2. Access Control Systems
The Balancing Act
Access Control Defined
Key/Credential Management
Control Configuration
Software Features and Capabilities
Controller Hardware
Break
Peripheral Components
Access Controlled Door Hardware Types and Specifications
Trends and Convergence
Resources
AGENDA
3. How to get the most…
VERBAL COMMUNICATION
Approx 100% was what the speaker wanted to say
Approx 80% was said
Approx 60% was heard
Approx 40% was remembered after 3 hours
Approx 15% was remembered after 3 days
Approx 0-5% was remembered after 3 months
VERBAL + VISUAL COMMUNICATION
Approx 60% was remembered after 3 days
Approx 40-50% was remembered after 3 months
VERBAL + VISUAL + NOTES
Approx 80% was remembered after 3 days
Approx 60-70% was remembered after 3 months
HARVARD RESEARCH STUDY
4. How to get the most…
Why are we here?
Gain Knowledge.
Asking Questions.
5. The Balancing Act
• Security
• Balancing Openness and Public Safety
• Applying new technologies and lessons learned
• Improving the physical security of buildings
• Protecting people and assets while maintaining
a pleasant work environment.
• The challenge facing government officials,
realtors and corporate building owners.
6. Security….”The Absolutes”
• Our world is dangerous and will get more dangerous
• We take security for granted till something goes
wrong.
• Security is inconvenient- and expensive
• Paranoid or Prepared? Politics!
• Constant vigilance – Almost overwhelming!
• 100%, guaranteed security ?? No such thing !
• 100% security = 0% accessibility
• 100% security = 0% productivity
7. • Buildings must be functional,
comfortable, inspirational – SAFE
• You don’t design a building for security.
You secure the design of a building
• Rethinking Security – new meaning to
architects
Architects and Security
10. The WHO
• The person, or device, requesting access to an
area, or asset, we want to control.
• Authentication Methods
…something the person / device…
• HAS – Physical
• KNOWS – Knowledge of
• IS / ARE – Biometric
11. The WHERE / WHAT
• The place or process we want to allow authorized
persons to get to.
• Physical and Logical
• Controlled or Restricted area
• As it relates to both manual and electronic
access controls this is critical to our access
management plan
• Vending, gas dispensing, copier machine
usage, time and attendance, meal plans and
more
12. The WHEN
• The time period or interval when access is
granted or denied.
• Can be managed with both on line and off
line systems
• Also used for setting events and logic
statements for:
• Triggers
• Time Zones
• Timing responses to alarms
• Timing for routing of messages to other devices
15. • Knowing exactly who has keys
• Knowing areas of access of each key holder
• Knowing key blanks are not readily available
• Knowing keys cannot be copied without proper
authorization
• Having a policy on lost keys
• When issuing temporary use of keys, keeping record trail
Unauthorized key duplication remains the most
violated security policy and one of the largest
problem of facility managers
Ultimate Key Management
16. Key # 123
PLAIN
BOWS
D0 NOT
DUPLICATE
STAMPED
BOWS
Conventional
Keyways
A conventional keyway is one which the
manufacturer will sell to anyone, it may most
common, or the most used, or the "standard"
or it may be family of keyways
Yesterday’s Key Control
18. 1. Patented keyways
Utility patent gives manufacturer exclusive
manufacturing rights
Manufacturer control distribution
Patent good for 20 years
Imitation manufacturers cannot duplicate
Assures protection to facility / owner
Security Leg
Millings for
Keyway Blade
Security
Ledge
Blade
Today’s Key Management
19. 2A. Manufacturer Controls
Policy and procedures in place
Signature verification
Controlled access to product areas
Ship key blanks direct to end user
Has return key policy
Provides specially coined blanks
Policy
1. Verify all signatures
2.
3.
