0% found this document useful (0 votes)
44 views14 pages

ARCH8282 A - Security Systems and Installations

This document discusses security systems and access control installations. It describes passive security systems that rely on spatial planning versus active systems that use dedicated hardware. Access control systems verify authorized personnel using credentials like tokens, badges, biometrics or ciphers. The document outlines selection criteria and components of access control systems including credentials, readers, controllers, electric locks, turnstiles and power supplies. It also classifies systems based on the credentials used, describing photo IDs, tokens, biometrics and common card technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views14 pages

ARCH8282 A - Security Systems and Installations

This document discusses security systems and access control installations. It describes passive security systems that rely on spatial planning versus active systems that use dedicated hardware. Access control systems verify authorized personnel using credentials like tokens, badges, biometrics or ciphers. The document outlines selection criteria and components of access control systems including credentials, readers, controllers, electric locks, turnstiles and power supplies. It also classifies systems based on the credentials used, describing photo IDs, tokens, biometrics and common card technologies.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

DEPARTMENT OF ARCHITECTURE

ALIKO DANGOTE UNIVERSITY OF SCIENCE AND TECHNOLOGY, WUDIL


ARCH8282 – ADVANCED BUILDING SERVICES AND ENVIRONMENTAL
CONTROLS II
Lecturer – Prof. Stephen N. Oluigbo

SECURITY SYSTEMS AND INSTALLATIONS


INTRODUCTION
Security systems can be divided into two major types:
i. Passive systems; and
ii. Active systems.
Passive systems do not include any dedicated hardware for security, but is based mainly on spatial
planning and organization, management and building fabric and construction.
Active security systems employ dedicated hardware that actively detects and controls security
breaches and conditions.
In general, security and access control infrastructure, both personnel and equipment,
consists of the following elements:
1. Intrusion detection
2. Surveillance
3. Communications
4. Response systems

ACCESS CONTROL SYSTEMS


Access control systems are digital security systems that ensure authorized access to sites and
buildings. They allow authorized personnel and material to move through normal access routes
while detecting and delaying movement of unauthorized personnel and material. Access control
verifies authorised personnel using their credentials.

SELECTION CRITERIA
To be appropriate for each situation, the access control system must answer five questions:

1. Where? For what place? What type of access (isolated, internal or external, room,
building, floor, etc.), for how many doors?
2. Why? For what function, for whom? Management of visitors, groups, staff and events.
3. When? At what time? At what times is access permitted or refused? And for how long?
4. How many? How many people are concerned? How many sections or departments?
5. How many people are there in the groups? Which visitors are authorised, and which are
not? How? Which readers to choose? What wiring infrastructure to use?
COMPONENTS
An access Control System typically consists of a number of components from those that identify
a person to those that authorise access. They include:

1
1. Credentials - A physical or tangible object, a piece of knowledge or a facet of a person’s
physical being that enables an individual to gain access to a controlled area. They include:
Token/Cipher (code)/Biometric data - The ‘key’.
2. Readers - Devices used to electronically read the ‘Key’.
3. System Software/Controller - These intelligent devices hold information in a local
database required to decide whether a user is allowed through a door at a given date and
time. The controller should also be capable of working off-line should the network
communications fail for any reason.
4. Electric Lock Hardware – Maglocks, Shearmags or Shearlocks, Electric strikes, Solenoid
Locks, Solenoid handle locks.
5. Access Controllers – Doors, Turnstiles. The major difference between turnstiles and doors
is that turnstiles restrict passage, usually allowing only one person to pass at a time.
Turnstiles provide an effective method of controlling personnel entry in heavy traffic areas
and also provide a means to reduce possibility of “tailgating.” Tailgating refers to one or
more persons following an authorized person through the control point into the secured
area. For example, a valid card is inserted into the card reader opening the door to the
secured area and two individuals pass through the door. The turnstile design permits only
one person at a time to pass through, reducing the possibility of tailgating.

2
6. Power Supply Units (PSUs) - The power supply requirements should be carefully checked
to ensure that all necessary door hardware, including the chosen locks, can be supported
simultaneously. It may be necessary to utilise a separate power supply for controlling the
lock hardware.

3
CLASSIFICATION BASED ON CREDENTIALS USED
PHOTO ID SYSTEM
Systems requiring less manpower that use closed circuit television (CCTV) and either a stored
image or a picture badge to compare with the person seeking access are also available. In systems
using the stored image, the individual controlling access, likely located at a central location,
compares the stored image of the authorized person with the person seeking access on the CCTV
monitor and allows access remotely.

TOKENS AND CIPHER SYSTEMS


Tokens are hand-held or portable mechanical or electronic devices that facilitate authentication for the
bearer to enter a protected space. Tokens include:
1. Cards;
2. Badges;
3. Key fobs.
4. Mobile devices.

