CENTURION Mini Product Catalogue

Thursday 23 February 2012

Remote Controls: A Genesis

There is a popular (though probably misquoted) saying that declares that nature – and, by extension, humanity - should either “adapt or die”.  Although this axiom was probably not intended to be taken literally, it does hold a certain amount of truth when it comes to security.  As technology has advanced to become more sophisticated, more futuristic, so also has crime.  It’s almost as if criminals are using the very technology that we developed to keep them at bay, against us.  There’s been a definite evolutionary trend in crime. 

The good news is that we’re still ahead.  This blog post will look at how that staple of access automation – the remote control – has evolved to combat crime and how we are still on the winning side.

Dipswitch Days

Back when the world was young, dipswitch technology ruled with an iron fist.  Dipswitch-based devices were easy to use and configure and could be employed for a plethora of applications.  All that the user needed to do in order to synchronise a remote with a receiver was to set the little plastic switches in the same configuration on both devices and – hey presto! – the remote was programmed.

Now, it doesn’t take a great stretch of the imagination to see why this system might be considered vulnerable.  With the ease of setup and use came glaring security flaws which could not be ignored, and so fixed code remotes saw the light.

Fixed Codes:  The Next Generation

The advent of fixed code remotes dramatically increased the security of remote control systems.  There were no visible switches that a mildly determined criminal might copy - all the coding took place safely within the airwaves.  For a while, it truly seemed that this was a system that crooks could not circumvent.  Criminals being criminals, they eventually devised a means of “code grabbing” the transmissions and creating cloned remotes, thereby allowing them easy access into properties.

But once again, goodness prevailed and – in true comic book superhero style - a revolutionary new technology dealt the hoodlums of the world a crippling blow.

Rolling Code Technology:  The Final Frontier

Many of you reading this might be using CENTURION NOVA remotes and know them as the robust little blue and grey transmitters.  What you may not know is that NOVA employs an ultra-secure encryption technology known as rolling code, or Keeloq encryption.  This means that the code transmitted by the remote is always different to the previous one, with a possible 16 billion combinations.  In addition to this, it also passes through a sophisticated encryption engine which makes code-grabbing impossible.

So, dear citizens, rest easy knowing that – while we may not wear masks and capes like traditional superheroes – we’re still looking out for you.    

Wednesday 8 February 2012

Breaking Borders: CENTURION West Africa is Open for Business

Friday the 13th might be an ominous omen for some, but team CENTURION was undaunted as we valiantly opened the first branch beyond our borders in Lagos, Nigeria on Friday, the 13th of January 2012.
Known as CENTURIONWest Africa, the Lagos branch will be distributing to Nigeria and the surrounding countries as well as handling repairs and technical queries related to all CENTURION gate automation and access control equipment.  Under the leadership of the very able Mr Ademola Okulaja, CENTURION West Africa is bound to build upon the already formidable reputation of the Automatic Choice in access automation, Centurion Systems. 

The opening of CENTURION West Africa is just one of the ways in which we are breaking borders and bringing our range of ultra-reliable, secure and feature-rich products to Africa and the world.  Through product training, research and constant innovation, we will continue to break both literal and figurative borders.
The Lagos branch can be reached on +234 (1) 463 3115 or at Ademola.Okulaja@CenturionWestafrica.com.

Wednesday 1 February 2012

Beam Me Up, Scottie!

While all CENTURION gate motors are equipped with state of the art collision detection technology, fitting infrared safety beams dramatically increases the safety of the installation by preventing the gate from moving should a person, pet or vehicle be in its path.  The importance of co-installing beams cannot be stressed enough and, with safety and security ultimately being the purpose of gate automation, we thought we’d take a brief look at a technology that is perhaps not given enough attention.

How it works

The principle behind the working of infrared beams (CENTURION i5 beams in particular) is that a transmitter sends an infrared beam to a receiver, which opens a normally-closed relay whenever the beam is interrupted.  CENTURION operators have a normally-closed beam circuit, so when the relay is opened the circuit is incomplete and the gate cannot operate.

Benefits of fitting beams

Some of the benefits of fitting beams are:

·         Enhanced safety – protection against crushing, shearing and dragging

·         Added security – can be interfaced with D-Series range of gate operators for advanced intruder detection functionality to address security and anti-theft concerns

·         Reduced liability for installersinstallation that conforms to safety recommendations as advised by the manufacturer comply with the Consumer Protection Act (CPA).  Fitting beams helps to ensure maximum safety of the installation

·         Extremely cost-effective

·         Quick and easy to install

Installation

Beams are so simple to install that one cannot truly afford not to fit them.  Simply supply power to both the receiver and the transmitter, and connect the receiver’s normally-closed terminal to the beam input on your motor controller.  You may also have to fit a wire link between the common and negative terminals of the beam receiver.  It’s literally that easy!

Availability

CENTURION i5 infrared safety beams are available from Centurion Systems and all leading security outlets.