4
Today’s Key Management
20. 2B. Facility/Owner Controls
Policy and procedures in place supported by
upper management
Locksmith administrator on staff
Locked storage
Supervisor approval of new keys
Employee signs for key
Should have penalty attached
All keys numbered and logged into system
Procedure for keys to be returned
should have penalty attached
Additional procedures:
Cleaning crew
Outside contractors
ISSUE TO : Bill Jones
DATE ISSUED: 07-07-05
Request for New Key
DATE: 07-04-05
TO: Lock shop
NO. OF KEYS: 1
KEY NUMBER: 123
KEY SET: AB15
APPROVED BY: C T Smith
ISSUE TO: Bill Jones
RECEIVED BY: Bill Jones
By Lock Shop
ISSUE DATE: 07-07-05
ISSUED BY: CH
RETURNED DATE
Today’s Key Management
21. 3. Contracts and Agreements
Protects facility / owner
Protects distributor
Protects manufacturer
Summarizes responsibilities to all
parties
Provides guide lines
Eliminates misunderstanding
We agree
Today’s Key Management
22. 4. Audit Controls
Keep records – Use Software
Use manufacturers original blanks
Reduce master keying
Have employees carry more
than one key
Stamp keys with code
Utilize available forms
Use sealed key rings
AB15
123
1215
Today’s Key Management
Use a key cabinet; electronic or manual
25. The Credential
• Most visible component of the system
• Issued to personnel as “electronic keys”
• Several Card Technologies
• Badge Construction
• Degree of Security Required
• Durability
• Reader Environment
• Convenience and Price
• Performance
26. Card / I D Technology Types
• Barium Ferrite
• Bar Codes
• Magnetic Stripe
• Wiegand
• Proximity
• Smart Card
• Hybrid
27. Biometrics – Another Key
• Biometrics and the “Smart Card”
• Iris Scan
• Finger Print
• Facial Recognition
• Retinal Scan
• Voice Recognition
• Hand Geometry
• Others on the horizon
29. Access Controls more about the “key”
•The “Common Access Card”
•FIPS 201 / HSPD12
•Database sharing trends
•Communications options
•Encryption – DES, AES
•PINs
30. Homeland Security Presidential Directive/Hspd-12
Subject: Policy for a Common Identification Standard for Federal
Employees and Contractors
(1) Wide variations in the quality and security of forms of
identification used to gain access to secure Federal and other
facilities where there is potential for terrorist attacks need to be
eliminated. Therefore, it is the policy of the United States to enhance
security, increase Government efficiency, reduce identity fraud, and
protect personal privacy by establishing a mandatory, Government-
wide standard for secure and reliable forms of identification issued by
the Federal Government to its employees and contractors (including
contractor employees).
HSPD-12
34. Multi-User / Multi-Door Systems
• Instant Multiple Notification Options
• LAN Access
• Discretionary Reporting
• Mandatory Controls
35. IDENTITYIDENTITY
MANAGEMENTMANAGEMENT
DIGITAL VIDEODIGITAL VIDEO
SURVEILLANCE &SURVEILLANCE &
MANAGEMENTMANAGEMENT
INFORMATIONINFORMATION
SECURITYSECURITY
ASSETASSET
MANAGEMENTMANAGEMENT
VISITORVISITOR
MANAGEMENTMANAGEMENT
ACCESSACCESS
CONTROLCONTROL
INTRUSIONINTRUSION
DETECTIONDETECTION
FIRE ALARMFIRE ALARM
SYSTEMSSYSTEMS
WIRELESSWIRELESS
ACCESSACCESS
MULTI-TENANTMULTI-TENANT
PROPERTYPROPERTY
MANAGEMENTMANAGEMENT
INTEGRATEDINTEGRATED
ALARMALARM
MANAGEMENTMANAGEMENT
BUILDINGBUILDING
AUTOMATIONAUTOMATION
INTERCOMINTERCOM
COMMUNICATIONCOMMUNICATION
SYSTEMSSYSTEMS
Enterprise Systems
36. Smart CardsSmart Cards
IncidentIncident
ReportingReporting
Time andTime and
AttendanceAttendance
ERPERP
CriminalCriminal
HistoryHistory
PayrollPayroll
SocialSocial
SecuritySecurity
ActiveActive
Directory/LDAPDirectory/LDAP
AccessAccess
ControlControl
HumanHuman
ResourcesResources
MedicalMedical
InformationInformation
VisitorVisitor
ManagementManagement
BiometricBiometric
TemplatesTemplates
CredentialCredential
ManagementManagement
Bringing together
disparate databases
or information
sources
Enterprise Systems
37. System Architecture
Field Panel Door Controller
Direct Connect
RS-232 or RS-422 RS-422
CCTV System
Access Control
Life Safety
ManagementPhoto Imaging
Visitor
Management
Ethernet Network
LAN/WAN
RS-232
Field Panel
Cellular
POTS
Field Panel Field Panel
HVAC
RS-232
Readers
Field Panel
Modem
Dial-up Modem
38. SOFTWARE
• Integrated solutions sets
• Network ready
• SQL and Oracle
• Linux based embedded solutions
• Partition-able database
• Windows XP, NT, 2000, Vista Compatibility
• Web enabled
• Web Embedded
39. The Application Software
• This is the GUI- It should be intuitive easy to train
operators and managers
• The database manager
• Ability to partition and filter views based on passwords
• Import and export features
• Potential interface to HR database systems
• May be Standalone or
• Part of a network
• Numerous work stations
• Redundant emergency backup
• Full set of utilities for storage and archiving
40. Desired Software Features
• Migration path (scalability)
• Alarm Monitor capacity
• Anti-Pass back
• Event Triggers
• Time zones and Holidays
• Clearance (area) controls
• CCTV Matrix Switching
• Digital Video recorder event linking
41. Desired Software Features
•No limit on system scalability.
• Unlimited Card Readers.
• Unlimited Inputs/Outputs.
• Unlimited Cardholders.
• Unlimited Control Panels.
• Unlimited Holidays.
•Guard Tour application
•Elevator Control
•Full featured Badging
•Real time status monitoring
•Multiple reader technology
support
•Microsoft database
•Report Manager
•Visitor Management
•ODBC and MDAC Compliant
•Potential web access/enabled
50. Integrated Applications
• Photo I D Creation
• Bio-metric enrollment
• Alarm management
• Access Management
• Air Quality monitoring
• Visitor Controls
• Digital Video event linking
• Event and data base linking
• Camera Controls
• Virtual CCTV Matrixes
• CCTV Analytics
• Smartcard Application Support
51. Access Control Panel Operation
• Card is presented data sent to Panel
• Panel compares information
• Grants/Denies access
• Based on Card Status
• Time of Day
• Cardholder’s access privileges
• Other Administrator selected features
52. Access Control Panels
• Contain Microprocessors
• On-board Random Access Memory (RAM)
• Upgradeable Software stored in Erasable Program Read
Only Memory (EPROM)
• System Administrator or authorized web client
enters all information related to system at host
computer or direct to board via web with on
board software in panel
• Information may be downloaded to Access
Control Panel’s RAM
53. Access Control Panels
• Once downloaded/programmed a Panel
can process information locally.
• “Intelligent” panels inform the Host of all
actions taken, including time and date
• Often referred to as “distributed processing”
• Saves Host processing time
54. Access Control Panel Operations
• May be configured many ways
• Can store thousands & some users are requiring
Millions of records!
• Multiple access levels
• Time Zones
• Thousands of historical transactions
• Quantum leaps in storage abound
55. Access Control Panel Operations
• Can support Inputs
• Can detect an input’s change of state, process the
information and report it to the host computer/ or web based
client on alarm
• Typical Inputs include door monitor and request to exit (or
bypass) devices
• Can support Outputs
• Door locking mechanisms
• Sound or broadcast alarm devices
• Lights, sirens, bells, digital dialers, etc.
• Can be programmed so an Input activates or deactivates
outputs automatically
• Example: Glass break sensor (input) might activate a
siren (output)
57. Access Control Panel Wiring
• Three different approaches to cabling of
readers
• Bus Cabling
• Readers can be wired to a common cable that runs back to the
panel
• Saves wiring costs when readers are close to each other
• Star Cabling
• Readers can be wired to the panel individually
• Combination Bus and Star sometimes is best
• Independent IP / Network Drop communications via Network
58. Access Control Panel Trends
• Distributed intelligence
• Embedded software – web enabled data
management
• FIPS- 201 for Federal Employees
• Full feature set resident at the local panel
• POTS pack up / cellular back up
• HiCap memory backup
• On line and off line capacity
• Bio-metric / Smartcard
• Integrated into lock hardware
59. SEE YOU IN 5 Minutes
QUESTIONS?
Kevin Klemmer, PSP, CISSP
68. The Basics: Electric Locks
Maglocks
Strikes
Cylindrical
Mortise
Exits
Peripherals
69. Safety Security
Control & Monitoring Remote Locking
Reduces Manpower Convenience
ADA requirements
Benefits of Electrified Hardware
ELECTRIFIED HARDWARE
Performs functions normally executed manually, usually
from remote location or automated.
Must specify a system with all components compatible.
One component will not work without the others.
72. The power supply must furnish the
SAME voltage as required by the
load.
The current (amps) available from
the power supply must be
EQUAL TO or GREATER THAN that
required by the total load of the
system.
ACCESS CONTROL HARDWARE
73. Converts electrical energy into another form I.e.,
unlocks a solenoid, retracts a latch bolt, etc
Performs the work required
Electric Lock or Strike
Electric Exit Device
Closer / Holder
Electromagnetic
Holders
ACCESS CONTROL HARDWARE
74. FAIL SAFE
• Lock or locking device
that remains
UNLOCKED on loss of
power
FAIL SECURE
(non-fail safe)
• Lock or locking device
that remains LOCKED
on loss of power
Terminology
ACCESS CONTROL HARDWARE
75. Electrical Characteristics of a Load
Need to Know to
Select Power
Supply
• Current Draw In Amps
• Voltage Required
• Fail Safe / Fail Secure
ACCESS CONTROL HARDWARE
76. Key Pad
Key Switch
Toggle Switch
Push Button
Stand Alone System
Access Control
System
Switches are used to control a locking device
or to signal a monitoring device
ACCESS CONTROL HARDWARE
77. Switches are used to control a locking device
or to signal a monitoring device
Each switch has one movable contact, the POLE, and one or
more fixed contacts, the THROWS
SWITCH SYMBOL
Normally open
ACCESS CONTROL HARDWARE
78. Normally closed
Switches are used to control a locking device
or to signal a monitoring device
Each switch has one movable contact, the POLE, and one or
more fixed contacts, the THROWS
SWITCH SYMBOL
ACCESS CONTROL HARDWARE
79. MAINTAINED
CONTACT
• A switch designed for
applications requiring
sustained contact; but with
provision for resetting
i.e., ordinary light switch
MOMENTARY
CONTACT
• A spring loaded switch
designed for applications
requiring constant contact;
when pressure is removed,
reverts back to original
position
i.e., door bell
Terminology
ACCESS CONTROL HARDWARE
80. Carries current through system
The more distance between the
power source and the load, a
heavier wire gauge is required
# 1 TROUBLESHOOTING PROBLEM
ACCESS CONTROL HARDWARE
81. Size of Conductor (Gauge)
Length of Conductor (Resistance)
The farther the load is from the power supply, the more
resistance is experienced; a heavier gauge wire is required
Need to Know
ACCESS CONTROL HARDWARE
82. 25 50 100 150 200 250 300 400 500
0.25 18 18 18 18 18 18 18 18 16
0.50 18 18 18 18 16 16 16 14 14
0.75 18 18 18 18 16 16 14 14
1.00 18 18 18 16 16 14 14
1.50 18 18 18 16 16 14
2.00 18 18 16 16 14
2.50 18 18 16 14
3.00 18 16 14
3.50 18 16 14
Distance in feet from Power Supply to Locking Device
MINIMUM WIRE GAUGE FOR 24V DC or AC
A
M
P
S
ACCESS CONTROL HARDWARE
85. 1. Power Supply
2. Key Pad
3. Power Transfer
4. Electric Exit Device
3.
ELEVATION
DRAWING
4.
WIRING
DIAGRAM
2.
HARDWARE
LIST
1.
OPERATIONS
NARRATIVE
2.
HARDWARE
LIST
ACCESS CONTROL HARDWARE
88. Making Hardware Selections
Based On Owner’s
InstructionsCashier's Door from Drivers Lounge
Closed and Locked at all Times
Must Be Entered During Day Employees
Secretary To Remotely Unlock Door
Management Always Able To Enter
*
DRIVERS
LOUNGE
CASHIER
CHOICES
89. 1.OPERATIONS
NARRATIVE
Door is normally closed, latched and
secure from the outside. Depressing
the push switch will unlock the electric
strike to allow ingress.
Door will relock as soon as
push button returns to normal position.
Loss of power, the door will
remain locked.
Enter by key at all times.
Free egress from inside
at all times.
2.HARDWARE
LIST
Load
Switch
Power Supply
Electric Strike
712NFS 24VDC
Push Button
PB
Transformer
TP-24-2
EXAMPLE
91. Systems Wiring Diagram or
Point to Point Wiring Diagram
4. WIRING
DIAGRAM
EXAMPLE
Electric StrikeTransformer
+ -
Non-
polarized
C
NO
NC
Pushbutton
PUSH
TO
EXIT
120VAC
LockedUn-
Locked
94. Access Control Trends
Embedded Prox Technology
Monitoring Options
Request To Exit
Door Contact
Keyswitch Monitoring
Other options…
95. Convergence
Analog to IP (Security to IT)
Applications Convergence
Physical and Cyber
“Soon the security industry will move to systems in which there
are no analog or proprietary wired devices at all; where all
devices connect to the Ethernet infrastructure. The knowledge
of how to design efficient network systems and how to secure
those systems is paramount to successful security systems.
This is the future of security technology”
Thomas Norman, Protection Partners International
Integrated Security Systems Design
96. Threats of Converged Enterprise
Mode
of
Attack
Physical
Security
Physical
Attack
Physical Attacks
Against Cyber
Information
Security
Information
Attack
Cyber Intrusion Identifies
Valued Targets
Targets
Facilities People
Media
$$$
Computers
Information
100. Reduce security vulnerabilities in all types of facilities.
The industry's first-ever guide for exterior and interior
security features, NFPA 730: Guide for Premises Security
addresses security in all occupancies from residential
dwellings to large industrial complexes. Uniform guidelines
help you assess vulnerability and design appropriate security
plans.
Provisions describe construction, protection, and occupancy
features and practices intended to reduce security risks to
life and property.
Topics covered include:
General requirements and facility classifications
Security vulnerability assessment
Exterior security devices and systems
Physical security devices
Interior security systems
Security planning
Measures to control security vulnerabilities in educational,
healthcare, and other facilities
The Guide also addresses protocols for special events, and
the responsibilities of security personnel.
(Approx. 88 pp., 2006)
Resources
101. Ensure the quality and reliability of security system
installations
NFPA 731; Installation of Electronic Premises Security
Systems is the first Standard developed primarily to define the
means of signal initiation, transmission, notification, and
annunciation, as well as the levels of performance and the
reliability of electronic security systems.
Requirements cover every step of security equipment
installation, with provisions for the application, location,
performance, testing, and maintenance of physical security
systems and their components.
Detailed chapters are included for:
Intrusion detection systems
Electronic access control systems
Video surveillance systems
Holdup, duress, and ambush systems
Testing and inspection
Rules address the protected premises from the property line to
the interior of the premises. NFPA 731 also references or
incorporates provisions from applicable UL, SIA, and other
standards.
