You are on page 1of 125

Security Systems

2017年8月29日星期二 MEC3623 Electrical Services II 1


Introduction
 Keys to a Good Security System

– Selecting the right security devices


– Integrating the devices appropriately to from a
security system
– Implementing adequate security controls
– Carrying out proper operating procedures

2017年8月29日星期二 MEC3623 Electrical Services II 2


Introduction
 A physical security system consists of five
equally important interacting functions

– Deter
– Delay
– Detect
– Alert/Alarm/Communicate
– Respond/Action

2017年8月29日星期二 MEC3623 Electrical Services II 3


Deter
 Discourage (often psychologically) the
intrusion
 A label at the front of the property “The
property is protected by an advanced
electronic security system”
 “CCTV cameras are installed for security
reasons”
 A “paper” policeman
2017年8月29日星期二 MEC3623 Electrical Services II 4
Delay
 Provided by the presence of physical
barriers protecting the assets
 Examples such as safes, vaults, walls,
ceilings, doors, locks, fences, etc

2017年8月29日星期二 MEC3623 Electrical Services II 5


Detect
 Accomplished by intrusion detection
sensors that detect the presence of an
intruder
 Examples such as infrared sensors,
ultrasonic sensors, optical sensors, contact
sensors, etc.

2017年8月29日星期二 MEC3623 Electrical Services II 6


Alert/Alarm/Communicate
 Alert is provided by an alarm transmission
and monitoring system that annunciates
and identifies the specific alarm location
 The activation of an alarm bell, an
automatic phone call to a nearby police
station or security company

2017年8月29日星期二 MEC3623 Electrical Services II 7


Respond/Action
 Response is executed by the response
force that responds to the intrusion alarm
 Action such as security guards or
policemen come and have a check,
automatically lock all the possible exit of
the property

2017年8月29日星期二 MEC3623 Electrical Services II 8


Integration of Safety &
Security System
 The system designer has to decide what is
best in the circumstances
 Aspects of safety and security as an
integrated whole

2017年8月29日星期二 MEC3623 Electrical Services II 9


Risk Management
 To assess the value of the object under
protection and the possibility of threat
 Match the security system with the risk
assessment
 Law of diminishing returns applies

2017年8月29日星期二 MEC3623 Electrical Services II 10


Risk Management
 No one should use an advanced and
expensive system to protect something
which is not that valuable and with low
chance of threat
 Suggested solution for risk management is
as shown on Figure 1

2017年8月29日星期二 MEC3623 Electrical Services II 11


Threat Analysis
 Designer should conduct a threat analysis
to identify and determine the
sophistication of the threat
 Threat can be either internal or external to
the organization, or both
 Skill level can be expected to range from
unskilled to skilled, to highly skilled

2017年8月29日星期二 MEC3623 Electrical Services II 12


Threat Analysis
 Primary prerequisite for designing an
effective security system
 Protection against an internal threat,
especially a skill insider is a task requiring
very special insight and careful
deliberation

2017年8月29日星期二 MEC3623 Electrical Services II 13


Threat Analysis
 Protection against an external threat of
unskilled level is the easiest task
 Threat and risk level are constantly
changing and must be periodically
reviewed
 Levels of skill of the threat anticipated
also relate with the value of the asset
under protection
2017年8月29日星期二 MEC3623 Electrical Services II 14
Threat Analysis
 Risk management and threat analysis are
closely related
 Suggested level of security based on threat

2017年8月29日星期二 MEC3623 Electrical Services II 15


Level A
(Max Level Security)
 For areas containing high value monetary
and intrinsic resources, the loss of which
would have a permanent or long term
effect on the operation/existence of the
business

2017年8月29日星期二 MEC3623 Electrical Services II 16


Level A
(Max Level Security)
 Unauthorized access to the area could
result in

– destruction
– disclosure of information
– loss of control of the resources

2017年8月29日星期二 MEC3623 Electrical Services II 17


Security Measures
 Security system should ensure to the
highest degree possible that only those
persons should be allowed entry

