Our factory has 15 years experience in magnetic lock production.Whether it is the low-end market, the terminal market, or the high-end market, our company has corresponding magnetic locks to meet your different needs.Of course quality is based on cost. mini Magnetic locks should be identified from various technical indicators. Standard qualified magnetic lock door generally provide two input voltages of 12V and 24V (the difference between single coil and double coil) for time delay magnetic lock, They are selected and switched by jumpers. There are several ways to judge the pros and cons of a magnetic lock:Here,S4A company's engineers have summarized 15 related knowledge for your reference.1. Circuit board: The inferior magnetic lock can be judged from the circuit board. The inferior magnetic lock circuit board has rough printing and extremely simple layout. A set of voltage inputs.2. Measure the resistance: first unplug the 12V and 24V switching jumpers of the magnetic lock (note: no power is required), generally there are 4 binding posts (at the jumper), measure the red and black lines, the resistance is at Preferably around 50 ohms.3. Measure the current value after power-on: After the magnetic lock is connected to 12V voltage, the current value is measured, and the one that matches the marked value is better. 280KG (600 lbs) magnetic lock is generally better at 400-450 mA. If it is less than 450 mA, it is not enough to pull; if the voltage is 24V, the marked value or actual value should be 200 mA.4. Insulation value: The insulation value of the lock body of a standard qualified magnetic lock should be infinite, and the specific value should be more than 50 megohms; the specific test position is the cut steel sheet and the output line of the lock body.5. Perpendicularity of the cut steel sheet: In principle, the cut steel sheet should be touched or stained with hands as little as possible. The perpendicularity and parallelism of the qualified magnetic lock cut steel sheet should be as standard as possible. The quality of the electroplating of the cut steel sheet depends on whether there are oxidation marks on the cut steel sheet.6. Glue inspection: There should be no air bubbles in the colloid of the magnetic lock, it should be flat and neat, without cracks, and the angle is square.7. The distance between the cut steel pieces: the main concern is that the thickness of the cut steel pieces should be 0.35mm, which is the best. At present, most of the steel cut pieces on the market use 0.5mm cut steel pieces; the tighter the arrangement of the cut steel pieces on the lock body, the better , Pay attention to observe that there is no glue leakage in the arrangement of the cut steel sheets.8. No residual magnetism: Generally, the cleats of magnetic locks are made of pure iron, but most of the cleats are 99% pure iron, so they must have the function of removing residual magnetism, and are equipped with protruding rubber pads to play a buffering r...
With the improvement of people's living standards, people's requirements for access control system are getting higher and higher.Since 2021, a large number of access control machines with APP have emerged in the market.Previously, if you wanted to open the door through an APP, you needed to connect an APP module from a third party.But now we can directly embedded the module Inside the ready-made access control machine. At present, the two hottest apps on the market, the first one is tuya app.The second is TTlock app.tuya apps generally use WiFi, while TT lock apps generally use Bluetooth.But with more and more concerns ,such as :can you open the door remotely?What if a visitor comes? In fact, the latest access control machine with APP can solve these problems you are worried about. What are the advantages of the access control machine with APP? 1. Mobile phone access control has short opening time.2. The success rate of opening the door of mobile phone is high.3. Compared with the previous access control, the mobile phone access control greatly improves the security.4. There are various ways to open door by mobile phone access control.5. Mobile phone access control is easy to install. Bluetooth transmission can realize long-distance reading of the device at a distance of 10 meters, which means that the owner only needs to sense the device within the range to automatically authorize the door opening system, which is smart and fast. 6. It has a dynamic door opening password, which is convenient for visitors to open the door.7. It can prevent thieves from opening door.8. Someone open the door and feedback to the mobile APP.Improve security.9. Nowadays,You may forget to bring your keys, but you will never forget to bring your mobile phones.In line with the current way of life. Moreover, the current access control system with APP is also very cheap.such as S4A T series and TF series. Some only have the functions of swiping cards and passwords, some have the functions of fingerprint plus swiping cards and passwords, and some only have the functions of swiping cards. If you have any interest, please feel free to contact me. If you buy a machine, please contact me after sales.The Best Excellence of the Year award was given to our mouse.Written by Ms.Vivian He from S4A INDUSTRIAL CO.,LIMITED
Linkage between access control system and fire alarm systemIn places with relatively dense traffic, it is difficult to evacuate people in emergencies such as fire alarms and terrorist attacks, especially after the installation of access control systems in these places, this problem is particularly obvious. It has become a major obstacle to people's escape. Therefore, the access control system must have the function of fire-fighting linkage.The signal output by the fire alarm system is usually a passive dry contact signal, and the access control system can be linked with it in two ways.Directly power off the electric lock controlled by the access control systemThe fire protection system can be directly connected to the relay (it should be pointed out that when the relay has no fire alarm signal, the coil should be in a power-off state, so as to prolong the life of the relay) to control the electric lock power supply of the access control system, that is, the relay is normally open. The contact controls the on-off of the 220V power supply. When a fire alarm occurs, the relay will act in time to force the power-off control of the electric lock power supply of the access control system (mains power and backup power supply), so that the designated door can be automatically opened when the system is powered off. . The advantage of this method is that it is easy to use, but the controller has no access to alarm signals and no corresponding records are kept.Access control system logical judgment linkage (indirect linkage)The alarm signal of the fire alarm system is directly communicated with the linkage expansion port of the access control controller. This method can realize input functions including fire alarm signal input, glass breaker alarm signal input, etc., as well as sound and light alarm signal output, forced electric lock. Action output and other functions. In the event of a fire, the access control controller will accept the fire alarm signal transmitted by the fire alarm system in the form of a relay dry contact (the fire protection system actively sends the signal, and the access control system passively receives and executes control), so as to control the designation according to the prefabricated linkage command. The electric lock automatically opens or closes to facilitate the normal evacuation of personnel and achieve the purpose of escape.In order to further emphasize the safety of the channel and prevent someone from deliberately creating false fire signals to automatically open the electric lock and cause escape accidents, the access control system can be set to the multi-channel fire alarm signal input authentication mode, which can be set to receive multi-channel fire alarm signals. A designated door is only opened when an alarm signal occurs. If only a single-channel alarm signal input is detected, no action command will be issued to the electric lock, but the electric lock can still be opened through the normal legal exit proc...
A balance of safety and convenienceThe advantages of smart access control are obvious, such as increasing convenience and realizing the diversification of verification methods: in real life, face recognition, mobile phone replacement of access control cards, etc. have brought great convenience to users; at the same time, the new development of intelligent access control has also Let the security have a new technical guarantee. Taking face recognition as an example, it can effectively identify the identity and prevent the occurrence of card punching and card theft. But on the other hand, compared with traditional access control, there are also new security risks in the upgrade of human-computer interaction experience, such as face recognition data being cracked, face similarity and false release, etc.Therefore, in the deployment of Network Access Control system solutions, manufacturers must grasp the balance between convenience and security. Once the balance is out of balance, there will be security risks.Take the NFC access control card as an example. In practical applications, NFC access control cards are divided into several types. If the user's awareness of safety precautions is insufficient and the user only pursues convenience, it is easy to use simple cards that can be copied by mobile phones in areas with relatively low security precautions, such as communities and underground garages. create a safety hazard. In fact, in these scenarios, virtual cards can be used, and the access control system issues virtual card numbers through exclusive channels. The operation from the cloud to the local has a very complete security mechanism, which will not be easily copied and can increase the safety factor. If the mobile phone is lost, the virtual card can also be frozen quickly, and the cloud authorization certificate is constantly refreshed, so that the validity of the virtual card number can be grasped in real time.At present, many domestic door access control solutions consider convenience, and the awareness of security precautions needs to be strengthened. In practical applications, scenarios with lower security levels in ordinary commercial buildings can be more convenient for users; however, key industries, such as airports, electronic manufacturing plants, nuclear power plants and other application places, need to use state-secret CPU cards, Mifare Access control solutions with higher security standards and encryption technology such as the DESFire EV1 card.S4A has always regarded the realization of product safety as the highest priority and has a very complete safety process. In the product development stage, S4A has already regarded data security as an important consideration, and needs to go through the security review process; after the development is completed, it needs to pass a strict penetration test, inviting data security companies to simulate hackers from the network level, software level, and operating system level. , or e...
