Door closer -DCL061

$63.00

Ship or pick up from our office.

Door closer -DCL061

The "Door closer -DCL061" appears to refer to a specific model of door closer, primarily offered by Royal Electronics Technology Center Co. Based on the information found, here's what we know about it:
  • Type: DCL061 is a mechanical door closer.
  • Capacity: Door closer -DCL061 has a capacity of 45 Kg, indicating it's suitable for doors up to that weight.
  • Dimensions: Door closer -DCL061 dimensions are 25 × 9 × 9 cm.
  • Purpose: Like all door closers, it's designed to automatically close a door in a controlled manner after it has been opened. This serves various purposes, including:
    • Security: Ensuring doors are not left open inadvertently.
    • Fire Safety: Crucial for fire doors to prevent the spread of fire and smoke.
    • Energy Efficiency: Helping to maintain indoor temperatures by ensuring doors close properly.
    • Accessibility and Safety: Preventing doors from slamming, reducing the risk of injury, and allowing controlled passage for individuals with limited mobility.

Exit push button ALKPB2015

$13.05

Ship or pick up from our office.

Exit push button ALKPB2015

The ALKPB2015 is a wired exit push button commonly used in access control systems for doors and gates. Here's a breakdown of what it is and how it functions:
  • Purpose: Its primary function is to trigger the release of an electric door lock or gate operator, allowing for a quick and controlled exit from a secured area. It's often referred to as a "request to exit" (REX) device.
  • Wired Connection: As the name suggests, it's physically connected to the building's electrical system and the door's locking mechanism.
  • Momentary Activation: When pressed, the button momentarily completes an electrical circuit, sending a signal to the lock release.
  • Door Release: This signal typically causes an electric strike or magnetic lock to disengage, allowing the door to be opened.
  • Automatic Relock: Once the button is released, the lock re-engages, securing the door again.
  • Common Applications:
    • Access Control Systems: Used in conjunction with card readers, keypads, or other entry systems to provide a convenient exit method.
    • ADA Compliance: Often designed with features like large, accessible buttons for ease of use by individuals with disabilities.
    • Emergency Egress: Crucial for fire safety and other emergencies, providing a reliable way to quickly exit a secured space.
    • Security: While providing an exit, it doesn't compromise overall security for entry, as a separate access control system is typically required for entry.
  • Features (typical for this type of button):
    • Wired connection
    • Momentary switch
    • NO/NC/COM contacts (Normally Open/Normally Closed/Common) for versatile wiring with different lock types.
    • Designed for indoor use (though some exit buttons may have weather-resistant options).
    • Often made with durable materials like stainless steel.
Essentially, the ALKPB2015 acts as a simple, reliable switch to facilitate exiting a secured area without needing credentials.

Wireless Keypad Access Control – ALEKO LM172

$98.55

Ship or pick up from our office.

Wireless Keypad Access Control – ALEKO LM172

-Rain Shield Cover included *Backlight *433 MHz The ALEKO LM172 is a wireless keypad access control system primarily designed for use with ALEKO brand swing and sliding gate openers. It provides a secure and convenient way to control access to a property by requiring users to enter a programmable 6-digit code.   Key Features & Specifications
  • Wireless Operation: It's completely wireless, eliminating the need for electrical connections to the gate opener. It operates on 3 AAA batteries.
  • Frequency: It uses a 433.92 MHz frequency for communication with compatible gate openers.
  • Security: Enhances security by restricting access to authorized individuals who know the programmable 6-digit code, reducing reliance on traditional remote controls.
  • Durability: Features a rugged metal construction designed to withstand various weather conditions. Some listings mention heavy-duty iron construction.
  • Visibility: Equipped with backlit keys for easy use in low-light conditions.
  • Compact Design: Has a relatively compact profile (approx. 3.5"L x 3.25"W x 1"D or 4" x 3" x 3").
  • Range: Offers a typical operating range of up to 32 feet (10 meters) from the gate opener's receiver. It's recommended to install it within 5 meters (16 feet) of the control box on the same side of the driveway to avoid interference.
  • Installation: Designed for easy installation, typically mounted with screws. It can be buried in the ground or fixed on the ground with a compatible mounting post.
Compatibility The LM172 is largely compatible with:
  • ALEKO Swing Gate Openers: AS/GG Series (e.g., AS450, AS600, AS650, AS900, AS1200, AS1300, AS1700 models).
  • ALEKO Sliding Gate Openers: AR/AC Series (e.g., AR900, AR1300, AR1800, AR2200, AR2700, AR5700, AC1300, AC1800, AC2200, AC2700, AC5700 models).
  • LockMaster Gate Openers: LM901 and LM902 Swing Gate Openers.
  • DSC DSR SCG/SFG (H model only) Sliding Gate Openers: Purchased after July 2011.
It's crucial to verify compatibility with your specific gate opener model, especially if you have older or non-ALEKO models.   Programming Programming the LM172 generally involves a "Learn Mode" feature on the gate opener's control board. The process typically includes:
  1. Powering on the control board and ensuring it's in standby mode.
  2. Pressing a "LEARN" button on the control board.
  3. Pressing the "OK" button on the LM172 keypad to link it with the gate opener.
  4. Once successfully learned, the control board's LED will indicate confirmation.
To operate the gate, you usually press a "PIN" button on the keypad, enter the 6-digit entry code (the factory default is often "888888"), and then press "OK". The code can be changed by following specific steps outlined in the user manual. Each button press during programming must typically be completed within 1 second.

