<<

TECH TIPS

www.conspectusinc.com Vol12.10.01 ©2012 Conspectus Inc. Page 1 of 2

Providing compete Security construction specifications By David Stutzman, AIA, CSI, CCS, SCIP, LEED AP documentation, systems and performance ! is used for egress. The alarm may be descriptions, and risk and Really? shunted or disabled by use of a switch quality advisory services. or valid . can range from simple Daytime Unlocked/Nighttime Locked: keyed functions to electronic access Conspectus's Tech Tips received the The electronic locking function is regulated by a central control system. national Communications Award from controlled by a time clock. The lock the Construction Specifications The Owner's requirements must be status will change depending on the Institute. fully understood to know what type time of day. When locked a key or an system will serve the needs best. electronic switch is require to unlock ABSTRACT: When beginning hardware the door. When is an electric strike not an specifications, often requiring electric strike? When it is a Selectively Secure: Doors are electric strikes or card readers are euphemism for a secure door. normally unlocked for free passage in Knowing what function is required is identified in the door schedule. both directions. When an paramount. Function will dictate what Typically, the mention of these unauthorized person approaches, the devices are needed. So what should devices represents a need for a form door automatically locks to prevent be considered when specifying a of electronic security, not a specific passage. This function is often used in secure door? device. Naming the device is a nursing homes to prevent dementia convenient way to convey a need for patients from unknowingly leaving FILING: additional security. their area of the building. UniFormat™ How can you tell what is really B2050 - Exterior Doors and Grilles Mantrap Vestibule: A complex control intended for the door? Avoid talking C1030 - Interior Doors system that prevents any door within about devices. Identify the Security the vestibule from opening when MasterFormat® Doors - doors that must be controlled 08 71 00 - Door Hardware another door is already open. This by some means other than a key. function is common to control entry to Then, talk about function. How must KEYWORDS: spaces with valuable, sensitive, or Key, Electric Strike, Mechanical Lock, the door operate? dangerous contents. A combination of Cipher Lock, Magnetic Lock, The Functions electronic locks, magnetic locks, and Electronic Lock, Credential, Switches, Door function requirements are electric strikes may be needed to seemingly endless - see the sampling provide this control. below. The combinations can be The door is locked, but is it secure? staggering. Every required function Unless the door is fully closed with the adds complexity. Many electronically latchbolt engaged in the strike, the controlled doors require door is not secure. Switches are used microprocessors to coordinate all the to monitor the door position and the functions provided by multiple latchbolt engagement. These switches devices installed on a door. Adding can report an open and unsecured an automatic operator is one sure fire condition so security may investigate. way to complicate the controls. The Controls Always Secure: This is the simplest Keys: door function. The door will always Keys are the most basic security require a key or an electronic switch control. Unless the key is a patented, to unlock the door. high security type provided directly Alarmed Egress: A variation of from the lock supplier, the key can be always secure, this function requires duplicated. The key may be lost or remote notification, local stolen. to track who has annunciation, or both when the door TECH TIPS

www.conspectusinc.com Vol12.10.01 ©2012 Conspectus Inc. Page 2 of 2

what key becomes important - wiring, controls, and door and frame  Request to exit (RX) switches important enough that entire systems preparation. and software have evolved for this  Door position switches Recommendations specific purpose. The Devices Grab the drawings. Meet with the Combinations: owner, hardware consultant, and Mechanical Locks: A keyed device Cipher locks are opened by entering a anyone else involved with security. including tubular, cylindrical, and combination via push buttons or an Identify each security door. Review types. electronic keypad. These locks allow each door function. Document how Cipher Locks: A lock requiring a many users to access the door simply the door must operate. Then discuss combination to open via pushbutton or with the knowledge of the correct security system and devices. electronic keypad. combination. Security is compromised Engage a qualified hardware Magnetic Locks: An electromagnet because it is entirely dependent on consultant to determine what each that secures the door when energized. users not revealing the combination - door requires and to develop the This lock requires two means for or posting the combination next to the control sequence description. Require unlocking for egress, including a wall lock. Yes, it happens! the consultant to specify all the mounted pushbutton. When part of The recourse is to change the devices that must be mounted on the the egress path the lock must be combination often. Each cipher lock door and frame to ensure proper connected to the fire alarm system to should be set to a combination other factory preparation without surface unlock on alarm. than the factory default. wiring. Finally be sure the power Battery Electronic Locks: A stand- Electronic : supply with the control module is alone lock that is programmed by a Virtually anything that can contain a furnished with the door hardware. chip or magnetic strip can be used to portable device used at the door to unlock an electrically controlled door establish the valid credential. The use to allow entry. Key fobs and some record is retrieved also by the portable keys contain chips. Cards can have device. chips, magnetic strips or both. And Hard Wired Electronic Locks: A lock let's not forget smart phones. With that is powered by low voltage wires Bluetooth and Near Field running through a door hinge or a Communication (NFC), your phone power transfer device and through the can unlock some locks too. door core to the lock. The lock is With smart phones becoming connected to a central control system ubiquitous, you may not be able to get permitting real time , through doors without one in the reporting, and programming updates. future. It's a smart phone, now, and Wireless Electronic Locks: A stand- maybe a chip implanted at birth for the alone battery operated lock that that Add Your Comments next generation. That will prevent communicates periodically with a We invite your comments. Visit our blog losing it! receiver usually concealed above an and add your comments. Electronic Switches: accessible ceiling. The receiver Electronic locks are controlled by reports the lock activity to a central Like it? Share it! switches. Switches reverse the default station and transmits programming Tweet or Email your friends state - locked becomes unlocked and changes to the lock from the central station. vice versa - or determine the current The information contained in this document The lock will continue to work during door status to control the operation is offered for educational purposes, only, power outage. sequence. Switches come in a variety and not as technical advice suitable for any Power over Ethernet (PoE) Electronic of forms. particular project or specific condition. Locks: Similar to hard wired locks, Technical consulting is unique to the facts  Pushbuttons except the power source is furnished of a particular condition, and Conspectus by the Ethernet wiring. These locks,  Presence or motion sensors recommends that a specialist be consulted because of the integral electronics, to determine solutions for each specific  Key switches can combine functions of multiple condition.  Receivers for electronic credentials devices into the lock, eliminating other