banner



Do Mag Locks Need To Register

Assistance Center Topics & Common Questions

maglocks Help Center and FAQs

Assistance Eye Topics

Locking Components:
  • What are mechanical locks? and what are the different types?

  • What are electronic locks? and what are the different typed?

  • What is a credential or credentials?

  • How exercise electromagnetic locks work?

  • What is an Electrical Strike? How does an Electrical Strike Piece of work?

  • What is the holding strength for a magnetic lock?

  • What are the electrical requirements for a magnetic lock?

  • Which power source; 12-voltage or 24-voltage?

Access Command Components:
  • What is admission control? What are the components of an admission command organization?

  • What is an IP access controller?

  • How does a door admission control organization work?

  • What are the common security risks for door access control systems?

Admission Control Software:
  • Is information technology like shooting fish in a barrel to program and configure door access control software?

  • What is the registration procedure for new Cobra Software?

  • Where can I find the Cobra Controls controller serial number?

  • How do I make up one's mind the Cobra Controls controller version?

Hotel Locking Organization Questions:
  • Should I shed my hotel carte cardinal after I check-out?

Industry Definitions:
  • Are there building and fire lawmaking requirements for door locking systems?

  • IP-Rating certification - what do the letters and numbers represent?

  • What is Fail Safe or Fail Secure electrified hardware?

  • What does intrinsic Prophylactic or Explosion-proof hateful?

  • What is RFID (Radio Frequency Identification)?

  • What are Poles and Throws (SPDT and DPDT)?

  • What is a 626 or US26D hardware stop lawmaking?

General Questions:
  • What web browsers are supported by maglocks?

  • Does maglocks maintain a Sustainability Policy?

  • Is the maglocks website accessible to people with disabilities?

Programs for Distributors and Installers:
  • Practise y'all offer programs for Distributors (Dealers) and Installers?


Q-1: Are there edifice and burn code requirements for door locking systems?

When access control hardware is installed on doors in a new or existing building, it's extremely important to be aware of the fire, life-safety and edifice codes that touch these applications. Failure to take these lawmaking requirements into account could result in liability for blocked egress routes and fire door assemblies with labels which are nothing and void.

  • For a summary of the building and burn codes impacted door locking systems, review our article Buyer Guide: What building and burn down codes touch door locking systems?
  • For a comprehensive listing of codes and requirements visit the National Burn Protection Agency (NFPA) and review NFPA 80 "Standard for Burn down Doors and Other Opening Protectives" as well as NFPA 101 "Life Safety Code ®" for detailed guidelines and requirements.

Return to Top


Q-2: What is Fail Rubber or Fail Secure electrified hardware?

Neglect Safe and Fail Secure refer to the way electrified hardware work when power is removed. The basic definition is applied from the secure side of the door. The secure side is the outside or key side of the door. For both terms, the word "Neglect" refers to ability as in "Power Failure". Hither are the basic definitions and a mode to remember the differences

  • Neglect safe products are unlocked when ability is removed. Power is applied to lock the door.
  • Neglect secure products are locked when ability is removed. Power is applied to unlock the door.
  • Retrieve, Fail safe / Fail Secure refers to the status of the secure side (key side, outside) of the door. If you lot are continuing outside a airtight door and the ability is removed (Power Failure), you would be in a Neglect Rubber condition if the door unlocks. You would be in a Fail Secure condition if the door remains locked. Too, most electrified hardware allows free egress from the within (non-key side) of the door.
  • Fail Safe = Power Failure door unlocks providing safe egress.
  • Neglect Secure = Power Failure door remains secure and locked.

Render to Top


Q-three: What are mechanical locks? and what are the different types?

There are many types of mechanical locks and we use them everyday. They include tubular, cylindrical, mortise, interconnected and deadbolt styles. Hither is a brief definition and typical employ of each blazon;