Exit push button SQTPB601

$28.50

Ship or pick up from our office.

Exit push button SQTPB601

*No Touch *Backlight *DC 12V *COM-NC-NO The Exit push button SQTPB601 is a wired exit push button used in access control systems. It's a device that allows individuals to exit a secured area by signaling the access control system to unlock a door or activate an exit mechanism. Here's a breakdown of what that means: Key Characteristics 🔑
  • Wired: Unlike wireless versions, the SQTPB601 requires a physical electrical connection to the access control system. This typically means running wires from the button to the door's locking mechanism or an access control panel.
  • Exit Button/Request to Exit (REX) Device: Its primary function is to provide a simple and reliable way for people inside a secured area to exit without needing credentials (like a key card or code).
  • Access Control Integration: It works in conjunction with an access control system (e.g., controlling an electric strike or magnetic lock) to manage who can enter and exit a building or specific area.
  • Momentary Action: When pressed, it typically sends a momentary signal to release the lock, and then the circuit returns to its normal state when the button is released.
  • Common Applications: You'll find these buttons in various commercial, industrial, and even residential settings where controlled access is desired, such as offices, warehouses, schools, and apartment buildings. They are crucial for safety, convenience, and compliance with building and fire codes that often require an unimpeded means of egress.
  How it Works ⚙️ When a person presses the SQTPB601 exit button:
  1. It sends an electrical signal to the connected access control system or directly to the door's locking mechanism.
  2. This signal temporarily disengages the lock (either a fail-safe or fail-secure lock), allowing the door to open.
  3. Once the button is released, the circuit returns to its normal state, and the lock re-engages, securing the door again.
  Importance in Security Systems 🔐 Exit push buttons like the SQTPB601 are vital components in a comprehensive security system because they:
  • Ensure Free Egress: They provide a guaranteed way for people to exit a building, even if the primary access control system fails or in an emergency.
  • Enhance Safety: In situations like fires or other emergencies, they allow for quick and unhindered evacuation.
  • Meet Compliance Standards: Many building and fire safety codes require a means of manual exit from secured areas.
  • User-Friendly: They offer a simple and intuitive way for anyone to exit a controlled space.

Exit push button RCTPB602

$28.50

Ship or pick up from our office.

Exit push button RCTPB602

*No Touch *Backlight *DC 12V *COM-NC-NO The RCTPB602 is a wired exit push button commonly used in access control systems. Its primary function is to allow individuals to exit a secured area. Here's a breakdown of its key aspects:   Functionality 🚪 The RCTPB602 is a request-to-exit (REX) device. When activated, it sends a signal to an access control panel or directly to a door's electric lock (like an electric strike or magnetic lock), causing the door to unlock and allow egress. This type of button is often used for:
  • Controlled exit: Ensuring that people can freely exit a secured area without needing a key or credential, while maintaining security on the entry side.
  • Emergency egress: Providing a simple and quick way to open a door in an emergency situation.
  Features & Specifications ⚙️ While specific details can vary slightly by manufacturer, typical features and specifications for the RCTPB602 include:
  • Wired Connection: It's designed to be hardwired into an access control system.
  • Momentary Operation: It usually functions as a momentary switch, meaning the circuit is activated only while the button is pressed, and returns to its original state when released.
  • Output Contacts: It typically provides normally open (NO) and normally closed (NC) contacts, along with a common (COM) contact, allowing it to be integrated with various locking mechanisms.
  • Working Voltage: It generally operates on 12VDC, which is common for access control devices.
  • Material: Often made with durable materials like an abrasion-resistant panel and a plastic button.
  • Application: Suitable for use with various gate frames and doors in access control setups.
  Type - Touchless/Wave-to-Exit ✋ Some sources indicate that the RCTPB602 is a touchless or wave-to-exit button. If this is the case, it would utilize infrared sensors to detect hand movement in front of the device, eliminating the need for physical contact. This feature enhances hygiene, making it particularly useful in environments where cleanliness is crucial, such as hospitals, food service areas, or high-traffic public spaces.   Integration with Access Control Systems 🔐 Exit buttons like the RCTPB602 are an integral part of access control systems. They provide the necessary means for authorized individuals to exit a secured space while the system controls entry. They are often installed near the door on the secure side, allowing for a swift and convenient exit.