– actually require entry


– have appropriate need

2017年8月29日星期二 MEC3623 Electrical Services II 18


Security Measures
 The area should provide the highest
probability of detection, assessment, and
prevention of unauthorized access to the
protected items
 Intrusion detection system should detect
any unauthorized penetration of the
boundaries of the protected area - fences,
walls, ceilings, doors, windows, etc
2017年8月29日星期二 MEC3623 Electrical Services II 19
Security Measures
 Visual surveillance and alarm assessment
of the protected areas should include
CCTV for guards
 Response guards should be adequate in
numbers, well trained, and capable of
protecting the assets from the highly
skilled intruder

2017年8月29日星期二 MEC3623 Electrical Services II 20


Security Systems
 Intrusion detection systems for Level A
areas include two complete levels of
penetration detection of the exterior
perimeter and building or protected area
barriers
 Motion sensors may be omitted from
internal areas if access control precludes
“stay-behind” intruders
2017年8月29日星期二 MEC3623 Electrical Services II 21
Security Systems
 Other security measures for physical and
psychological effects are
– multiple perimeter barriers
- high-security locks
- structurally sound door assemblies, walls, floors,
and ceilings
- window grilles
- safes and vaults
- security lighting
2017年8月29日星期二 MEC3623 Electrical Services II 22
Security Systems
- television and visual surveillance for alarm
assessment
- access control
- active random patrols
- trained dogs
- well trained and armed response forces

2017年8月29日星期二 MEC3623 Electrical Services II 23


Level B
(Advanced Level Security)
 For areas containing high-value monetary
and intrinsic resources
 Loss of which would have a short-term
effect on the operation or business

2017年8月29日星期二 MEC3623 Electrical Services II 24


Security Measures
 Total security effort should provide
– a high probability of detection/assessment
– prevention of unauthorized penetration or approach
to the protected items
 Security system should detect any
unauthorized penetration to the protected
area that could result in removal of or
damage to sensitive items
2017年8月29日星期二 MEC3623 Electrical Services II 25
Security Systems
 Suggested coverage for Level B areas
includes
– one level of penetration detection at the exterior
perimeter and building, or
– protected area barriers
 Full volumetric motion detection around
protected items and along anticipated
intrusion paths, and point detection for
appropriate items
2017年8月29日星期二 MEC3623 Electrical Services II 26
Security Systems
 Other physical and psychological security
measures considered are the same as those
for Level A areas

2017年8月29日星期二 MEC3623 Electrical Services II 27


Level C (Intermediate
Level Security)
 For areas containing piliferable material or
sensitive items that attract the intruder
because of monetary value

2017年8月29日星期二 MEC3623 Electrical Services II 28


Security Measures
 Provide a good probability of intruder
detection to

– prevent unauthorized penetration, and


– removal of the protected items

2017年8月29日星期二 MEC3623 Electrical Services II 29


Security Systems
 Include penetration detection at the
perimeter fence when valuable assets are
stored outside buildings
 When the assets are stored inside,
penetration detection should be provided
on all doors and windows
 Motion detection is used along avenues of
approach and around protected items
2017年8月29日星期二 MEC3623 Electrical Services II 30
Security Systems
 Point detection should be employed on
appropriate items
 Other physical and psychological security
measures that should be considered are
– Physical barriers
– Good locks and door assemblies
– Window grilles
– Local audible alarms
2017年8月29日星期二 MEC3623 Electrical Services II 31
Security Systems
– Warning signs
– Random patrols by police

2017年8月29日星期二 MEC3623 Electrical Services II 32


Level D
(Basic Level Security)
 For administrative control and in buffer
areas providing security restriction for
areas of a higher security category

2017年8月29日星期二 MEC3623 Electrical Services II 33


Security Measures
 Pilferable items within the area should
have the same physical protection as those
in Level C