  • Tubular locks have a eye spindle assembly that extends through the middle of the lock body and latch, allowing for retraction of the latch when the level or knob is rotated. While this type of lock is very mutual on interior doors and in residential applications, they are considered the least secure lock type.
  • Cylindrical locks sometimes chosen bored locks are stronger and more secure than tubular locks. The latchbolt assembly interlocks with one side of the lock chassis, making it easier to install, replace and rekey. Cylindrical locks are available in dissimilar formats that provide diverse levels of security, all of which use the same type of key. This allows for like-keyed and main-keyed systems that use a variety of locks.
  • Mortise locks are considered fifty-fifty more than secure than cylindrical locks. They require a mortise or pocket to be cut into the door where the lock is fitted. The mortise assembly includes the lock trunk (the part installed inside the mortise of the door), Lock Trim, strike plate and keyed cylinder to operate the locking/unlocking part of the lock body. Mortise locks are stronger and heavier duty that cylindrical locks and are used often in infirmary and school applications.
  • Interconnected locks are comprised of 2 locks that are connected together and then operating the level handle will retract both the latchbolt and the deadbolt simultaneously. The latchset is either a cylindrical or tubular lock with a deadbolt above. These locks are most usually used on dwelling unit entrance doors in multi-family residential buildings.
  • Deadbolt also called deadlocks, are available with a single cylinder or a double cylinder. the single cylinder deadbolt operates by a primal on the exterior and a thumbturn on the inside. A double cylinder deadbolt requires a key for unlocking on both sides of the door and cannot be used on doors that require costless egress. Deadbolts are typically not allowed to exist used on a door with another lock or latch installed equally the egress code requirements mandate one motion to unlatch an egress door.

Return to Height


Q-4: What are electronic locks? and what are the different typed?

An electronic lock is controlled by a reader, such as a keypad, card reader or biometric terminal. If the user has the right personal identification number (PIN), card or biometrics, the door unlocks. There are 2 main types of electronic locks; Standalone as well called non-computerized and Networked too called computerized.

  1. Standalone locks / readers use the same credential (keycard, code (Pivot), etc.) equally networked locks. However, they are not connected to access control systems and software. As such, they crave the ambassador to physically visit each lock to administer access rights and recall tracking (audit) data.
  2. Networked locks are connected to an access control system (door access command organisation). This allows the administrator to hands modify access rights and track motion throughout the facility from anywhere they are connected to the network.

Return to Height


Q-5: What is a credential or credentials?

Credentials or keys are the tools that give authorized people access. Although modern security systems differ in the types of credentials, a standard brass key is the most widely recognized. When a brass key is lost, new ones must exist duplicated and often the locks must be replaced. Here are a few types of credentials;

Access Control Credential also called a Keycard

  • Patented key direction systems are a patent-protected fundamental management organization, keys are only available to authorized individuals through professional locksmith channels to preclude unauthorized primal duplication. Notwithstanding, a lost key still represents a security risk and the central remains capable of unlocking the lock.
  • Keycards as keys to avoid the cost of keys, many organizations have moved to keycards. From the highest to lowest levels of security, menu options include magnetic stripe cards, proximity and smart cards. If a keycard is lost, its number is simply erased from the system and the user receives a new card and number.
  • Biometrics as keys a biometric reader uses your an authorized person's body as identification. A paw, for example, tin can be placed on a reader. If information technology matches the template created when the person was enrolled, access is granted. Biometrics provide the highest security and greatest convenience.
  • Readers just every bit the key fits a lock, a keycard or biometric requires a reader, which is typically located next to a door. In some cases, the lock and reader are combined into one unit. The affordability and security of smart cards continues to improve making them likely to continue to abound in utilise for all kinds of environments. If you purchase a card reader, information technology should have the capacity to read all types of keycards, proximity, magnetic stripe and Smart. Purchasing multi-technology readers can eliminate the expense of installing new readers if yous always switch keycard types.

Return to Top


Q-six: How do electromagnetic locks work?

The term magnetic lock refers to a type of lock that uses magnets to open up and secure a wide variety of things, ranging from doors to hidden compartments. Magnetic locks can offer the seamless darkening of door or compartment. It is an extremely powerful forcefulness. This immense power tin likewise concord a door closed in the absence of a bolt. But a lock that holds a door close would demand to be able to be turned off. Electromagnetic locks use electricity to make metal temporarily magnetic.

The simplest mode to explain magnets is how we all learn near them in uncomplicated schoolhouse. In a magnet, there is a northward and due south pole. Betwixt like poles, the magnets repel, and opposite poles attract. That said, magnets are very complicated aspects of nature that represent complex aspects of quantum mechanics. The spin of the electron while orbiting the nucleus of an cantlet is what causes a magnetic field. The spin of the paired valence electrons in an atom must be parallel to one another to make the substance magnetic.

electromagnetic lock

This but naturally occurs in iii elements: iron, nickel, and cobalt. Each magnetic field that an atom creates is called a domain, and they are not necessarily organized in a cloth to give it a single north and south pole. Much more than often, the 3 aforementioned metals volition have a cluttered organization of poles that do not make them concenter other magnets. What makes something a magnet, in the manner that most people understand the discussion, is when those atomic domains are uniformly structured in a material. This tin be accomplished naturally in rare globe metals (most unremarkably lodestone) or artificially with the utilize of an electrical electric current.

Adding an electrical current created a door locking solution that would unlock with the loss of power (or, for example, a serial of doors that could exist opened by the pulling of a burn down alarm). When there is no emergency to disable the locks, the magnets can exist manipulated with a key (Keycard, Keypad, etc.) that temporarily interrupts the electrical current. Afterward a few seconds, the electric current will return, and once the door has closed information technology will magnetically bind the door to the door frame. This lock set up is constructed by fixing a plate of magnetic metallic (usually iron) to the door, and the electromagnet to the door frame. The strength of the magnetic force belongings the door closed will depend on how the roll is wound and constructed on the electromagnet; the force of the electric current (how much electricity is existence used); and the material that the coil is wrapped around.

Advantages of electromagnetic locks:

  • The lock will open in the case of an emergency.
  • The lock can be fabricated to open with whatsoever electrical signaling method (key code, swipe bill of fare, move sensor, biometrics, etc.)
  • Common electromagnets tin can remain closed under equally much as ane,200 pounds of force.
  • The lock and holding force of the magnet can be increased by increasing the electric current.

Disadvantages of electromagnetic locks:

  • The security tin be overcome past interrupting the electricity in the edifice.
  • The door may exist able to be pried open depending on the gap between the door and frame.
  • The holding force of the door may be lesser depending on the model you lot purchase.

Return to Top


Q-7: What is an Electric Strike? How does an Electric Strike Work?

electric strike

An electric strike modifies the existing strike on your door frame, allowing your door to be unlocked via electronic means instead a physical fundamental. This way, your door can remain locked to public access, while authorized users can admission your infinite easily without manually turning the latch. The strike cavity refers to the hole in the door frame where the door latch fits. On the perimeter of the crenel is a keeper, where the dead-latch rests when the door is closed. On a normal strike, the latch will have to plow and contract dorsum into the door lock before you lot tin can swing the door open. Even so, an electric strike modifies your strike so that the latch does not have to turn at all. Instead, a modification is fabricated on the keeper, allow it to pivot outwards when an unlock is activated electronically. Call up of information technology as creating a chapeau on your door frame that is powered past electricity.

Most electric strike models are tested up to 500,000 cycles, where they can withstand traffic involved with access control applications. Therefore, electric strikes are used equally parts of many electronic access control systems to provide added security and convenience for traffic command and offices with high turnover rate. Most electric strikes can exist fabricated to arrange odd frame conditions and other problems, hence they are a versatile fit for near doors that need an upgraded level of security.

Return to Top


Q-8: What is the holding force for a magnetic lock?

A magnetic lock has a metal plate surrounded past a coil of wire that tin can be magnetized. The number of coils determines the holding force which characterizes the lock:

  • Micro Size: 275 lbf (i,220 N) holding strength.
  • Mini Size: 650 lbf (2,900 N) belongings force
  • Midi Size: 800 lbf (three,600 North) property force.
  • Standard Size: 1,200 lbf (5,300 Due north) holding force.
  • Shear Lock: 2,000 lbf (8,900 N) holding force.

Return to Top


Q-9: What are the electrical requirements for a magnetic lock?

Diode Bridge, Bridge Rectifier

The power for an electromagnet lock is DC (Directly Current), around v to 6 watts. The current is effectually 0.5A (Amps) when the voltage supply is 12VDC and .25A (Amps) when using 24VDC (the actual ampere may vary slightly betwixt manufacturers and if there are ane or ii coils in the block). It is as well recommended to verify that the magnetic lock carries the UL mark. Mostly, the specification of the electromagnet lock is dual voltage of 12/24 VDC. If using a rectifier to catechumen Ac power, a full wave bridge rectifier (Diode span) should be used.

A diode bridge is an arrangement of four (or more) diodes in a bridge circuit configuration that provides the same polarity of output for either polarity of input. When used in its nearly common application, for conversion of an alternating-current (Ac) input into a directly-electric current (DC) output, it is known equally a bridge rectifier. A bridge rectifier provides total-wave rectification from a two-wire AC input. The essential feature of a diode span is that the polarity of the output is the aforementioned regardless of the polarity at the input.

Return to Top


Q-ten: What is admission command? What are the components of an access control system?