(Approx. 43 pp., 2006)
Resources
102. ETHICS IN SECURITY
• Perform professional duties in accordance with the law and
the highest moral principles.
• Observe the precepts of truthfulness, honesty, and
integrity.
• Be faithful, competent, and diligent in discharging their
professional duties.
• Safeguard confidential and privileged information and
exercise due care to prevent its improper disclosure.
• Not maliciously injure the professional reputation or
practice of colleagues, clients, or employees.
Physical Security Professionals must
adhere to the Code of Professional
Responsibility, agreeing to:
>>note to speaker—orange text block will pop in on next screen click—you may want it to come in first<< or you may want it to come in last >>
Studies have shown that unauthorized duplication remains the most violated security policy and largest single problem with large facility managers
Well, what are some of the ways a facility manager can protect the integrity of the system?
First, by knowing the answers to these questions >>speaker can read questions and make comments if desired<<
Let’s explore the five points of today’s key control. First, is the patent itself. When a strong utility patent is granted it gives the holder certain rights under the law. With a patent, the manufacturer controls the sale and distribution of keys and blanks for the life of the patent. Then, extensions have been known to be granted.
A distributor must enter into agreements with the manufacturer to protect his patents and to protect the end user.
One of those agreements is audit controls from all three levels; the manufacturer, the distributor and the owner/facility must have controls in place to insure blanks do not get in the market.
And the manufacturer must be willing to take violators of their patents to court.
Let’s explore the five points of today’s key control. First, is the patent itself. When a strong utility patent is granted it gives the holder certain rights under the law. With a patent, the manufacturer controls the sale and distribution of keys and blanks for the life of the patent. Then, extensions have been known to be granted.
A distributor must enter into agreements with the manufacturer to protect his patents and to protect the end user.
One of those agreements is audit controls from all three levels; the manufacturer, the distributor and the owner/facility must have controls in place to insure blanks do not get in the market.
And the manufacturer must be willing to take violators of their patents to court.
Now, let’s discuss each of the five points.
A strong utility patent gives the patent holder exclusive manufacturing rights , usually for 18 or 20 years depending on the patent. This in turn gives the manufacturer total control of distribution for that time. Secondary or imitation manufacturers cannot duplicate that product, in our case here, a patented key or keyway until penalty of law. Now the manufacturer has some teeth in the statement “DO NOT DUPLICATE UNDER PENALTY OF LAW”
This, in turn, gives the end-user protection from every big box store and local locksmith from having keys to their system and the ability to duplicate keys.
Now, this talk about point 2, How the manufacturer may protect keys and key blanks.
The manufacturer should have in place policies and procedures governing employees during the process of these orders. At the order entry level, how the handling of orders, how data is entered, how data is transferred all should be different procedures from normal incoming orders; because they are different. More control is required including a system that only allows certain persons to place orders for this material; including, many times, a signature verification. The factory level should have restricted areas where the material is fabricated, assembled or stored with a controlled access for those employees only. In addition, the factory employees should be familiar with other procedures like key blanks only shipping direct to the end-user, that manufacturing keeps count of all keys, even ones discovered to be made wrong. This what we refer to when we say “a return key policy”. Not physically having keys returned, but knowing where all keys and blanks are, or what happened to them. Keys made wrong in factory should be destroyed, but records kept.
A specially coined key bow to identify the patent number should be used to discourage any counterfeiters.
No system will be reliable if the owner or end-user does not protect his investment. If keys are duplicated and distributed at will, with no controls, then the owner is still on the road to “lost key control”. Therefore, polices and procedures should be in place at the facility level. These polices must be supported by upper management if they are going to work properly. Having two sets of polices, one for management and one for others will not work for long. Employees should know that rules will be followed by all.