2017年8月29日星期二 MEC3623 Electrical Services II 34


Security Systems
 Detect any unauthorized penetration that
could result in removal of a protected item
 Suggested coverage for Level D areas
includes
– penetration detection on doors and windows
– motion detection around protected items or along
avenues of approach to higher-level areas
– point detection on appropriate items

2017年8月29日星期二 MEC3623 Electrical Services II 35


Design Co-ordination
 Designer should continually co-ordinate
security system design and maintenance
concepts with those individuals affected
by implementation
 These are the individuals who must
operate and maintain the facility’s
performance within any restrictions that
might be imposed by the security system
2017年8月29日星期二 MEC3623 Electrical Services II 36
Design Co-ordination
 The designer should also concern about
those individuals who are responsible for
safety of the employees and other
occupants of the premises
 Some individuals are usually forgotten by
the security system designer until the
system is already installed or in the
process of being installed
2017年8月29日星期二 MEC3623 Electrical Services II 37
Design Co-ordination
 This type of problem can be eliminated if
the security system design is properly
coordinated
 Individuals who participate in the system
design will have a personal interest in its
implementation and acceptance by both
the employees and management

2017年8月29日星期二 MEC3623 Electrical Services II 38


Design Co-ordination
 Management support is needed for the
security system to be successful
 Management must set an example by
– following the security procedures themselves
– insisting that all security procedures be followed
– all systems be maintained in operation

2017年8月29日星期二 MEC3623 Electrical Services II 39


Drawbacks of Current
Security Alarm Systems
 Security alarm systems are neither
foolproof nor burglar-proof
 Have the following drawbacks
– Alarm signals are ignored by the general public
– Numerous false alarms detract the effectiveness of
the systems in alerting neighbors and police
– Over 95% of alarm calls received by the police or
control centre of security companies are false

2017年8月29日星期二 MEC3623 Electrical Services II 40


Drawbacks of Current
Security Alarm Systems
– Annoyance of neighbors by false alarm signals
introduces noise pollution and may lead to
prosecution
– Persons responsible for business or industrial
premises may be got out of bed in the middle of the
night to turn off the triggered alarm
– Householders may be brought back from holiday for
the same purpose

2017年8月29日星期二 MEC3623 Electrical Services II 41


Drawbacks of Current
Security Alarm Systems
– With the growth in the use of alarm systems, and the
display of fake alarm boxes to give the impression
that the building is protected, burglars are not so
easily frightened off as they used to be
– If there is a system installed, they may ignore the
alarm long enough to get away with valuable items
or they may stop the alarm sounding by attacking
the control box
– The system may deliberately be rendered
inoperative prior to entry of burglar
2017年8月29日星期二 MEC3623 Electrical Services II 42
Drawbacks of Current
Security Alarm Systems
– This may be an ‘inside job’ by a dishonest or
disgruntled employee, or it may be carried out by a
make-believe customer or a seemingly-casual visitor
to the building

2017年8月29日星期二 MEC3623 Electrical Services II 43


Requirements on Security
Alarm System
 The alarm signal must demand attention
– High priority must be given to freedom from false
alarms;
– The system must be resistant to being tampered with
prior to break-in (more important in business and
industrial premises than in domestic buildings);
– Control box must be robust enough to withstand
attack, or alternatively be hidden from sight;
– The rest of the system must also be resistant to de-
activation after entry has been accomplished
2017年8月29日星期二 MEC3623 Electrical Services II 44
Requirements on Security
Alarm System
 The alarm signal must demand attention
– The system should detect intruders; that is should
not be liable to breakdown, i.e. ‘fail safe’
– Its initial cost and running costs should be
commensurate with the degree of protection deemed
necessary