Door Access Control System Diagram

An access control point tin can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access tin exist electronically controlled. Typically, the access bespeak is a door. An electronic access control door can contain several elements. At its most basic, there is a stand up-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, information technology could exist a keycard reader, or it could be a biometric reader. Readers do non usually brand an access determination, simply send a card number to an admission control panel that verifies the number against an access listing. To monitor the door position a magnetic door switch can be used. In concept, the door switch is not dissimilar those on refrigerators or car doors. By and large only entry is controlled, and exit is uncontrolled. In cases where leave is also controlled, a 2nd reader is used on the reverse side of the door.

In cases where exit is non controlled, free get out, a device called a request-to-exit is used. Asking-to-exit devices can exist a push-button or a movement detector. When the button is pushed, or the motion detector detects motility at the door, the door warning is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the asking-to-exit device besides unlocks the door.

Return to Elevation


Q-11: What is an IP access controller?

An IP access controller is an electronic security device designed to identify users and control entry to or go out from protected areas. A typical IP access controller supports 2 or iv bones access control readers. It may have an internal web server and support configuration via a browser or via software installed on a host PC. The main features that distinguish IP access controllers from older generation of series controllers are: [1] IP admission controllers connect directly to LAN/WAN and have all the inputs and outputs necessary for decision-making readers, monitoring door inputs and decision-making locks. [2] IP access controllers have an on-board network interface and does not require the use of a terminal server.

Advantages of an IP access controller:

  • An existing network infrastructure is fully utilized; there is no need to install new communication lines.
  • In that location are no limitations regarding the number of IP controllers in a system (the limit of 32 controllers per line is typical for systems using RS-485 advice interface).
  • Special knowledge of installation, termination, grounding and troubleshooting of RS-485 communication lines is not required.
  • Communication with IP controllers may be done at the full network speed, which is important if transferring a lot of data (databases with thousands of users, maybe including biometric records).
  • In case of an alarm IP controllers may initiate connection to the host PC. This ability is important in big systems equally it allows reducing network traffic generated by frequent polling.
  • Simplifies installation of systems consisting of multiple locations separated by big distances. Basic Cyberspace link is sufficient to plant connections to remote locations.
  • Wide selection of standard network equipment is bachelor to provide connectivity in different situations (cobweb, wireless, VPN, dual path, PoE)

Disadvantages of an IP access controller:

  • The arrangement becomes susceptible to network related issues, such as delays in example of heavy traffic and network equipment failures.
  • IP controllers and workstations may become accessible to hackers if the network of an organization is non well protected. This threat may be eliminated by physically separating the access control network from the network of the arrangement. Also virtually IP controllers utilize either Linux platform or proprietary operating systems, which makes them more difficult to hack. Industry standard data encryption is too used.
  • Maximum altitude from a hub or a switch to the controller is 100 meters (330 anxiety).
  • Functioning of the organization is dependent on the host PC. In instance the host PC fails, events from IP controllers are non retrieved and functions that require interaction betwixt readers (i.east. anti-passback) end working.

Render to Top


Q-12: How does a door admission control organization work?

When a credential is presented to a reader, the reader sends the credential's information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access command list, grants or denies the presented asking, and sends a transaction log to a database. When access is denied based on the access control listing, the door remains locked. If at that place is a match between the credential and the admission command listing, the control panel operates a relay that in plough unlocks the door. The control panel also ignores a door open point to preclude an alarm. Often the reader provides feedback, such as a flashing red LED for an access denied and a flashing green LED for an access granted.

That is a description of a unmarried cistron transaction. Nonetheless, credentials tin be passed around, thus subverting the admission control list. For example, Chris has admission rights to the server room, but Ronald does not. Chris either gives Ronald his credential, or Ronald takes it; he now has access to the server room. To prevent this, two-gene authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; the 2nd (boosted) cistron tin can be a PIN, a second credential, operator intervention, or a biometric input.

There are three types (factors) of authenticating information:

  1. something the user knows, e.g. a password, laissez passer-phrase or Pivot
  2. something the user has, such as smart card or a key fob
  3. something the user is, such as fingerprint, verified by biometric measurement

Return to Top


Q-13: What are the mutual security risks for door access control systems?

The most common security adventure of intrusion through an access control system is by only post-obit a legitimate user through a door, and this is referred to as tailgating. Oftentimes the legitimate user will hold the door for the intruder. This take a chance can be minimized through security awareness grooming of the user population, or more agile ways such as turnstiles. In very high security applications this adventure is minimized by using a mantrap, sometimes called a security entrance hall, where operator intervention is required presumably to assure valid identification.

The second most common run a risk is from levering a door open. This is relatively hard on properly secured doors with strikes or high property force magnetic locks. Fully implemented access control systems include forced door monitoring alarms. These vary in effectiveness, normally failing from high false positive alarms, poor database configuration, or lack of active intrusion monitoring. Nigh newer access control systems contain some blazon of door prop alert to inform system administrators of a door left open longer than a specified length of time.

The third most common security risk is natural disasters. In order to mitigate run a risk from natural disasters, the structure of the building, down to the quality of the network and figurer equipment are vital. From an organizational perspective, the leadership will demand to adopt and implement an Incident Response and disaster recovery Plan.

Similar to levering is crashing through cheap division walls. In shared tenant spaces the divisional wall is a vulnerability.

Spoofing locking hardware is fairly unproblematic and more elegant than levering. A strong magnet can operate the solenoid controlling bolts in electric locking hardware. Motor locks, more prevalent in Europe than in the U.s., are likewise susceptible to this set on using a doughnut shaped magnet. It is also possible to dispense the power to the lock either by removing or adding current, although nigh Access Control systems incorporate battery redundancy systems and the locks are nearly always located on the secure side of the door.

Admission cards themselves have proven vulnerable to sophisticated attacks. Enterprising hackers have congenital portable readers that capture the card number from a user's proximity menu. The hacker simply walks by the user, reads the card, and then presents the number to a reader securing the door. This is possible considering bill of fare numbers are sent in the articulate, no encryption being used. To counter this, dual authentication methods, such equally a card plus a Pin can be be used.

Many access command credentials unique series numbers are programmed in sequential social club during manufacturing. Known every bit a sequential assail, if an intruder has a credential once used in the system they can simply increment or decrement the serial number until they find a credential that is currently authorized in the system. Ordering credentials with random unique serial numbers is recommended to counter this threat.

Finally, about electric locking hardware even so have mechanical keys as a fail-over. Mechanical key locks are vulnerable to bumping.

Render to Summit


Q-14: Is it easy to programme and configure door access control software?

Cobra Controls offers access command security software based on the .Net infrastructure to manage 4 door, ii door, and 1 door TCP/IP ready network access control panels. Unlimited number of controllers, unlimited number of doors, and more 60,000 users tin can be added to the database. Cobra Controls .NET security software is extremely flexible, like shooting fish in a barrel to configure, and best of all free of charge when purchasing ACP systems. Cobra Controls .Cyberspace based software is the key to unleashing the ACP series wide range of powerful features while maintaining stability and long term performance. All Cobra Controls products come with a 2 year warranty. Nosotros use the industry standard 26-bit Wiegand communication format for all of our panels and readers making our system completely Not proprietary. Visit our Cobra Controls Video Library folio for more details.

Render to Top


Q-15: What is the registration process for new Cobra Software?

To annals your Cobra Controls software, you will demand the [a] controller serial number and the [b] controller version. Both tin be located inside your Cobra Controls panel box;

  1. Serial Number: the controller lath contains a sticker with the label S/N# (Serial Number). The serial number can besides exist establish in the software in the 'controllers' section and the serial number is also provided on the original purchase invoice.
  2. Version: the controller version can besides be found inside the Cobra Controls panel, on the inside of the panel door. The version will be 'ACP-N' or 'ACP-T'. The controller version is also highlighted on the original purchase invoice.
  3. Registration: please visit Cobra Controls Software Product Registration to admission the software registration page.

Return to Top


Q-sixteen: Where can I find the Cobra Controls controller series number?

The Cobra Controls controller serial number is located in 3 places [1] within your Cobra Controls panel box - The controller board volition accept a sticker on the forepart labeled "S/N#" likewise, [two] in the software - Under the "Controllers" section. In addition, [three] the serial number should be listed on your original purchase Invoice (depending on identify of purchase).

Return to Top


Q-17: How exercise I determine the Cobra Controls controller version?

The Cobra Controls controller version can be located on the inside door of your Cobra Controls panel box - A label will display ACP-N or ACP-T. Also, the version should be listed on your original purchase Invoice (depending on identify of buy).

Render to Top


Q-18: IP-Rating certification - what do the letters and numbers correspond?