Some of the policies or procedures should include: an administrator on staff who is responsible for record keeping; having supervisors only request new keys; having employees sign for keys; some facilities are even putting a penalty clause in the signature form acknowledges a lost key and it goes into the personnel file. The administrator should make sure make sure materials sure under locked storage; having all keys numbered and logged into system identifying which employees has which key number and what access that person has with that key.
Also, let’s not forget about outside personnel who make require keys from time to time; such as after hours cleaning crew or outside contractors like air conditioning & heating workers. They should sign affidavits when given a key and when it should be returned and who it should be returned to. And a penalty if they key is lost. Maybe the penalty should be re-keying the area or the entire building.
For the protection of the system, these policies and procedures should be agreed to by the parties involved; the manufacturer, distributor and end-user so that all know is being done. These agreements protect all three levels by summarizing responsibilities of all parties and providing guidelines on how to maintain the system at each level. These are not formal contracts requiring attorney approval, just simple agreements by eliminating possible misunderstandings.
What else can be done?
Simple steps like reduce the levels of master keying, and especially cross keying; have employees carry more than one key; stamp all keys with a code and match the code with an employee; use sealed key rings so keys cannot be removed; and, use some type of key cabinet and their forms.
Enterprise solutions, today, it touches everything in the building.
Realization of the need to integrate ALL security data sources
Bringing together disparate databases or information sources
Typical system.
This diagram shows what happens inside a typical filtered and regulated power supply unit:
CLICK: the house current, 120VAC enters and the transformer
CLICK: reduces the voltage to 24 volts
CLICK: the rectifier
CLICK: converts AC to DC
CLICK: a capacitor
CLICK: stores the needed current and filters out “noise” or interference
CLICK: and a regulator
CLICK: maintains a constant level of current
CLICK: to deliver reliable energy in the form of a filtered and regulated 24VDC output.
This type of power supply is the best choice in most systems and may be required for warranty purposes as well.
All loads are either FAIL SAFE or FAIL SECURE. Folger Adam frequently list FAIL SECURE as NON-FAIL SAFE (NFS)
Fail Safe means that the door will be unlocked upon the loss of power. A fail safe lock needs to be energized to be locked.
Fail Secure is just the opposite. A fail secure lock will be locked upon the loss of power. A fail secure lock needs to be energized to be unlocked. Non fail safe means the same as fail secure (opposite of fail safe)
For doors required in secure areas (such as an exterior door or a door to a sensitive area like a payroll office) fail secure is the best choice.
Fail safe operation is usually found on doors that would be required for life safety – such as stairwell doors that are usually locked but would be needed for egress in the event of a fire.
The electrical characteristics you need to know about the load are the current draw and the required operating voltage.
For example, if a system consists of 2 doors each with an electric strike that draws .33 (point three three) amps at 24VDC, there is a total of .66 (point six six) amps at 24VDC. A 1.0 (one point zero) amp, 24 Volt DC power supply would be sufficient to make this system work.
This diagram shows a symbol for a switch that might be used on a wiring diagram. This switch is shown in the “open” condition meaning that the circuit is open and there is no flow of energy. When operated, the pole is moved to make contact with the throw and thus closing the circuit to allow current flow.
This diagram shows a symbol for a switch that might be used on a wiring diagram. This switch is shown in the “open” condition meaning that the circuit is open and there is no flow of energy. When operated, the pole is moved to make contact with the throw and thus closing the circuit to allow current flow.
The other concept concerning switches is how long the switch makes contact when it is actuated.
When a maintained contact switch, also known as alternate action (AA), is pressed, it stays in that position until it is pressed again. Think of a light switch. When you turn on the light, it stays that way until you touch it again. Then it stays THAT way.
A momentary contact switch changes status only while it is being pressed. As soon as you take your finger off, it springs back to its original status. An example would be a door bell.
Either of these switches can be wired NORMALLY OPEN or NORMALLY CLOSED.
The point to remember is you must choose MAINTAINED or MOMENTARY in advance and they can be wired either NORMALLY OPEN or NORMALLY CLOSED depending on how the system is supposed to work.
Although there are guides to follow that help determine the proper conductor to use, the fact remains that the larger the current, the larger the wire; BUT the smaller the gauge measurement. For example, 14 ga. wire is heavier than 20 ga. The other principle to consider is the distance from the power supply to the load. Longer wire runs will require heavier gauge wire to prevent voltage drop.
This distance will obviously vary from project to project.
This is sample of the National Electric Code minimum wire size for 24VDC. Other charts will detail other voltages.
An expanded chart is shown on page ? of the Accessories and Technical Data section of the Folger Adam Electric Strike Catalog
Now let’s explore how to select electrified hardware based on an owner’s instructions.
The door is a interior office door to a cashiers window. The owner has indicated that the door is closed and locked at all times, but wants entry controlled by the secretary to avoid overcrowding the tiny space.
Management needs to be able to get in at any time, particular in the morning before the secretary comes in
(click)
The first thing we need to do is develop a Operations Narrative from the owner’s instructions. It might read like this: (READ NARRATIVE)
A narrative may be in bullet point method or written paragraph form. The main goal is to interpret what the owner wants and needs.
The next step is to choose the hardware products that will satisfy the narrative.
(click for hardware list)
My first choice is usually the load. I want to know what is doing the work. In more complex systems, I will also want to know the amperes of my load. As in any electrified system, the choices are as varied as days of the week. Since this is a seemingly simple system using an interior door, the choice here is a electric strike. (click) We chose the heavy duty 712 instead of a 100 series because of the expected abuse and frequency it might take and because it works with mortise and cylindrical locks. And it fits into a standard hollow metal frame with minimum modifications. We also chose Fail Secure or Non-Fail Safe (or NFS) because with loss of power we want it to be locked. A electric lock could have been chosen, but the owner seemed to want traffic control more than security according to his instructions. (click) Next, we would choose a switch. In this case, the FAPB momentary push button switch was selected. Depressing the button will send power to the strike and it will unlock. When the button returns to a normal state, the power is removed and the strike is locked. (click) For our power supply, transformer was selected to keep the system simple. We chose a relative common transformer with 24 volts DC. You will notice that our strike is be the same voltage, 24 volts DC as we learned earlier.
What other fact do we need prior to making a final selection of our transformer?
If you remember, the power supply must furnish the same or more current than what our load uses. According to the Folger Adam catalog, the 712 electric strike strike at 24VDC uses .15 amps and our ASE-1-20 is .800 mA, so we have a match with plenty to spare.
The power supply could be the last item selected since we need to know the total amps being used if it were operating more than one door or load
The conductors are usually supplied by the installer, so we have not included them here.
Operations narratives should be included in all specifications and hardware submittals to make sure all components are included and everyone knows how the system is supposed to work
Any questions
(click to next slide)
This would resemble a elevation drawing as described earlier in the presentation. If we wanted to, we could add the Operations Narrative and Hardware List to the elevation for more detail, but if we have attached, that’s ok too.
To make this a Riser Diagram, we would need to know the location of each product and use the NEC chart to indicate the wire size. Let’s say the secretary’s desk is 33 feet from the door and the transformer and rectifier are within two feet of the door. Then we could use the chart as shown in the Folger Adam catalog and determine the wire size. If the dimension we are looking for is not there, we go to the next length; in this case it would be 50 feet. So running 24VDC to 50 feet, the chart indicates the wire size should be 18 gauge. (click for wire gauge)
The term “riser diagram” is different here than when used in true electrical and plumbing floor plans where the illustration shows all electrical or plumbing hook ups building wide.
The elevation should be included with all hardware submittals to show a connectivety to all components and if you can change that to a riser diagram, make it the submittal instead of a elevation.
(click to next slide)
If you will remember “the fours”, (click …click) you will be able to plan, specify, furnish and furnish electrified hardware access control systems and have them installed and operating the way the owner wants them to operate.