2017年8月29日星期二 MEC3623 Electrical Services II 45


Systems for Use within
Working Hours
 General perception of security system is
used in lock-up and-leave premises, i.e. for
use outside working hours
 The very success of security systems for
the silent hours has shifted attention by the
villain, and consequently by security
people, to working hours activities and
systems
2017年8月29日星期二 MEC3623 Electrical Services II 46
Systems for Use within
Working Hours
 Discriminate between friend and foe,
preferably without having to send
someone to the door each time to check, to
accept or reject, to open and close
 Lock the door for each personnel
movement

2017年8月29日星期二 MEC3623 Electrical Services II 47


Systems for Use within
Working Hours
 The concepts of door control, access
control personnel identification and
surveillance will be discussed in next set
of notes

2017年8月29日星期二 MEC3623 Electrical Services II 48


Kinds of Protection
 Points (or spot)
 Space (specific area)
 Perimeter

2017年8月29日星期二 MEC3623 Electrical Services II 49


Points
 Doors and windows in external walls,
internal doors where items of value are
displayed or stored
 Higher number of sensors will be required,
mostly for doors and windows
 Sensors for these are cheap and reliable
with low current consumption

2017年8月29日星期二 MEC3623 Electrical Services II 50


Points
 There are sensors least likely to be
triggered off accidentally when there is no
one on the premises to deal with the alarm

2017年8月29日星期二 MEC3623 Electrical Services II 51


Space (Specific Area)
 To cover area of rooms, corridors and
courtyards required fewer but more
elaborate sensors
 Liable to be activated by birds, animals,
paper blowing about, traffic passing, direct
or indirect sun light, air movement etc.
 When used outdoor they may be rendered
inoperative by weather
2017年8月29日星期二 MEC3623 Electrical Services II 52
Space (Specific Area)
 Precautions against these factors increase
the complexity of the devices
 They are needed for use alone, where
point sensors would be impractical, and as
back-up - burglars may keep away from
entry points and break in through the wall
or roof

2017年8月29日星期二 MEC3623 Electrical Services II 53


Perimeter
 Achieved by fixing sensors to fences and
walls to detect movement or vibration
 By invisible fence of beams radiated from
point to point designed so that the alarm is
actuated when the beam is broken
 The extent and complexity of the system
necessary depend on the degree of
protection required and form of the bldg
2017年8月29日星期二 MEC3623 Electrical Services II 54
Zone of Protection
 Five zones of intrusion detection can be
considered for system design
– Perimeter Penetration Detection
– Exterior zone of Detection
– Perimeter of Building or Room Protecting the
Assets
– Interior of the Building or Room
– At the Item being Protected

2017年8月29日星期二 MEC3623 Electrical Services II 55


Perimeter Penetration
Detection
 Usually at the perimeter fence
 Allows the longest response time if the
assets are located within a building
enclosing by a fence

2017年8月29日星期二 MEC3623 Electrical Services II 56


Exterior Zone of
Detection
 Provided in the area between the fence or
the property boundary and the assets or
facility being protected

2017年8月29日星期二 MEC3623 Electrical Services II 57


Perimeter of the Building or
Room Protecting the Assets
 Intended to detect anyone penetrating the
building or room
 Allows the longest response time for a
building that is not protected by an
exterior intrusion detection system

2017年8月29日星期二 MEC3623 Electrical Services II 58


The Interior of the
Building or Room
 To detect anyone who has entered the
building and is moving within the zone of
detection

2017年8月29日星期二 MEC3623 Electrical Services II 59


At the Item being
Protected
 For those who remove protected objects or
attempting to penetrate protected
containers

2017年8月29日星期二 MEC3623 Electrical Services II 60


At the Item being
Protected
 For those who remove protected objects or
attempting to penetrate protected
containers
 Allows the least response time, and should
be used together with other zones of
detection

2017年8月29日星期二 MEC3623 Electrical Services II 61


Design Philosophy
 The proper design procedures of a
complete security system are
– conduction of design requirement survey
– establishment of design criteria for intrusion
detection system
– assemble of components of the security system
– selection of the intrusion detection sensors and
alarm transmission and monitoring equipment
– establishment of system maintenance concept
2017年8月29日星期二 MEC3623 Electrical Services II 62
Design Requirement
Survey
 Evaluate all the features and circumstances
affecting the threat
 Discuss with the user the operation of the
premises

2017年8月29日星期二 MEC3623 Electrical Services II 63


Design Criteria
 Derived from the survey

2017年8月29日星期二 MEC3623 Electrical Services II 64


Assemble of Components
of the Security System
 Decide on what zone or zones of detection
should be used
 Intrusion detection sensors are designed to
provide one or more of five zones of
detection
 Select the appropriate intrusion detection
sensors
 Decide how the status of the intrusion
detection sensors will be monitored
2017年8月29日星期二 MEC3623 Electrical Services II 65
Assemble of Components
of the Security System
 There are several possibilities:-
– employ the services of a central alarm station
– use a proprietary alarm monitoring system
– use a telephone dialer; or
– use only a local audible alarm to annunciate the
alarms
 Decide on the alarm response force

2017年8月29日星期二 MEC3623 Electrical Services II 66


Assemble of Components
of the Security System
 Depends somewhat on the monitoring
system, and especially on the allowable
alarm response time
 Local law enforcement officers or security
guards, either central station guards or
proprietary guards, are normally used to
respond to intrusion alarms

2017年8月29日星期二 MEC3623 Electrical Services II 67


Assemble of Components
of the Security System
 A central station guard is usually
accompanied or joined by a local law
enforcement officer at the origin of the
alarm
 They must arrive at the alarm location
before the intruder penetrates the physical
barriers; otherwise the response force will
be totally ineffective
2017年8月29日星期二 MEC3623 Electrical Services II 68
Assemble of Components
of the Security System
 The designer should evaluate the penetration
resistance of the physical barriers and the zones
of detection selected for the intrusion detection
sensors to determine the maximum allowable
response time
 The response force should arrive at the asset
location within this time; or physical barriers
must be added to delay penetration or another
zone of detection must be added to provide
earlier detection
2017年8月29日星期二 MEC3623 Electrical Services II 69
Assemble of Components
of the Security System
 Another possibility is for the response
force to be relocated to improve their
response time

2017年8月29日星期二 MEC3623 Electrical Services II 70


System Maintenance
Concept
 Maintenance concept should be
established at the system planning phase
 Once the intrusion detection system is
installed, it will then be properly
maintained
 Maintenance can be contracted to an
equipment installing company, or
performed by an in-house maintenance
force
2017年8月29日星期二 MEC3623 Electrical Services II 71
System Maintenance
Concept
 If the intrusion detection system is leased,
maintenance should be part of the leasing
agreement
 Care should be taken to ensure
maintenance obligation is compatible with
the user's operating schedule

2017年8月29日星期二 MEC3623 Electrical Services II 72


Intrusion Detection and
Alarm Systems
 Basic components include:

– Detection devices;
– Wiring system;
– Warning devices; and
– Telephone warning devices.

2017年8月29日星期二 MEC3623 Electrical Services II 73


Intrusion Detection Devices
 Depending on usages and installation
methods, basic types are:
– Magnetic contact;
– Continuous wiring;
– Knock-out bar;
– Vibration detection;
– Breaking glass detector;
– Ultrasonic detector;

2017年8月29日星期二 MEC3623 Electrical Services II 74


Intrusion Detection Devices
– Infra-red detector;
– Microwave detector;
– Acoustic detector;
– Capacitive detector;
– Pressure mats;
– Underground pressure detectors; and
– Fibre optic signalling.

