gate opener receivers typically operate on frequencies like 433 MHz or 315 MHz. 
  • Installation:
    The receiver is usually wired to the gate operator's control board and may require programming to associate it with specific remote controls. 

Remote starter immobilizer bypass module

$88.75

Ship or pick up from our office.

Remote starter immobilizer bypass module

A remote starter immobilizer bypass module is an essential component when installing an aftermarket remote car starter in most modern vehicles. Its sole purpose is to "trick" the vehicle's factory immobilizer system into believing that the correct key is present in the ignition, allowing the engine to start remotely. Here's a breakdown of what that means: What is a remote starter immobilizer bypass module system? Since around the late 1990s, and mandated for all new cars sold in Canada since the year 2000, virtually every vehicle is equipped with an electronic immobilizer system as an anti-theft measure. This system prevents the engine from starting unless it detects a specific, valid code.
  • How it works:
    • Your car key (or smart key fob) contains a small electronic chip called a transponder. This chip stores a unique electronic code.
    • When you insert the key into the ignition (or, with push-button start, have the fob within range), the vehicle's onboard computer (often via an antenna coil around the ignition barrel) reads the code from the transponder.
    • If the code matches what's stored in the vehicle's ECU (Engine Control Unit), the remote starter immobilizer bypass module is deactivated, and the engine is allowed to start and run.
    • If the code doesn't match, or if no valid code is detected (e.g., someone tries to hot-wire the car, or uses an unprogrammed key), the immobilizer will prevent the engine from starting, or it will start for a few seconds and then immediately shut off. It typically disables vital functions like the fuel pump or ignition system.

RFID Card Access Control

$7.15

Ship or pick up from our office.

RFID Card Access Control

RFID card access control is a system that uses Radio Frequency Identification (RFID) technology to manage and control access to physical spaces. It provides a secure and convenient way to grant or deny entry to authorized individuals, replacing traditional keys or swipe cards. This system works by wirelessly communicating between an RFID card (or tag) and an RFID reader.   How it Works
  1. RFID Card (Tag): Each authorized individual carries an RFID card, key fob, or even a smartphone with an embedded RFID chip. This chip contains a unique identification code and sometimes other encrypted data.
  2. RFID Reader: Readers are installed at entry points (doors, gates, elevators, etc.). They constantly emit a radio frequency field.
  3. Communication: When an RFID card enters the reader's field, the card's antenna captures energy from the reader's signal. This energizes the microchip on the card, allowing it to transmit its unique data back to the reader.
  4. Data Verification: The RFID reader decodes the information from the card and sends it to a central access control server or control panel. This server compares the card's data with a secure database of authorized users and their access permissions.
  5. Access Grant/Denial: If the credentials match an authorized profile, the system sends a signal to an electronic lock mechanism, allowing entry. If not, access is denied. This entire process typically happens in milliseconds.
  6. Audit Trail: The system also records detailed access information, including the time, date, and specific access point used, providing a valuable audit trail for security purposes.
  Key Components
  • RFID Cards/Tags: These are the credentials held by users, typically in the form of plastic cards, key fobs, or even integrated into mobile devices. They contain a microchip and an antenna.
  • RFID Readers (Interrogators): Devices installed at entry points that emit radio waves to communicate with the tags and read their data.
  • Access Control Panel/Server: This is the "brain" of the system. It receives data from the readers, verifies user credentials against a database, and controls the electronic locks. It can be cloud-based or local.
  • Electronic Locks: Devices that secure the entry points and are controlled by the access control system (e.g., magnetic locks, electric strikes).
  • Access Control Software: Software used to manage user profiles, set access levels, monitor events, and generate reports.
Types of RFID Tags
  • Passive RFID Tags: Most common for access control. They don't have an internal battery and are powered by the electromagnetic field emitted by the reader. They have a shorter read range (a few centimeters to a meter).
  • Active RFID Tags: These tags have their own power source (battery), allowing for a much longer read range (up to several hundred meters) and the ability to broadcast signals periodically. They are typically more expensive.
  • Semi-Passive RFID Tags: These tags have a battery to power the chip but only transmit data when activated by a reader's signal, offering improved sensitivity and performance over passive tags.
  Benefits of RFID Access Control
  • Convenience: Offers contactless and keyless entry, making it fast and easy for users to gain access. Cards can often be read from inside a wallet or bag.
  • Enhanced Security: Provides unique identification and can utilize encrypted communication, making tags difficult to duplicate. Lost cards can be immediately deactivated, preventing unauthorized use.
  • Efficiency: Streamlines entry and exit processes, reducing wait times, especially in high-traffic areas.
  • Flexibility & Scalability: Easily allows for adjusting access permissions for different users, areas, or time frames. Systems can be expanded or modified as needs change.
  • Integration: Can be integrated with other security systems like CCTV, alarms, and time attendance systems for comprehensive security management.
  • Audit Trails: Provides real-time tracking of who enters and exits, offering valuable data for security monitoring and incident investigation.
  • Durability: RFID components generally experience less wear and tear compared to traditional mechanical locks or swipe card systems.
Security Considerations While RFID access control offers many benefits, it's important to be aware of potential vulnerabilities:
  • Skimming: In theory, unauthorized readers could attempt to read card information if they get close enough, though modern RFID cards often use one-time codes and encryption to mitigate this risk.
  • Cloning: If the security protocols are weak, an RFID card's information could potentially be cloned.
  • Electromagnetic Interference: Other electronic devices or metal/liquid objects can sometimes interfere with RFID signals, impacting performance.
To address these concerns, many RFID systems incorporate advanced encryption, mutual authentication, and integrate with multi-factor authentication methods. RFID-blocking wallets or sleeves are also available, though their necessity for security against typical skimming attempts is debated due to the short read range and other built-in card protections.