Swipe – Swipe cards use a variety of technologies including magnetic strip to hold identification data.
This is read into a reader by swiping or inserting. Swipe cards are usually cheap but easily copied and
deteriorate over time, needing to be replaced quite often.
Contact – These are cheap cards or tags that have contacts on the surface e.g. a chip and pin bank card.
More difficult to copy than swipe cards but do deteriorate over time.
Passive proximity – These are relatively cheap cards or tags that have small chips inside. They can
transmit the user number a short distance (normally less than 15cm) to a reader. These are less easy to
copy and relatively long living since they receive less wear and the chip is protected inside the card.
Active proximity – These cards use batteries to give a longer range than passive cards. The batteries
are normally long life but depending on use may need to be replaced every few years. Active cards and
tags can be used for longer range access control for vehicle access, comply with the DDA or for “hands
free” access. Typical reading ranges from 0.5m to 10m.
RFID – In access control terms RFID normally refers to contactless smart cards. These cards act very
like passive proximity cards and tags except that they can hold much more data and the reader can
write this data to the card. This enables multiple uses for the card. This type of card can also be used
in off-line access control systems.
Mobile devices – Devices such as phones can operate as a token in a variety of ways. They can use
NFC or Bluetooth Low Energy (BLE) to provide an identity over a short range.

4
Types of Cards
Card access control systems use a card encoded with data that is scanned by a reader at the entry
control point. If the reader determines the card valid, it deactivates the locking system and grants
access to the person with the card. Several different methods are used in encoding information on
cards. The most common are:
i. Magnetic stripe;
ii. Bar code;
iii. Proximity;
iv. Wiegand wire; and
v. Hollerith.
Magnetic cards
These use a magnetic stripe on which data is encoded. These cards are similar to common credit
cards. Card holders may be required to use a personal identification number (PIN).

Bar code cards


These contain encode data with a series of vertical or horizontal stripes. The cards are read
optically by a photodetector cell. Card holders may be required to use a PIN.

Proximity cards
These have embedded radio frequency circuits that create resonance frequencies that are read by
the card readers. Unlike other card systems, the proximity card does not require that the card be
inserted into a reader. This allows the reader to be installed behind a wall to protect it from
vandalism and/or harsh environments and allows individuals carrying large parcels to enter
without having to swipe their card through a card reader.

5
Wiegand wire cards
This specially processed small diameter magnetized wire segments are embedded to form
a pattern that, when passed through a reader, produces a sequence of voltage pulses that converts
to a code.

Hollerith cards
These have a pattern of small holes punched into the card that represents data to the card reader.
Most Hollerith cards are read by an optical reader that reads the light pattern passing through the
holes.

6
Key Fobs

Ciphers
Key pads and pins (codes).

BIOMETRIC SYSTEMS
Biometrics use human physiological or behavioural data measurements to determine authorization for
access. They Include:
1. Fingerprint/Finger-vein;
2. Voice pattern;
3. Iris/retina scan;
4. Signature;
5. Palm shape/geometry; and
6. Face recognition.

Voice Pattern
These are designated characteristics that are recorded electronically when a person is given
authorized access. Thereafter, when the individual seeks access, the person’s voice pattern is
measured against the recorded characteristic and, if the measurements are within system
tolerances, access is granted.
Fingerprint/Finger Vein

7
Electronically record fingerprints to include the minute variations in the loops, whorls, and arches.
Variations are compared against the recorded fingerprint at the access control point. These systems
can read fingerprints that are partially illegible from dirt or other causes.

Palm Shape/Geometry
This uses the silhouette of a hand, finger length, and hand proportions, along with the curvature
and webbing between fingers.
Iris/ Retina Scan
These are as unique to a person as fingerprints. In these systems, low-intensity infrared light is
reflected and recorded from numerous checkpoints on the retina. The reflected pattern is then
converted to a digital profile. This computer-stored pattern is compared at the entry control point
through a lens and access is granted or denied based on the comparison.

8
Signature systems
These systems do not compare the actual form of signature. Comparison is made in the dynamics
of the changes in downward pressure and vertical and horizontal pen movements when writing the
signature. Several signatures are obtained to form a base comparator code. This code is compared
at the entry control point using sensors built into a pen or electronic pad.

Face Recognition

Multiple Dwelling Entry and Security Systems


 Apartment houses and other large residences combine the functions of the familiar lobby‐
to‐apartment communication system;
 The most basic system is a series of pushbuttons in the lobby and an intercom speaker or
telephone with which to communicate with residents;
 At the other end the tenant has a speaker microphone plus a lobby door opener button;
 This system can also be arranged to utilize the tenant’s regular telephone;
 When the number of tenants is very large, an alphabetical roster is added to the apartment
button panel to avoid the nuisance of scanning all the apartment names when the sought
party’s apartment number is not known;
 For even larger numbers, an alphabetical tenant register plus a button phone is used;

9
 Closed Circuit Television (CCTV) system is frequently added to the lobby system enabling
the tenant to also see the caller;
 Such a system increases the electrical contract cost for an average apartment house 5% to
7%;
 Call buttons within apartments can be used to perform any alarm functions required to deal
with an intruder who manages to bypass the lobby security check;
 In geriatric (aged) housing designs, these buttons also serve to unlock the apartment door
to allow helpers to enter if summoned by lights and alarms;
 In luxury apartment buildings, apartment doors can be monitored from a central security
desk and any unscheduled door movement subjected to immediate investigation;
 These systems are custom designed to meet the requirements of the owner.