2017年8月29日星期二 MEC3623 Electrical Services II 75


Magnetic Contact
 Used mostly for detection of door or
window status
 Magnetic switches contain reed contacts
 Reed contacts held in closed position by a
permanent magnet fitted to the window or
door
 When the door or window moves the
magnet, reed contacts open
2017年8月29日星期二 MEC3623 Electrical Services II 76
Magnetic Contact
 This creates the alarm condition

2017年8月29日星期二 MEC3623 Electrical Services II 77


Continuous Wiring
 Embedded in wall, ceiling, floor or other
protected surfaces
 Continuous wiring carries an electric
current
 When the wire is broken or two wires of
opposite polarity touch, circuit is broken
 Alarm is created
2017年8月29日星期二 MEC3623 Electrical Services II 78
Knock-out Bar
 Knock-out bars are installed 100 mm apart
 Each bar holds a micro switch in the
closed position to complete the circuit
 Displacement of a bar creates an alarm
condition

2017年8月29日星期二 MEC3623 Electrical Services II 79


Vibration Detector
 Two forms
– Electromechanical (inertia detector); or
– Electronic transducer (seismic detector)
 Early warning device
 Creates alarm condition
– Before penetration of the defenses commences; or
– As the attack commences

2017年8月29日星期二 MEC3623 Electrical Services II 80


Breaking Glass Detector
 Lead foil strip fixed to the glass surface
 Acts as part of a closed circuit
 Supporting glass is broken, the circuit
breaks
 An alarm condition is created

2017年8月29日星期二 MEC3623 Electrical Services II 81


Ultrasonic Detector
 Two types

– Passive; and
– Active

2017年8月29日星期二 MEC3623 Electrical Services II 82


Passive Type
 Mainly uses for detecting glass breakage
 Only detects ultrasound generated by
breaking glass

2017年8月29日星期二 MEC3623 Electrical Services II 83


Active Type
 Rely on pressure of transmit sound signal
at a fixed frequency
 Monitor the signal reflected from the solid
objects
 Compare the frequency of the transmitted
signal with its reflected frequency

2017年8月29日星期二 MEC3623 Electrical Services II 84


Active Type
 Stationary objects return the signal at the
frequency transmitted
 Objects moving towards the transmitter
return with a signal of higher frequency
 Objects moving away return with a lower
frequency
 This frequency change create an alarm
condition
2017年8月29日星期二 MEC3623 Electrical Services II 85
Infra-red Detector
 Two types

– Passive type; and


– Active type

2017年8月29日星期二 MEC3623 Electrical Services II 86


Active Type IR Detector
 Comprises a transmitter and a receiver
 Transmitter sends a modulated IR beam to
the receiver, maintaining a closed circuit
 Alarm is created when the beam is
interrupted

2017年8月29日星期二 MEC3623 Electrical Services II 87


Passive Type IR Detector
 Measures the IR radiation received in set
narrow beams
 Level of radiation changes with
temperature and any unacceptable change
activates the alarm

2017年8月29日星期二 MEC3623 Electrical Services II 88


Microwave Detector
 Similar in principle to IR detector
 EM energy is transmitted in a cylindrical
beam
 Detector activates an alarm when the
received signal is changed by a physical
barrier moving through the beam
 In another application, “Doppler Effect” is
used
2017年8月29日星期二 MEC3623 Electrical Services II 89
Acoustic Detector
 Activates an alarm when it detects sound

2017年8月29日星期二 MEC3623 Electrical Services II 90


Capacitive Detector
 Can be volumetric or proximity type
 Air acts as an insulator
 Any change or movement in an enclosed
space will result in a change in the
capacitance of air
 This change is sensed and an alarm is
activated
2017年8月29日星期二 MEC3623 Electrical Services II 91
Pressure Mat
 Hidden under carpets in areas to be
treaded by intruder

2017年8月29日星期二 MEC3623 Electrical Services II 92


Underground Pressure
Detector
 2 parallel hydraulic fluid tubes about 1 m
apart lying just beneath the soil surface
 Pressure is at equilibrium in the two tubes
 Change in pressure when weight is applied
on ground is monitored to activate the
alarm

2017年8月29日星期二 MEC3623 Electrical Services II 93


Fibre Optic Signalling
 IR light signals pass through a continuous
fibre optic cable
 If the cable is curved or damaged, the
control elements sense a change in the
signal and activate the alarm

2017年8月29日星期二 MEC3623 Electrical Services II 94


Warning Devices
 Take many forms

– Audible Alarms;
– Visual Alarms.