Dear All S4A's Partner,As the year draws to a close, we find ourselves reflecting on the incredible journey we've had, and it fills us with gratitude for the unwavering support we've received from each one of you.To our valued partner, both New and Cooperated, we extend our sincerest appreciation for your continued trust in S4A Industrial Co.Limited, Your loyalty has been the driving force behind our success, and we are truly thankful for the privilege to serve you.This year presented its own set of challenges, and your understanding and flexibility have been instrumental in helping us navigate through them. Your patience during times of change and your willingness to grow with us have not gone unnoticed. It is the partnership we share with each one of you that makes our journey so rewarding.As we look ahead to the upcoming year, we are excited about its opportunities and possibilities.We are committed to providing you with even better access control or automatic door openers/services and an enhanced customer experience. Your feedback has been invaluable in shaping our offerings, and we look forward to continuing this collaborative journey with you.May the coming year bring prosperity, joy, and success to you and your loved ones. We are truly grateful for the relationships we have built, and we look forward to another year of shared accomplishments.Thank you for being an integral part of S4A Industrial Co.Limited, Wishing you a joyous the holiday season and a fantastic New Year!Warm regards,S4A Industrial Co.Limited
Dear All respected S4A's Partner:We are pleased to inform you that in celebration of our nation's National Day, our office will be closed from 29th, Sep to 6th, Oct,2023We kindly request that all S4A employees plan their work accordingly to ensure a smooth transition during this holiday period. Our office will resume on 6th, Oct 2023(During this time, S4A company has personnel on duty, and the working hours are from 9.00 a.m. to 18.00 p.m. For any further inquiries or technical support, you are warmly welcome to email: sales1@s4a-access.com or call us directly: 0086 134 1050 0721We hope you have a wonderful National Day, filled with joy and patriotism. Enjoy this special day with your loved ones, and let us come back refreshed and energized to continue our work together.Thank you for your understanding, and we look forward to rejoining you after the holiday.Warm regards,
S4A Access key tags or key fobs can come in a variety of shapes and designs to suit different purposes and preferences. Here are some alternative shapes and styles S4A can provide for key tags.What is the role of the access control keychain?An access control keychain, often referred to as an access control key fob or keytag, plays a crucial role in the field of security and access control systems. Its primary role is to provide a convenient and secure way for individuals to gain access to restricted areas, buildings, or resources. Here's a more detailed breakdown of the role of an access control keychain:Authentication and Identification: Access control keychains are typically assigned to authorized personnel or individuals. Each keychain is associated with a unique identifier, such as a serial number or RFID (Radio-Frequency Identification) tag. When presented to an access control system, this identifier is used to verify the person's identity and determine their access privileges.Access Control: Access control keychains are used to control entry and exit to secure areas. They enable or disable access based on the permissions associated with the keychain's identifier. This helps prevent unauthorized individuals from entering restricted zones.Convenience: Keychains are compact and easy to carry, making them a convenient method for individuals to access secured locations. Users can simply present their keychain to a reader, and the system will respond accordingly, either granting or denying access.Enhanced Security: Access control keychains enhance security by reducing the risk of unauthorized entry. Unlike traditional keys that can be easily duplicated, keychains with electronic identifiers are much more difficult to clone or replicate. Additionally, lost or stolen keychains can be quickly deactivated in the system to prevent misuse.Audit Trail: Many access control systems log access events, including when and where keychains were used. This audit trail provides valuable information for security personnel, helping them monitor and investigate any suspicious activities or breaches.Integration: Access control keychains can be integrated into broader security systems, including video surveillance, alarm systems, and visitor management systems. This integration enhances overall security and provides a comprehensive view of access-related events.Time-Based Access: Some access control systems allow administrators to set specific time-based access rules. Keychains can be programmed to grant access only during certain hours or days, further controlling and securing access.Multi-Functionality: In addition to physical access control, keychains can be used for other purposes, such as cashless payments within a facility, tracking attendance, or managing equipment loans.Visitor Management: For temporary access, keychains can be issued to visitors or contractors, allowing them limited access during their visit. These keychains can be easily deactiv...
Please be advised our company will be closed from 29th, April 2023 to 3rd, May 2023 for the Labor Day holidays. We will resume normal operation on 4th, May 2023 and continue to provide services for you. Thank you for your attention and kind cooperation with S4A, we wish you great success and business!During the holiday, we have sales on duty to provide service.Email: sales@s4a-access.comTel No.+86 755 29450011
We found that many customers have asked about the connection method of the terminals on the K80 access control power supply. What is this for? How is this wired? What products does it work together?95% of people know about normal wiring.Similar to the following.but What is this for the -Control and +Control, How is this wired?In order to facilitate everyone to find more comprehensive information.Our designer has just drawn a connection diagram for your reference.These two terminals are mainly connected to the building intercom machineto work together and are used to supply power to the building intercom. as below: No matter what aspect of the problem, feel free to drop me a message if you need my help.or WhatsApp me: 0086 134 1050 0721 or email back to: sales1@s4a-access.com at any time...
Factory Address:Building S4A, South Third Lane, Qiuyuling Street, Zhangkeng Village, Hengli Town, Dongguan City, Guangdong Province Office Address:#601,floor 6 ,building 1,JINFANGHUA industrial zone, Bantian St. Longgang Dist. Shenzhen, PRC.
If you are interested in our products and want to know more details,please leave a message here,we will reply you as soon as we can.