RFID Tag Access Control

$3.95

Ship or pick up from our office.

RFID Tag Access Control

RFID Tag Access Control is a system that uses Radio Frequency Identification (RFID) technology to manage and control access to physical spaces or logical systems. It allows only authorized individuals or items to enter secure areas by wirelessly reading data stored on RFID tags. Think of it as a modern, electronic key system where your "key" is an RFID tag (like a card or key fob) and the "lock" is an RFID reader.   How it Works ⚙️ The fundamental principle is straightforward:
  1. RFID Tag/Credential: Each authorized individual or item is assigned an RFID tag. This tag contains a microchip that stores a unique identification code and an antenna.
  2. RFID Reader: A reader (also called an interrogator) is installed at the access point (e.g., a door, gate, or turnstile). The reader emits radio waves.
  3. Communication: When an RFID tag comes within range of the reader's radio waves, the tag's antenna captures energy from the reader's signal (for passive tags) or uses its own power source (for active tags) to activate its microchip. The tag then transmits its unique data back to the reader.
  4. Data Processing: The reader decodes the information from the tag and sends it to a central access control software or system.
  5. Authentication and Decision: The software compares the tag's unique ID with a database of authorized users and their assigned permissions. If the ID is valid and the user has permission to access that specific area at that time, the system sends a signal to unlock the door, open the gate, or grant access. If not, access is denied.
  6. Logging: The system typically logs every access attempt (both granted and denied), providing an audit trail for security monitoring and compliance.
Key Components 🧩 An RFID access control system typically consists of:
  • RFID Tag Access Controls/Credentials: These are the physical devices carried by users. They come in various forms, such as:
    • Cards: Similar to credit cards, commonly used for employee badges or hotel key cards.
    • Key Fobs: Small, convenient devices attached to keychains.
    • Wristbands: Often used in recreational facilities or for events.
    • Stickers/Labels: Can be affixed to items or vehicles.
    • Mobile Credentials: Increasingly, smartphones can act as RFID tags through NFC (Near Field Communication), a subset of HF RFID.
  • RFID Readers: Devices that emit radio waves to energize and read data from RFID tags. They can be fixed (at entry points) or mobile (handheld scanners).
  • Antennas: Integral to the reader (or external), they transmit and receive radio signals to and from the tags. The antenna design influences the read range and reliability.
  • Access Control Software/Management System: The "brain" of the system. This software manages user databases, assigns access permissions, logs events, and allows administrators to configure and monitor the system remotely.
  • Access Control Panel/Controller: Hardware that connects the readers to the central software, processing data and controlling the locking mechanisms.
Types of RFID Tags Used in Access Control 🏷️ RFID tags are categorized based on their power source and frequency: By Power Source:
  • Passive RFID Tags:
    • Do not have an internal power source.
    • They draw power from the radio waves emitted by the reader to operate.
    • Are generally smaller, less expensive, and require no maintenance.
    • Have a shorter read range (a few centimeters to a few feet).
    • Most commonly used in access control for cards and key fobs.
  • Active RFID Tags:
    • Have their own internal power source (battery).
    • Can transmit data over longer distances (up to several hundred meters) and at regular intervals.