IP ratings are made upwardly of four characters. Five in some very rare cases, but you're unlikely to ever encounter those referring to a locking device. The get-go two characters, I and P, stand for Ingress Protection or how good information technology is the device at stopping grit and water from getting inside it. The third digit is the number that specifically indicates the devices rating for grit protection. Protecting against small solids (dust/sand for instance), with a maximum rating of 6. This ranges from no protection at all confronting dust or clay inbound the device to 6 indicating resistant to dust inbound the device. The last digit is the liquid or water resistance rating, with a max rating of 8. if a device is listed as IP68, yous know it offers the highest IP rating for both grit and water resistance. Based on the IP-rating certification.

What does IP67 mean? there is a large number of combinations when it comes to IP ratings. IP67 devices, for case, have the same grit resistance as an IP68-rated. However, the '7' indicates the device has been tested to survive being submerged up to 1 metre deep in water. Whatsoever more than that and the water could button through any protection in to the internal components of the device. When information technology comes to solids, the devices take been tested against dust and found to be dust tight. Anything with a "6" as the third character is as impervious to grit as can be tested and certified on this particular scale.

Return to Elevation


Q-19: What does intrinsic Safety or Explosion-proof mean?

Intrinsic safety (IS) is a protection technique for safety operation of electrical equipment in hazardous areas past limiting the free energy, electrical and thermal, bachelor for ignition. In signal and control circuits that can operate with low currents and voltages, the intrinsic safety approach simplifies circuits and reduces installation toll over other protection methods. Areas with dangerous concentrations of flammable gases or dust are establish in applications such as petrochemical refineries and mines. As a discipline, it is an awarding of inherent safety in instrumentation. Note: Loftier-power circuits such as electric motors or lighting cannot use intrinsic safety methods for protection.

Return to Top


Q-xx: What web browsers are supported by maglocks?

We take carefully designed maglocks to work with most web browsers. We recommend that y'all always use the electric current version of browsers to make sure that our web pages brandish quickly, and that you lot accept the latest security updates. If you use older browsers, you might notice that some functions and features end working or work somewhat erratically as we make upgrades to maglocks. For more than details, visit our recommended and supported browsers compatability page.

Return to Top


Q-21: What is RFID (Radio Frequency Identification)?

RFID is an acronym for Radio Frequency Identification. The term RFID is used to describe all techniques that employ radio waves to place something. Unremarkably RFID systems consist of the following components:

RFID

  • A reader, that is continued to (or integrated with),
  • An antenna, that sends out a radio signal,
  • A tag (or transponder) that returns the indicate with data added.

The communication can be 1-fashion (only the tag that sends data to the reader), or information technology tin can be bidirectional. But the bones principle is e'er used to identify a tag (or transponder). The tag is carried past a person, an animal or an object and ordinarily contains a number (in a certain format). RFID readers and antennas are sometimes integrated and sometimes more than one antenna is continued to one reader. The antenna is the office that actually transmits and receives the radio signal. The reader is the part that deals with the generation of the signal, the modulation, the conversion of data, etc. For more details, visit Buyer Guide: Understanding RFID Access Tags and Readers.

Return to Top


Q-22: What are Poles and Throws (SPDT and DPDT)?

Almost electronic circuits contain an on/off switch. In addition to the on/off switch, many circuits comprise switches that control how the circuit works or actuate different features of the excursion. One way to classify switches is past the connections they make and two important factors that decide what types of connections a switch makes are;

  • Pole: - switch pole refers to the number of separate circuits that the switch controls:
    • Unmarried-pole switch controls just one circuit.
    • Double-pole switch controls two separate circuits. A double-pole switch is like two carve up single-pole switches that are mechanically operated by the aforementioned lever, knob, or push button.
  • Throw: - the number of throws indicates how many different output connections each switch pole can connect its input to. The two most common types are single-throw and double-throw:
    • Unmarried-throw switch is a elementary on/off switch that connects or disconnects two terminals. When the switch is closed, the ii terminals are connected and current flows between them. When the switch is opened, the terminals are non continued, and then current does non flow.
    • Double-throw switch connects an input terminal to one of 2 output terminals. Thus, a double-pole switch has three terminals. 1 of the terminals is called the mutual terminal. The other two terminals are oftentimes referred to as A and B.

When the switch is in one position, the mutual terminal is continued to the A terminal, so current flows from the common terminal to the A terminal but no current flows to the B last. When the switch is moved to its other position, the final connections are reversed: current flows from the common terminal to the B final, merely no current flows though the A concluding.