Rain Shield Cover

$14.85

Ship or pick up from our office.

Rain Shield Cover

Common Applications:
  • Doorbell systems:
    Protects the doorbell from rain and sun, ensuring it remains functional and visible. 
  • Keypad access control systems:
    Shield the keypad from the elements, preventing malfunctions and ensuring accurate operation. 
  • Fingerprint access control systems:
    Protects the fingerprint sensor from rain and sun exposure, ensuring accurate biometric readings. 
  • Standalone RFID door access controllers:
    Shield the controller from weather elements, ensuring reliable access control. 
  • Attendance machines:
    Protects the machine from rain and sun, ensuring accurate timekeeping records. 

Card Holder

$7.75

Ship or pick up from our office.

Card Holder

A UHF/RFID card holder is a specialized enclosure designed to hold and protect UHF (Ultra-High Frequency) RFID cards, often used for access control, vehicle identification, and logistics
These holders typically consist of a durable material with a slot or pocket to securely accommodate the card, and may feature a mounting mechanism like suction cups for windshield attachment. 
They enable convenient and reliable use of UHF RFID cards in various applications, such as parking systems, building access, and asset tracking, by providing a designated place for the card and facilitating easy scanning by RFID readers. 

Power converters – AC 24 V to DC 15 V

$34.00

Ship or pick up from our office.

Power converters - AC 24 V to DC 15 V

A "Power converter - AC 24 V to DC 15 V" is a device that transforms an alternating current (AC) input of 24 volts into a direct current (DC) output of 15 volts. Here's a breakdown of what that means and how it works: AC (Alternating Current): This is the type of electricity typically supplied by wall outlets in homes and businesses. The voltage constantly changes direction, flowing back and forth. 24V AC is a common voltage for certain low-voltage control systems, industrial equipment, and sometimes HVAC systems. DC (Direct Current): This is the type of electricity that flows in only one direction. Most electronic devices, like phones, laptops, and many sensors or control circuits, require DC power. How an AC to DC Converter Works: An AC to DC converter (also known as a rectifier or power supply) typically involves several stages:
  1. Step-Down Transformer: The initial 24V AC is usually too high for direct conversion to 15V DC. A transformer "steps down" this AC voltage to a lower, more manageable AC voltage.
  2. Rectification: This is the core of the AC to DC conversion. Diodes are used to convert the alternating current into a pulsating direct current. There are different types of rectifiers (half-wave, full-wave, bridge) that achieve this with varying degrees of efficiency and ripple.
  3. Smoothing (Filtering): The pulsating DC output from the rectifier isn't perfectly smooth. Capacitors are used to "smooth out" these ripples, creating a more stable DC voltage.
  4. Regulation: To ensure a precise and constant 15V DC output, a voltage regulator is often employed. This circuit maintains the output voltage at the desired level, even if the input voltage fluctuates or the load on the power supply changes.
Applications: Converters that transform 24VAC to 15VDC are used in various applications, particularly in industrial, building automation, and low-voltage control systems where 24VAC is a readily available power source, but specific devices require 15VDC. Examples include:
  • Industrial control systems: Powering sensors, actuators, and control circuits that operate on 15VDC.
  • HVAC systems: Often 24VAC is used for thermostats and control panels, but some components within the system might require 15VDC.
  • Security systems: Powering cameras, access control devices, and other equipment.
  • Lighting systems: Especially in specialized LED lighting setups.
  • Custom electronics projects: Where a stable 15VDC is needed from an existing 24VAC infrastructure.
When choosing such a converter, you'd consider factors like:
  • Output current (Amps): How much current the connected device needs.
  • Power rating (Watts): The total power the converter can deliver.
  • Efficiency: How much energy is lost during the conversion process (higher efficiency means less heat and less wasted energy).
  • Protection features: Over-voltage, over-current, short-circuit protection for safety and device longevity.
  • Form factor: Whether it's an open-frame, enclosed, or DIN-rail mount design.