 Function of it is to alert people or security


personnel when detecting devices are
activated by intruders

2017年8月29日星期二 MEC3623 Electrical Services II 95


Audible Alarms
 Sound audible alarm when actuated by
detecting devices
 Usually equip with an internal battery

2017年8月29日星期二 MEC3623 Electrical Services II 96


Visual Alarms
 Produce a continuous, flashing or rotating
light to be clearly seen over a large area
 Usually used together with audible alarms

2017年8月29日星期二 MEC3623 Electrical Services II 97


Access Control System
 Certain people should only be allowed
access to an area
 The most basic “stand alone” mechanical
keypads is used
 The lock incorporates a numeric plate
 To gain access, the correct number must
be entered in sequence
2017年8月29日星期二 MEC3623 Electrical Services II 98
Access Control System
 The numeric keypad controls an
electrically operated release or strike

2017年8月29日星期二 MEC3623 Electrical Services II 99


Card Access Control
System
 Considerations emphasize on

– The control system; and


– The types of card.

2017年8月29日星期二 MEC3623 Electrical Services II 100


Card Control System
 Individual encoded cards are fed into or
through readers adjacent to strategic
entries

2017年8月29日星期二 MEC3623 Electrical Services II 101


Card Control System
 The decision making process in the access
control reader includes:
– The card encoding and verifies current authorisation;
– The card number is allowed to enter the access point;
– The time for entry is valid; and
– The day of the week is valid.

2017年8月29日星期二 MEC3623 Electrical Services II 102


Card Control System
 The reader only grant access if all the
conditions are met
 The security can be increased by fitting a
keypad reader
 An individual has to possess a valid card
and the personal identification number
(PIN)

2017年8月29日星期二 MEC3623 Electrical Services II 103


Card Control System
 The card control system can be divided
into 2 sub-systems:

– The Distribution Intelligent System


– The Centrally Controlled Systems

2017年8月29日星期二 MEC3623 Electrical Services II 104


Distribution Intelligent
System
 The individual reader decides whether to
allow entry
 Effectively, a “stand alone” system
 Readers may be connected together and to
a central monitoring and control centre for
management purposes
 Possible to “download” from control
centre
2017年8月29日星期二 MEC3623 Electrical Services II 105
Distribution Intelligent
System
 Databases can be changed in memory
 Card readers can communicate with the
centre, informing all movements through
each floor
 Central management system can keep
historical record of all movements
 Reports can be printed as and when
necessary
2017年8月29日星期二 MEC3623 Electrical Services II 106
Centrally Controlled
System
 Readers are connected to a central
computer system
 The readers read the card and send the
information to the central computer
 Central computer makes the decision and
commands the reader to allow or deny
access accordingly

2017年8月29日星期二 MEC3623 Electrical Services II 107


Types of Access Cards
 Access cards can be divided into:

– Passive; and
– Active

2017年8月29日星期二 MEC3623 Electrical Services II 108


Access Card
 Uses a thin wire matrix sandwiched
between 2 plastic outer surfaces
 Offers better security with less chance of
duplication
 Readers are not so susceptible to
electromagnetic interference
 For economic reasons, magnetic stripe
cards are used
2017年8月29日星期二 MEC3623 Electrical Services II 109
Access Card
 Magnetic tape offers greater security
 The tape stripe within the card is
permanently coded with the purchasing
company’s identification during
manufacture
 Company logo, photo of the holder and
personal identification can be incorporated
into the card
2017年8月29日星期二 MEC3623 Electrical Services II 110
TV and Intercom Door
Entry System
 For vetting callers at G/F entrance
 The integration of TV camera in the
entrance call panel and the viewing screen
in the flat monitor
 Occupant can see and speak to the caller
without being observed

2017年8月29日星期二 MEC3623 Electrical Services II 111


TV and Intercom Door
Entry System
 Occupant can release the lock on the main
entrance door using a button on his/her
monitor

2017年8月29日星期二 MEC3623 Electrical Services II 112


Surveillance System
 Takes the form of Closed Circuit
Television (CCTV) System
 CCTV system comprises a remote camera
(observe and transmit) together with a
central monitor (receive and display)
 With multiple cameras, a switch is
selected to limit the number of monitors

2017年8月29日星期二 MEC3623 Electrical Services II 113


Surveillance System
 To move a camera, a form of control is
added
 When considering CCTV systems, the
factors to be observed are

2017年8月29日星期二 MEC3623 Electrical Services II 114


Surveillance System
 Level of lighting provided
– Daytime or night time, shaded, natural or artificial
 Viewing field required
– Fixed or adjustable, close or distant, wide or narrow
angle
 Picture quality required
– High or low resolution

2017年8月29日星期二 MEC3623 Electrical Services II 115


Surveillance System
 Environment the camera will be placed
– Clean or dirty, wet or dry, subject to vibration
 Type of control required
– Manual or automatic
 Type of display
– Constant, sequenced, movement activated, split
screen

2017年8月29日星期二 MEC3623 Electrical Services II 116


Surveillance System
 Type of recording equipment required
– Real time or time lapse, alarm activated

2017年8月29日星期二 MEC3623 Electrical Services II 117


Surveillance System
 Camera technologies are available to deal
with the requirements for operating in
lower light levels

2017年8月29日星期二 MEC3623 Electrical Services II 118


Watchman Tour System
 Manual watchman’s tour system for
surveillance of occupied area is conducted
on a regular basis
 The simplest type is non-electrical
 The watchman records the exact time at
any specific location
 Electrical system permit constant
supervision
2017年8月29日星期二 MEC3623 Electrical Services II 119
Watchman Tour System
 More effective where more than one
person on duty
 Such system shows on a panel the location
and progress of the watchman
 More advanced one with reader carried by
the watchman
 Magnetic tapes containing encoded
information are attached to wall surface
2017年8月29日星期二 MEC3623 Electrical Services II 120
Watchman Tour System
 Watchman slides the reader across the tape
to register the check points
 Information recorded in the reader are:
– The sequence of each patrolling;
– The locations registered; and
– The time the watchman read the tape.
 This system ensures the watchman
patrolled the destined locations

2017年8月29日星期二 MEC3623 Electrical Services II 121


Biometrics
 Biometrics deals with the measurement
and analysis of biological data
 Biometric technology is used to analyze
human distinctive characteristics which
include fingerprints, voice patterns, retinal
and facing scanning and hand
measurements
 A biometric device is used as part of a
biometric system
 It is a device by which a machine can read
2017年8月29日星期二 MEC3623 Electrical Services II 122
Biometrics
 Biometric devices are used to capture
biometric data form the individual, such as
fingerprints, DNA, eyes and voice
recognition
 These devices are very important and
make excellent security barriers because
they are very hard to forge
 These devices have in-built sensors
 Process it by matching it to an internal
2017年8月29日星期二 MEC3623 Electrical Services II 123
Biometrics
 The technology used is associated with the
authentication and identification of an
individual
 These devices are used in many different
ways ranging from security management
or as a security system to control the entry
and exit of certain areas
 The device is attached to a microcomputer
 Common biometric hardware devices
2017年8月29日星期二 MEC3623 Electrical Services II 124
Biometrics
 These devices interface with centralized
software processing systems such as BMS
 Most common biometric devices and
methods Signature Dynamics
– Typing Patterns
– Eye Scans
– Fingerprint recognition
– Voice Recognition
– Palm or Hand Geometry
– Facial Recognition
2017年8月29日星期二 MEC3623 Electrical Services II 125

You might also like