    • Are larger and more expensive.
    • Often used for long-range applications like vehicle tracking or asset management.
  • Semi-Passive RFID Tags (Battery-Assisted Passive - BAP):
    • Contain a battery to power the microchip, but still rely on the reader's signal to initiate communication.
    • Offer better read range and performance than passive tags, without continuously transmitting like active tags.
  By Frequency:
  • Low Frequency (LF) RFID (125-134 kHz):
    • Short read range (1-10 cm).
    • Less susceptible to interference from metal and water.
    • Common in traditional access control systems.
  • High Frequency (HF) RFID (13.56 MHz):
    • Moderate read range (10 cm-1 meter).
    • Widely used for access control, ticketing, and Near Field Communication (NFC) applications (like smartphone taps).
  • Ultra-High Frequency (UHF) RFID (300 MHz-3 GHz, often 860-960 MHz for RAIN RFID):
    • Long read range (up to 12 meters).
    • More susceptible to interference from liquids and metals.
    • Used in applications requiring longer read distances, such as vehicle access control or large-scale inventory tracking.

Safety sensor – BFT FL130

$167.85

Ship or pick up from our office.

Safety sensor - BFT FL130

The BFT FL130 is a photoelectric safety sensor designed primarily for use with automated gates and doors. It's a crucial safety component that prevents the gate or door from closing if an obstacle, such as a person or vehicle, is detected in its path. Here's a breakdown of its key aspects: How it Works The BFT FL130 operates as a pair of photocells, consisting of a transmitter (TX) and a receiver (RX). These units are typically mounted on opposite sides of the gate or door opening. The transmitter emits an infrared beam towards the receiver. If anything breaks this beam (e.g., a person walking through, a car passing), the receiver detects the interruption and sends a signal to the gate's control unit. This signal then triggers a safety mechanism, causing the gate to stop its movement or reverse direction to avoid impact. Features and Specifications
  • Type: Photoelectric safety sensor (photocell).
  • Components: Transmitter and receiver pair.
  • Function: Detects obstacles in the path of automated gates and doors to prevent accidents.
  • Detection Method: Infrared beam.
  • Applications: Commonly used in residential and commercial settings for automated swing gates, sliding gates, and garage doors.
  • Max Range: Up to 30 meters (can be reduced by 50% in adverse weather conditions like fog or heavy rain).
  • Power Supply: Typically 20-31 VAC or 22-30 VDC.
  • Absorption: Approximately 70mA per pair.
  • Relay Contacts: 1A at 24 VAC-DC.
  • Working Temperature: Generally from -15°C to +70°C (some sources say -5°C to +70°C).
  • Protection Rating: IP54, meaning it's protected against dust ingress and splashing water.
  • Mounting: Should be aligned and mounted at a height between 40 and 60 cm from the ground on flat, parallel surfaces.
  • Dimensions: Compact, typically around 115mm x 32mm x 26mm.
  • Versions: There is also a BFT FL130B version, which may offer additional features like self-alignment and is designed to meet EN12453 regulations for Type D safety devices when connected to a compatible control unit that verifies safety device functionality.
Safety Compliance The BFT FL130, particularly the FL130B version, is designed to comply with recognized technical standards and safety regulations, such as EN12453. For the FL130 to be used as a Type D safety device under EN12453, it often requires connection to a control unit that includes a circuit to verify the correct functioning of the safety devices. Regular maintenance (at least every six months) is also recommended for systems using these sensors to ensure continued safe operation.