Single and Double Throw Circuit

Switches vary in both the number of poles and the number of throws. Most switches have one or two poles and one or 2 throws. This leads to 4 common combinations:

  • SPST (single pole, single throw): - a basic on/off switch that turns a single circuit on or off. An SPST switch has two terminals: one for the input and one for the output.
  • SPDT (unmarried pole, double throw): - a SPDT switch routes one input circuit to i of 2 output circuits. This type of switch is sometimes called an A/B switch because information technology lets you choose betwixt 2 circuits, chosen A and B. A SPDT switch has three terminals: 1 for the input and two for the A and B outputs.
  • DPST (double pole, unmarried throw): - a DPST switch turns ii circuits on or off. A DPST switch has iv terminals: two inputs and two outputs.
  • DPDT (double pole, double throw): - a DPDT switch routes 2 separate circuits, connecting each of ii inputs to ane of two outputs. A DPDT switch has six terminals: two for the inputs, two for the A outputs, and two for the B outputs.

Render to Peak


Q-23: Which power source; 12-voltage or 24-voltage?

Power sources can be AC (alternating current) or DC (direct current). In the context of electrified hardware, AC power is intended for intermittent duty (like momentary unlocking for an apartment master entry) while DC power is used for continuous duty (like an access control organization for an function building'southward main entry doors.) Most applications in today'south access command systems are DC supply. However, information technology is important to consider if the device requires a 12-voltage or 24-voltage power source. Depending on the manufacturer and model, they tin can be:

  • 12-volt only
  • 24-volt only
  • 12-volt OR 24-volt
  • 12-volt TO 24-volt

For example. An electric strike can draw power from either a 12-volt or a 24-volt ability source. It draws current equal to 0.50 amps at 12-volt, but but 0.25 amps at 24-volt. These numbers betoken a requirement of about half an amp at 12-volt but just one-quarter of an amp at 24-volt. If you outset adding multiple devices and are able to run them all on 24-volt, you can run more devices off of a power supply that supplies 24-volt than i that supplies 12-volt.

For example; If we want to run 2 electric strikes off of a 1-amp ability supply; Running the strikes at 12-volt, would use i.00 amps [0.l amps x ii strikes = 1.00 amps at 12-volt] – 100% of the i-amp power supply would be consumed *. Notwithstanding, if you run the two strikes at 24-volt, you would simply be using 0.l amps [0.25 amps x 2 strikes = 0.50 amps at 24-volt], which would let you to add a third strike, if desired.

* Please annotation that it is not recommended to exceed 75-lxxx% of the total current of the power supply; then in this example, you are limited to one strike using a ane-amp power supply at 12-volts and three strikes using a 1-amp power supply at 24-volts.

Render to Top


Q-24: What is a 626 or US26D hardware finish code?

In the Usa in that location are two finish code systems: BHMA finish codes (Builders Hardware Manufacturers Association) and U.S. finish codes, created past ANSI (American National Standards Found). In general, U.S. finishes depict only the color whereas BHMA finish codes describe both color and base material.

Architectural Hardware Finish Designations and Descriptions

The most notable exceptions to this rule are US32, polished (bright) stainless steel, and US32D, satin stainless steel. These U.S. finishes describe both the end and the base material. The respective BHMA terminate codes would be 629 for polished stainless and 630 for satin. BHMA finish codes are different for unlike base metals. For case, BHMA 626 is satin chrome plated brass whereas BHMA 652 is satin chrome plated steel.

  • Polished (or "bright") finish - is a finish that has been buffed until it reflects like a mirror. You tin run across your reflection in a polished finish.
  • Satin Finish - the opposite of a polished finish is a satin finish. Y'all cannot see your reflection in a piece of hardware with a satin finish.
  • Antique Finish - is a finish that is similiar to Satin with black accents to appear aged when first installed.
  • Living finish - is a terminate that has been designed to age naturally over time, such as US10B, oil rubbed statuary. Private hardware items with living finishes volition age differently over time depending on use and slight differences in how the finish was practical at the manufactory.

For more than details, visit Buyer Guide: Hardware terminate Descriptions and Color Codes.

Render to Top


Q-25: Should I shed my hotel card key after I check-out?

A client called recently to ask if hotel central cards are encoded with personal or fiscal (credit card) data, and and then should exist they take home and shred the hotel menu key subsequently they cheque-out. We idea that would exist a good opening to offer a description of how hotel locking systems work.

The quick answer is in that location is no personal or fiscal information encoded into the hotel card cardinal. The encoding process is but used to provide access to pre-assigned areas (for case, your hotel room, workout room, edifice entrance). It is also important to understand, the card cardinal encoding machines are not connected to the hotel's computer system, the encoding systems are stand-alone platforms specific to encoding door access control and then at that place is no direct interface to transfer a client's personal or financial information (for case, credit card number) onto or into the card central.