Advantages and Disadvantages of Access Control Systems

10
Comparison of Biometric Technologies

Metal Detectors, Explosive Detectors and X-Ray Equipment


Metal detectors used with access control equipment can perform two functions: (1) Detect the
presence of concealed metal objects and (2) determine the size of those objects.
Portal and X-Ray Metal Detectors

Security Containers/Safes/Vaults
Security containers are primarily used to store classified documents, components, materials, and
equipment. In many cases they are also used to secure funds, valuables, communications
equipment, weapons, and controlled substances.

11
Vaults are used to store large amounts of classified documents or materials. Construction of the
vault walls, ceiling, and floor is done locally in accordance with local requirements.

Combination Locks
Combination locks are used on security files, vaults, and strong rooms to protect weapons, money,
precious metals, drugs, and on field safes to protect classified material. There are two basic types
of combination locks that are mounted:
i. Mechanical;
ii. Electromechanical.
A mechanical combination lock requires aligning one or more movable numbered combination
wheels by dialling a correct combination. When the combination wheels are properly aligned, the
locking components are released to permit the locking bolt to retract. An electromechanical
combination lock may use a microprocessor to process and coordinate the dialled combination
with the lock’s correct combination.

DURESS SYSTEM

12
ACTIVE INTRUSION DETECTION SYSTEMS
Elements in an Active Intrusion Detection System:
i. Detection devices or Sensors;
ii. Control Equipment – switches, relays, reset buttons;
iii. Signaling link – wired connection to alarm bells or surveillance service providers or police;
iv. Wired connection to power source – mains or battery;
v. Power source.
Detection Devices or Sensors
i. Mechanical Motion Detectors
 This can be used where window foil or fixed contacts are impractical;
 This device is a spring mounted contact suspended inside a second contact surface;
 Any appreciable motion of the surface on which the device is placed causes the contacts to
connect temporarily, turning in an alarm;
 These devices are very sensitive and can be activated by sonic booms, wind, and even a
heavy truck passing by. For this reason, such units are provided with sensitive adjustment.

ii. Photo Electric Devices


 These devices operate on the simple principle of beam interruption;
 When the beam is received, a contact in the receiver is closed;
 Interruption in the beam causes the contact to open setting off the alarm;
 Older devices use visible light beam which is effective indoors, but outdoor dust, insects,
birds etc. show the location of the beam;
 Birds and small animals set it off. Dispersion of light also limits the throw of the devices
outside;
 Modern units use lasers and infra‐red (IR) beams, which are less easily detected and can
be arranged to differentiate between intruders and other disturbances;
 When a laser beam is used, the signal can be picked up, amplified and transmitted a
different direction, thus establishing a perimeter security fence from a single source;
 The ability to focus on a particular area is utilized to cover areas both horizontally and
vertically;
 As the PIR detectors are not sensitive to motion but are to heat it is usable where motion is
unavoidable;
 The principal disadvantage of PIR detectors is that rapid temperature changes caused by
direct insolation, a cold breeze, a heater turning on etc can cause the alarm to trigger;
 PIR detectors can be used as motion detectors by using a mul3‐beam (zone) unit;
 Motion is detected as changes in IR radiation of adjacent zones or in the radiation of a zone
with respect to the background, both of which characterize motion;
 However, because Doppler effect depends on relative motion between the source and the
moving body, an intruder moving laterally may go undetected if sensitivity has been
reduced to avoid false alarms;
 Therefore, units should be located so that the path of an intruder is as nearly as possible
directly toward or away from the detector;
 Ultrasonic units are cheaper than microwave units but can be disturbed by strong air
turbulence and very loud noises;

13
 Microwave units are undisturbed by air or noise but because they penetrate solids they can
be affected by mo3on outside the protected area.

iii. Acoustic Detectors


 These units raise alarm when the noise level exceeds a preset maximum;
 Alternatively, they can be arranged to respond to a particular range of frequencies
corresponding to the noise of breaking glass, forced entry or whatever is desired;
 Although applied principally in security systems, they can also be used as occupancy
sensors for switching of lighting.

iv. Multiple Detectors


 As with fire detectors, a balance must be struck between the sensitivity of detectors and the
nuisance of false alarms as increasing the former increases the later as well;
 One very effective method is to use multiple detectors with different technologies that
verify each other. Units are available that combine PIR and ultrasonic detectors in a single
housing;
 It does not transmit an alarm until both detectors indicate intrusion;
 This dual technique is applicable for area and perimeter protection as well as portal
surveillance.

COMMAND/CONTROL CENTRE

14

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy