Product Description
Plastic Injection Part Products Characteristic:
1. Well Shape Keeping
2. Deburr, Sharp Edge and Flash
3. Precision Tolerance Control
4. Nice Surface Treatment
5. Colorful Choice
Why Us:
We have a fully-equipped workshop that meets ISO 9001:2015 and IATF 16949:2016 requirements. All products are compliant
with FDA, WRAS, UL, RoHS and REACH standards, and meet DIN, JIS and ASTM regulations. Material report and dimension
checking report are available.
1. Quality Approvals. More than 15 years professional manufacture experience.
2. Experienced Staff and Service. Professional R&D team, production team, sales team, after-sales service team.
3. Product Performance and affordable cost. Superior performance with most competitive price.
4. Prompt Delivery. Faster delivery time.
5. Small Orders Accepted.
Material | ABS,ASA,PP,PA,PC,PE,POM,PMMA,HDPE,TPE,TPU, PVC,PBT etc |
Material Report | FDA, ROHS, UL, WRAS and REACH |
Dimension | Standard Sizes or As per customers’ Requirement |
Certifications | ISO9001,IATF16949,ISO14001 |
Color | Any colors according to PANTONE or RAL |
Surface Finish | Texture (VDI/MT standard, or made to client’s sample), polished (high polish, mirror polish), smooth, painting, powder coating, printing, electroplating etc. |
Service | Custom Made or OEM and ODM |
Free Samples | Okay |
Production Ways | CAD Drawing, 3D Files or Samples |
Production Capacity | 200T,300T and 500T Compressing Molding, Injection Molding, Auto Vacuum Vulcanizing, Plastic Injection, and Extrusion |
Supplying Capacity | One Million Pieces/ Month |
Tolerance | Generally±0.05mm or Better |
QC | PPAP, In House Control, Third Party Inspection Institution such SGS, TUV |
Lead Time | 15 Days for Molding, 15-20 Days for Series Production |
Application | Industry Machinery,Automotive,Mechanical Equipment, Construction, House Application, Medical Machine |
More Parts |
Grommet, sleeve, feet, gasket, wheel, bellow, cap, dust cover, pad, washer, Strip, plug, stopper, grip, seal, bushing, bumper, blocks, and anti vibration mounts etc. |
FAQ
1. What types of rubber do you use?
Xihu (West Lake) Dis. Rubber has extensive experience in a vast range of rubber, including: Natural Rubber, SBR, CR, NBR, HNBR,
EPDM, Silicone Rubber, FPM, ACM, FK etc.
2. What types of plastic do you use?
Xihu (West Lake) Dis. Rubber has extensive experience in a vast range of plastics, including: ABS, Polypropylene (PP), PVC, POM,
PE, PEEK, Polyamide (PA) Nylons, PBT, etc.
3. What services do you provide?
We offer a broad range of services, including, Custom Rubber Molding, Liquid Injection Molding, Rubber Extrusion, and
Rubber/Plastic to Metal Bonded Parts.
4. Why us?
4.1 More than 15 years professional manufacture experience.
4.2 Professional R&D team, production team, sales team, after-sales service team.
4.3 Superior performance with most competitive price.
4.4 Faster delivery time.
5. Perfect quality control process
5.1 Raw material inspection
All raw materials before warehousing must be tested, and the corresponding physical property report shall be issued,
and compared with the physical property report of raw materials. Only when the test values of the 2 physical property
reports are consistent, can they be warehoused.
5.2 Mold inspection
After mold development or cleaning, we will check the full size of the mold to ensure that the quality of each cavity is
the same.
5.3 Product inspection
In the process of product production, inspectors regularly inspect the semi-finished products to ensure the rationality
of the process and control the defective rate within a reasonable range.
5.4 Finished product inspection
The double inspection can ensure that the product appearance and size are 100% qualified.
Material: | ABS |
---|---|
Application: | Medical, Household, Electronics, Automotive, Agricultural |
Certification: | TS16949, RoHS, ISO, Reach |
Samples: |
US$ 0.05/Piece
1 Piece(Min.Order) | Order Sample |
---|
Customization: |
Available
|
|
---|
.shipping-cost-tm .tm-status-off{background: none;padding:0;color: #1470cc}
Shipping Cost:
Estimated freight per unit. |
about shipping cost and estimated delivery time. |
---|
Payment Method: |
|
---|---|
Initial Payment Full Payment |
Currency: | US$ |
---|
Return&refunds: | You can apply for a refund up to 30 days after receipt of the products. |
---|
How do power locks integrate with access control systems and electronic security solutions?
Power locks seamlessly integrate with access control systems and electronic security solutions to create comprehensive and efficient security solutions. The integration between power locks and access control systems allows for advanced access management, monitoring, and automation. Here are some key ways in which power locks integrate with access control systems and electronic security solutions:
- Authentication Method Integration: Power locks can integrate with various authentication methods used in access control systems, such as key cards, key fobs, PIN codes, biometric scanners (fingerprint, iris, or facial recognition), or mobile credentials. The power locks receive signals from the authentication device, verifying the user’s identity before granting access.
- Centralized Access Control Management: Power locks are typically connected to a centralized access control management system. This system allows administrators to define access policies, configure user permissions, and manage access rights across multiple power locks and doors from a single interface. It provides a centralized view of access events and enables efficient administration and monitoring of access control activities.
- Lock/Unlock Commands: Access control systems can send lock or unlock commands to power locks based on authorized access events. When a user presents a valid credential or passes an authentication check, the access control system triggers the power lock to either lock or unlock the secured area, allowing or denying entry accordingly.
- Real-Time Monitoring and Logging: Power locks integrated with access control systems provide real-time monitoring and logging of access events. Each access attempt, whether successful or unsuccessful, is recorded in an audit log, including information such as the user’s identity, the time of access, and the lock status. This data helps in auditing, investigations, and maintaining a detailed access history.
- Alarm Integration: Power locks can be integrated with alarm systems and intrusion detection sensors. When an unauthorized access attempt is detected or a security breach occurs, the access control system can trigger an alarm, notifying security personnel or initiating response protocols. The power lock can also be programmed to respond to alarm signals by automatically locking or unlocking specific areas as required.
- Video Surveillance Integration: Power locks can be integrated with video surveillance systems, enabling synchronized video recording and monitoring of access events. When an access event occurs, the access control system can trigger nearby surveillance cameras to capture video footage of the corresponding area, providing additional visual evidence and enhancing security monitoring capabilities.
- Integration with Security Management Platforms: Power locks can integrate with comprehensive security management platforms that oversee multiple security systems, including access control, video surveillance, alarm systems, and more. These platforms provide a unified view of all security-related activities, allowing for centralized management, reporting, and coordination of security measures.
- Automation and Scheduled Locking: Power locks integrated with access control systems can be programmed for automation and scheduled locking/unlocking. For example, power locks can automatically lock at certain times of the day or after a specific period of inactivity. This automation reduces the reliance on manual lock and unlock procedures, enhancing security and operational efficiency.
The integration of power locks with access control systems and electronic security solutions maximizes the effectiveness and efficiency of security measures. It enables seamless access management, real-time monitoring, and centralized control, providing organizations with a comprehensive security solution to protect their assets and ensure the safety of individuals.
editor by CX 2023-12-01