The hotel card key contains the following; The carte du jour fundamental has encoding into its magnetic stripe or smart chip or RFID bit a rotating code and a serial code of some sort to distinguish one fundamental from another (i.e. 2 master keys will have the aforementioned key code simply unlike serial codes.) When you check in, the hotel employee inserts the card central into an encoding machine that records onto it the next sequential code for the lock on your room. The sequence advances when an expired card is swiped or a new card inserted. When yous first enter your room the lock recognizes that the adjacent sequential lawmaking is being used and invalidates the previous fundamental. If you lot obtain a second key subsequently for someone else, it often messes up your cardinal. In this example, the hotel employee may have encoded a new fundamental rather than a duplicate. The sequence modify means that the previous guest (in this case you) can no longer go into the room.

Hotel locking systems are extremely secure systems. If a chief key goes missing, it's a relatively trivial procedure to rekey the unabridged hotel. Hotel locks are not wired into any system, they take batteries in them. They have several key sequences programmed into them, invitee key, maids key, supervisors key, master key, emergency key. The emergency key is unique in that it will release the deadbolt, necessary in a burn down or medical emergency. The lock besides has a memory that remembers the time, appointment and key code for every entry. In the event of a problem the security staff just needs to read and print the log to see who entered the room at what time.

Return to Acme


Q-26: Does maglocks maintain a Sustainability Policy?

It is in the best interests of our company and society equally a whole that our company promotes and progresses along a articulate, goal oriented path to sustainability. To that end we will strive to attain a vision of operation based on our four pillars of responsibility and commitment.

  1. Economic success: the wise use of our financial resources
  2. Social responsibility: respect for all people
  3. Environmental responsibleness: respect for life and the wise management and use of natural resources
  4. Business organisation responsibility: set articulate goals and objectives and track our progress towards those goals

For more details, visit our Sustainability Policy and Business organisation Commitment.

Render to Elevation


Q-27: Is the maglocks website accessible to people with disabilities?

We are striving to ensure this website is open and accessible to everyone. Our website is designed to comply with the U.Southward. Admission Board'southward January 2017 update of the Section 508 Standards and Section 255 Guidelines for Information and Communication Technology [Section 508 of the Rehabilitation Act of 1973 and Section 255 of the Communications Act of 1934, equally amended].

The U.Southward. Access Lath updated the 508 Standards and 255 Guidelines jointly to ensure consistency in accessibility across the spectrum of data and communication technologies (ICT) covered.

If you use assistive technology (such as a screen reader, eye tracking device, voice recognition software, etc.) and have difficulty accessing information on the maglocks website, contact us for assistance.

The Jan 2017 refresh for the 508 standard and the 255 Guidelines included the post-obit amendments;

  • Enhancing accessibility to ICT for people with disabilities:
  • Making the requirements easier to empathize and follow;
  • Updating the requirements and then that they stay abreast of the ever changing nature of the technologies covered:
  • Harmonizing the requirements with other standards in the U.Due south. and away.

For more than details, visit United States Access Board.

Render to Top


Q-28: Do yous offer programs for Distributors (Dealers) and Installers?

Cobra Controls Authorized Dealer Program is a comprehensive initiative, designed to help our dealer/integrator partners abound their business. Our array of dealer programs are perfect for the pocket-sized, mid-level and big integrator, offering discounted prices, Free technical back up, everyman cost guaranteed, full 12-month repair and replacement warranty, no restocking fees, online account specific pricing and much more. If you are installing and/or reselling Cobra Control products, then Cobra Controls has a program for you! To use, please refer to the programme construction Cobra Controls Authorized Dealer Program and complete the cursory Dealer First registration form. Available in either of two formats (a) Adobe PDF or (b) Microsoft Word.

Fax the completed Dealer registration form to 1.518.843.3399 along with a copy of your tax resale card, contractor license or business organisation license. You can likewise adhere the information to an email and send it to: . Please allow iv business days for processing and you will receive a confirmation email and welcome package.

Features and benefits differ by programme. For more data, Please refer to the program structure Cobra Controls Authorized Dealer Program.

Return to Top


Source: https://www.maglocks.com/help-center.html

Posted by: leealwaskess.blogspot.com

0 Response to "Do Mag Locks Need To Register"

Post a Comment

Iklan Atas Artikel

Iklan Tengah Artikel 1

Iklan Tengah Artikel 2

Iklan Bawah Artikel