CENTURION Mini Product Catalogue

Showing posts with label centurion access control. Show all posts
Showing posts with label centurion access control. Show all posts

Thursday, 2 August 2012

Securing the Masses: An Exploration of Modern Access Control

With the London Olympics now in full swing, the eyes of the world are once again fixed on the safety of the masses. It is this knowledge that has led us to ask the following pressing questions:
What new developments have been made in the world of security? What bold innovations are being implemented in a field that warrants such aggressive attention and constant evolution, and what trends are leading the way in terms of technology, usability, expandability and functionality?

After all, as the great thinker and innovator da Vinci famously said: “Iron rusts from disuse; water loses its purity from stagnation...even so does inaction sap the vigour of the mind”.

This is an utterly apropos statement considering that security, when employed to its full potential, should be a mercurial force that is able to adapt to the times. Security as concept should be a shape-shifter, rearranging its various elements and changing its guise to best suit the socio-economic climate.

Think about it.

Five hundred years ago the biggest threat was that your castle would be attacked by the neighbouring kingdom (that is, of course, assuming that you were a member of nobility) and the need arose for some means of fortification. While weapons such as trebuchets and catapults could pack quite a wallop even from a distance, particular attention was given to securing the entrances and thus drawbridges, portcullises and barbicans became the norm.

Today, intruders do not announce themselves with trumpets, war drums and battle cries – indeed, you only become aware that they have paid you an unsolicited visit once you arrive home to find your belongings gone. The modern criminal has undoubtedly become wilier, more resourceful, and as such one would like to believe that security has similarly evolved to catch the proverbial curveballs these evildoers like to throw at us.

So what has been making waves in this arena?

The popularity of biometric authentication has certainly been on the increase, with futuristic-looking fingerprint readers gracing the entrances of many a high-security establishment. Indeed, in a marvellous display of forward thinking, certain banks have started implementing fingerprint identification in the entrance airlocks, requiring patrons to scan a thumb before being granted access. This is a brilliant innovation since it allows banks to have the fingerprints of those entering the premises on record should things go awry, effectively putting them one step ahead of criminals. The advent of biometrics is perhaps a sign that we are slowly transitioning out of an age in which we were separated from technology by virtue of biology, and into an era where our own DNA has become the access card. It was an inevitable – and necessary - change, and one which is lauded for its dependability and efficiency by those in the know. After all, DNA is something that – thus far, at least – is completely unique to the individual. What can be more secure than that?
CENTURION Biometric Readers

Perhaps not surprisingly given our hectic lifestyles and the ever-present “rat race”, modern security trends seem to favour mobility. People want to monitor and control what’s going on at home or at the office while they’re on the go. In this age of instant coffee and fast food, there is no time to stop and worry about security. Much like our favourite caffeinated beverage, security should be something that is instant.

Enter GSM technology.

Ever since mobile phones became a natural extension of our arms, industry players have been looking for ways in which to bring security to the cell-front. This breakthrough came with the advent of GSM-modules – intelligent devices that can be used for the activation of any number of electrical devices, and can also be configured to provide text message notifications when the unit’s inputs are activated. The security benefits of this innovation are phenomenal. As an example of this, imagine being able to arm the alarm of your house in Cape Town while you’re vacationing in Rome; or receiving a SMS notification that someone is tampering with your gate’s infrared safety beams. GSM technology has made this possible.
CEMTURION GSM Solutions
And what about the access automation front, you may ask, how have things progressed since the days of manned booths and punch cards?
If you are among those concerned that access automation has been stagnating for the last decade or so, you’ll be relieved to know that some remarkable advances have been made in this arena, with everything from integrated timer technology to pedestrian access control forming part of the list of available solutions.

But let’s take a moment to discuss the abovementioned timer technology, lest the importance and usefulness of it be ignored.
Imagine, if you will, that you are the owner of an engineering firm the employees of which have all been issued with remote controls. At first glance this seems like a convenient access solution that leaves very little room for error. However, this means that workers now have access to the premises not only during working hours, but whenever it suits them. As you can well imagine, this leaves the system vulnerable and open to abuse. Timer functionality, and the feature known as “time-barring” in particular, addresses this security concern by allowing the user to inhibit certain inputs during pre-configured time periods. In laymen’s terms what this means is that you can set up the system so that the remotes given to staff will only operate during working hours, and will be inhibited during weekends and after work.

The field of security is, at the very least, one that is brimming with possibility. As much as criminals would like to believe that they are in the lead, the hi-tech innovations discussed above as well as countless others not mentioned in this article seem to indicate the contrary. We are in the midst of an exciting transformation, a security renaissance as it were, that could see us enter a whole new age; one in which biology might just come into play as the ultimate access control device, as evidenced by the rising popularity of biometrics.

Tuesday, 24 April 2012

How To Assign Your CENTURION G-SWITCH To Your Profile

In retrospect, it almost seems that when the celebrated sci-fi author Isaac Asimov said “Any sufficiently advanced technology is indistinguishable from magic”, he had the G-SWITCH-22 in mind. 
This multi-faceted GSM-module took the world by storm when it was first introduced to an eager public in 2011, and it continues to impress by putting unsurpassed convenience quite literally at the user's fingertips.  Historically laborious tasks such as arming alarms or switching on pool pumps became, with the advent of the G-SWITCH-22, as easy as initiating a missed call from your mobile phone or land line, while the unit's dual inputs allow for the monitoring of any number of electrical devices.  We daresay the airwaves will never be the same!

CENTURION has always had a reputation for taking the very concepts of security and convenience to the next level and, for exactly that reason, the G-WEB interface was created; using the might of the Internet to make the adding, editing and deleting of users and modules even simpler than before.  G-WEB is password-protected and allows for the uploading of detailed transaction logs for improved security.
What follows below is a brief tutorial on how to load G-SWITCH modules to your profile as well as how to add users to a module using G-WEB.

1.       Register

Before you can assign a G-SWITCH module to your profile, you need to register on the Centurion Systems website www.centsys.co.za.

To do this, simply navigate your browser to our Home Page, and click on the Log in tab at the far right of the screen.  A dropdown menu will then appear prompting you to either register or log in.  Select Register here and fill in all the required fields. 

Centurion Systems Home Page

Once you have completed this simple registration process, your profile will be registered on our website.

2.       Log onto G-WEB
After registering, you can immediately log onto the G-WEB interface which will take you to the Members Home screen pictured below. 

Centurion Systems Members Home

3.       Access the online user interface
On the Members Home screen, three options will be displayed.  Click on the second option, which will be access the online user interface.  This action will take you to the G-SWITCH main screen.  A grey field will be displayed with the text “No modules associated with this user”.

CENTURION G-SWITCH Main Page

4.       Enter the G-SWITCH and IMEI numbers
Fill in the required fields for the G-SWITCH mobile number as well as the unique IMEI number of the unit.  The mobile number will be the number of the SIM card presently inserted in the G-SWITCH module, while the IMEI number is generally displayed on a sticker found on the onboard GSM module (which will be silver in colour).  If you don’t know the IMEI number offhand, simply send the command string p.xxxx.co.imei (where xxxx is the G-SWITCH password) to the module using a standard text message. 

Click on the Next button.

USEFUL TIP:  Remember to enter the G-SWITCH mobile number in the international format!

5.       Select your mobile operator
You will now be asked whether the correct mobile operator (for e.g. Cell C or Vodacom) has been detected.  If it has, select Yes.  If not, click on No and select the applicable country and mobile operator using the dropdown menu provided.

6.       Finish
A text-box will appear prompting you to either finish assigning the module or to first update changes.  If you haven’t made any additional changes, click on the Finish button.

The website now needs to synchronise with the module using Over-the-Air protocol.  If the connection is successful, the module will appear in a grey block towards the top of the screen.  If the website fails to connect, refer to the troubleshooting guide at the end of this tutorial.

Bonus
Did you know...?

You can purchase G-WEB SMS bundles from any of our branches!  The website uses these SMSs to synchronise with associated G-SWITCH modules, and we give you 10 free SMSs for every module that you assign to your profile.  But, should you ever run out, simply drop in to your nearest CENTURION branch and pick up a bundle voucher.  They are cost-effective and we will even load them for you! 

You can also use the airtime on the G-SWITCH module's SIM card for synchronisation - just SMS the word "connect" to the module from any mobile phone and voila!, you're back in business.
Diagnostics

Symptom
Error message
Possible cause
Solution
Unable to assign a module
The G-Switch has not responded in 90 seconds
·         Incorrect mobile number  or IMEI number has been entered
·         The module is not powered up
·         The module has poor signal strength

·         Ensure that the correct mobile number has been entered in the international format, as well as the correct IMEI number.  The IMEI number can be requested by sending the command string p.xxxx.co.IMEI to the module
·         Check that the module has power
·         Check the signal strength of the module by referring to the signal strength LEDs or sending the command string p.xxxx.co.ss to the module

Please enter a valid cell phone number in international format
·         A valid cellphone number has not been entered, or the number entered does not follow the international format
·         Ensure that the number entered is a valid mobile number, and that it follows the international format, i.e. the country code followed by the number and dropping any leading zeros.  NOTE: The + sign normally preceding the number is not used in this instance

Please enter a valid IMEI number
·         A valid IMEI number has not been entered
·         Enter a valid 15-digit IMEI number
Unable to synchronise
G-Switch has not responded
·         Module is not powered up
·         Poor signal strength
·         Ensure that the G-SWITCH-22 module has power
·         Check that the module has sufficient signal strength

Friday, 23 March 2012

The Changing Face of Access Control

There’s no denying the fact that access control has come a long way since the days of punch cards and other, similarly archaic systems.  Like most things in this modern age, the trend in access control seems to lean towards the sleek and the compact, while still offering superior security, usability and functionality.   Modern access control systems also need to be multi-faceted, providing an all-encompassing topology that can be shaped to suit the unique requirements of different sites.

However, security should still be at the core of an efficient access control infrastructure as this is an area where technology can truly be used to create a formidable barrier and can almost be viewed as a safety net, protecting people, information and assets.  There have been remarkable advances in this ever-expanding field, with everything from network integration to data logging forming part of a very exciting microcosm the potential of which has yet to be fully exploited.
In recent years, keypad access control has taken the world of security by storm – the obvious benefit being that authorised entrants don’t have to carry anything with them that could potentially be lost or stolen – all the information they need to gain access is stored safely in their heads.  Some keypads, such as the CENTURION SMARTGUARD and its wireless sibling, the SMARTGUARDair, can be interfaced with a host of peripheral devices such as gate motors, electric locks and alarm panels for a fully comprehensive access control system.  Furthermore, introducing facilities such as free-exit and panic pushbuttons to keypad access control systems further enhances the overall security of the installation.

While keypad access control is undeniably powerful, there is still much to be said for proximity readers; especially when it comes to functionality and expandability.  The CENTURION Lattice proximity access system, for instance, can start out as a single reader and be seamlessly expanded to a networked system consisting of up to 32 readers.  In addition, the system can be interfaced with a PC via a simple RS-458 connection and, using the unique LatticeWARE software, the user can upload transaction logs, selectively add and delete users as well as edit all functionality associated with particular readers.  This is one system that still packs a very powerful punch when it comes to expandable, user-friendly and fully comprehensive access control.

SMARTGUARD, SMARTGUARDair and Lattice are all available from Centurion Systems and leading security outlets.