Safety Sensor – Key Automation 900FT33

$176.60

Ship or pick up from our office.

Safety Sensor - Key Automation 900FT33

  • NO/NC
  • AC 10-30 V / DC 10-40 V
  • Receiving Range: 25 Meters
  • IP 54
The photocell safety sensor of the FT series are devices applicable to the automation of doors and gates, which allow to detection of the presence of obstacles along the route between transmitter and receiver. Compatible with sliding and swing gate operators. Best with Key RAY, STAR swing gate operator, and SUN, TURBO sliding gate operator. Watch a video of our previous project on our YouTube channel. The Key Automation 900FT33 is a photoelectric safety sensor designed for use with automated gates and doors. It acts as a safety feature by detecting obstacles in the path of the gate or door and preventing it from closing on them. It's typically used in conjunction with sliding and swing gate operators. 

Safety sensor – Nice Era-EPM

$132.35

Ship or pick up from our office.

Safety sensor - Nice Era-EPM

The Nice Era-EPM is a photoelectric safety sensor commonly used in automation systems for gates, garage doors, barriers, and similar installations. It's also often referred to as a photocell or beam sensor. Here's a breakdown of what it is and its key features: Purpose: Its primary function is to enhance safety by detecting obstacles in the path of a moving gate or door. It consists of a transmitter (TX) and a receiver (RX) that are installed facing each other. The transmitter emits an infrared beam, and if this beam is interrupted by an object, the receiver signals the control unit to stop or reverse the automation system, preventing accidents, injuries, or damage to vehicles. Key Features and Specifications:
  • Photoelectric Technology: It uses an infrared beam to detect obstructions.
  • Transmitter (TX) and Receiver (RX): Comes as a pair, with one unit transmitting the beam and the other receiving it.
  • Relay Output: It's a relay photocell, meaning it sends a signal to the control unit via a relay output.
  • Range: Typically has a useful range of 15 meters, which can be extended up to 30 meters in some configurations (e.g., by cutting a "+10m" electrical bridge). However, range can be reduced in adverse weather conditions like fog, rain, or dust.
  • Anti-Glare Circuitry: Designed with an anti-glare circuit to minimize interference from sunlight, ensuring reliable performance in various lighting conditions.
  • Durable Construction: Features an ABS body that is resistant to weather conditions, making it suitable for outdoor use (IP44 protection rating).
  • Easy Installation: Known for its simplified assembly and installation procedure. Some versions (like those with Nice BlueBUS technology) require only two wires for connection to compatible control units, simplifying wiring.
  • Wide Angle of Reception: Generally has a 10° (or 8° with a reduction cone) angle of reception, which helps in compensating for minor alignment issues.
  • Compatibility: While it's a Nice-branded product, it's often described as a "universal photocell" compatible with most gate and garage door automation systems, especially those that accept standard relay inputs. Some models also feature Nice BlueBUS technology for seamless integration with Nice control units that support it.
  • Safety Compliance: It is a Type D presence detector according to EN 12453 standard, which means it detects obstacles on the optical axis. When connected to a control unit with a "phototest" function, it can achieve Category 2 safety against malfunctions according to EN 954-1.
Installation: The Nice Era-EPM sensors are typically surface-mounted on two solid, parallel walls, facing each other to create the safety beam. Proper alignment between the transmitter and receiver is crucial for optimal operation. In essence, the Nice Era-EPM is a robust and reliable safety device designed to make automated gate and door systems safer by actively detecting obstacles in their path of operation.