Wireless exit push button

$125.45

Ship or pick up from our office.

Wireless exit push button

* 1 Channel * DC 12V * COM-NC-NO * 20 meters range in an open area * Radio receiver included

Keypad access control K100SC104

$92.30

Ship or pick up from our office.

Keypad access control K100SC104

(Recommended for indoor usage) *Rain Shield Cover is included *Waterproof Version *EM/ID card/tag reader *Backlight *500 User *DC 12 V

RFID Tag Access Control

$3.95

Ship or pick up from our office.

RFID Tag Access Control

RFID Tag Access Control is a system that uses Radio Frequency Identification (RFID) technology to manage and control access to physical spaces or logical systems. It allows only authorized individuals or items to enter secure areas by wirelessly reading data stored on RFID tags. Think of it as a modern, electronic key system where your "key" is an RFID tag (like a card or key fob) and the "lock" is an RFID reader.   How it Works ⚙️ The fundamental principle is straightforward:
  1. RFID Tag/Credential: Each authorized individual or item is assigned an RFID tag. This tag contains a microchip that stores a unique identification code and an antenna.
  2. RFID Reader: A reader (also called an interrogator) is installed at the access point (e.g., a door, gate, or turnstile). The reader emits radio waves.
  3. Communication: When an RFID tag comes within range of the reader's radio waves, the tag's antenna captures energy from the reader's signal (for passive tags) or uses its own power source (for active tags) to activate its microchip. The tag then transmits its unique data back to the reader.
  4. Data Processing: The reader decodes the information from the tag and sends it to a central access control software or system.
  5. Authentication and Decision: The software compares the tag's unique ID with a database of authorized users and their assigned permissions. If the ID is valid and the user has permission to access that specific area at that time, the system sends a signal to unlock the door, open the gate, or grant access. If not, access is denied.
  6. Logging: The system typically logs every access attempt (both granted and denied), providing an audit trail for security monitoring and compliance.
Key Components 🧩 An RFID access control system typically consists of:
  • RFID Tag Access Controls/Credentials: These are the physical devices carried by users. They come in various forms, such as:
    • Cards: Similar to credit cards, commonly used for employee badges or hotel key cards.
    • Key Fobs: Small, convenient devices attached to keychains.
    • Wristbands: Often used in recreational facilities or for events.
    • Stickers/Labels: Can be affixed to items or vehicles.
    • Mobile Credentials: Increasingly, smartphones can act as RFID tags through NFC (Near Field Communication), a subset of HF RFID.
  • RFID Readers: Devices that emit radio waves to energize and read data from RFID tags. They can be fixed (at entry points) or mobile (handheld scanners).
  • Antennas: Integral to the reader (or external), they transmit and receive radio signals to and from the tags. The antenna design influences the read range and reliability.
  • Access Control Software/Management System: The "brain" of the system. This software manages user databases, assigns access permissions, logs events, and allows administrators to configure and monitor the system remotely.
  • Access Control Panel/Controller: Hardware that connects the readers to the central software, processing data and controlling the locking mechanisms.
Types of RFID Tags Used in Access Control 🏷️ RFID tags are categorized based on their power source and frequency: By Power Source:
  • Passive RFID Tags:
    • Do not have an internal power source.
    • They draw power from the radio waves emitted by the reader to operate.
    • Are generally smaller, less expensive, and require no maintenance.
    • Have a shorter read range (a few centimeters to a few feet).
    • Most commonly used in access control for cards and key fobs.
  • Active RFID Tags:
    • Have their own internal power source (battery).
    • Can transmit data over longer distances (up to several hundred meters) and at regular intervals.
    • Are larger and more expensive.
    • Often used for long-range applications like vehicle tracking or asset management.
  • Semi-Passive RFID Tags (Battery-Assisted Passive - BAP):
    • Contain a battery to power the microchip, but still rely on the reader's signal to initiate communication.
    • Offer better read range and performance than passive tags, without continuously transmitting like active tags.
  By Frequency:
  • Low Frequency (LF) RFID (125-134 kHz):
    • Short read range (1-10 cm).
    • Less susceptible to interference from metal and water.
    • Common in traditional access control systems.
  • High Frequency (HF) RFID (13.56 MHz):
    • Moderate read range (10 cm-1 meter).
    • Widely used for access control, ticketing, and Near Field Communication (NFC) applications (like smartphone taps).
  • Ultra-High Frequency (UHF) RFID (300 MHz-3 GHz, often 860-960 MHz for RAIN RFID):
    • Long read range (up to 12 meters).
    • More susceptible to interference from liquids and metals.
    • Used in applications requiring longer read distances, such as vehicle access control or large-scale inventory tracking.

RFID Card Access Control

$7.15

Ship or pick up from our office.

RFID Card Access Control

RFID card access control is a system that uses Radio Frequency Identification (RFID) technology to manage and control access to physical spaces. It provides a secure and convenient way to grant or deny entry to authorized individuals, replacing traditional keys or swipe cards. This system works by wirelessly communicating between an RFID card (or tag) and an RFID reader.   How it Works
  1. RFID Card (Tag): Each authorized individual carries an RFID card, key fob, or even a smartphone with an embedded RFID chip. This chip contains a unique identification code and sometimes other encrypted data.
  2. RFID Reader: Readers are installed at entry points (doors, gates, elevators, etc.). They constantly emit a radio frequency field.
  3. Communication: When an RFID card enters the reader's field, the card's antenna captures energy from the reader's signal. This energizes the microchip on the card, allowing it to transmit its unique data back to the reader.
  4. Data Verification: The RFID reader decodes the information from the card and sends it to a central access control server or control panel. This server compares the card's data with a secure database of authorized users and their access permissions.
  5. Access Grant/Denial: If the credentials match an authorized profile, the system sends a signal to an electronic lock mechanism, allowing entry. If not, access is denied. This entire process typically happens in milliseconds.
  6. Audit Trail: The system also records detailed access information, including the time, date, and specific access point used, providing a valuable audit trail for security purposes.
  Key Components
  • RFID Cards/Tags: These are the credentials held by users, typically in the form of plastic cards, key fobs, or even integrated into mobile devices. They contain a microchip and an antenna.
  • RFID Readers (Interrogators): Devices installed at entry points that emit radio waves to communicate with the tags and read their data.
  • Access Control Panel/Server: This is the "brain" of the system. It receives data from the readers, verifies user credentials against a database, and controls the electronic locks. It can be cloud-based or local.
  • Electronic Locks: Devices that secure the entry points and are controlled by the access control system (e.g., magnetic locks, electric strikes).
  • Access Control Software: Software used to manage user profiles, set access levels, monitor events, and generate reports.
Types of RFID Tags
  • Passive RFID Tags: Most common for access control. They don't have an internal battery and are powered by the electromagnetic field emitted by the reader. They have a shorter read range (a few centimeters to a meter).
  • Active RFID Tags: These tags have their own power source (battery), allowing for a much longer read range (up to several hundred meters) and the ability to broadcast signals periodically. They are typically more expensive.
  • Semi-Passive RFID Tags: These tags have a battery to power the chip but only transmit data when activated by a reader's signal, offering improved sensitivity and performance over passive tags.
  Benefits of RFID Access Control
  • Convenience: Offers contactless and keyless entry, making it fast and easy for users to gain access. Cards can often be read from inside a wallet or bag.
  • Enhanced Security: Provides unique identification and can utilize encrypted communication, making tags difficult to duplicate. Lost cards can be immediately deactivated, preventing unauthorized use.
  • Efficiency: Streamlines entry and exit processes, reducing wait times, especially in high-traffic areas.
  • Flexibility & Scalability: Easily allows for adjusting access permissions for different users, areas, or time frames. Systems can be expanded or modified as needs change.
  • Integration: Can be integrated with other security systems like CCTV, alarms, and time attendance systems for comprehensive security management.
  • Audit Trails: Provides real-time tracking of who enters and exits, offering valuable data for security monitoring and incident investigation.
  • Durability: RFID components generally experience less wear and tear compared to traditional mechanical locks or swipe card systems.
Security Considerations While RFID access control offers many benefits, it's important to be aware of potential vulnerabilities:
  • Skimming: In theory, unauthorized readers could attempt to read card information if they get close enough, though modern RFID cards often use one-time codes and encryption to mitigate this risk.
  • Cloning: If the security protocols are weak, an RFID card's information could potentially be cloned.
  • Electromagnetic Interference: Other electronic devices or metal/liquid objects can sometimes interfere with RFID signals, impacting performance.
To address these concerns, many RFID systems incorporate advanced encryption, mutual authentication, and integrate with multi-factor authentication methods. RFID-blocking wallets or sleeves are also available, though their necessity for security against typical skimming attempts is debated due to the short read range and other built-in card protections.