ImageVerifierCode 换一换
格式:PDF , 页数:36 ,大小:1.16MB ,
资源ID:629570      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-629570.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(CLC TS 50131-2-10-2014 Alarm systems - Intrusion and hold-up systems - Part 2-10 Intrusion detectors - Lock state contacts (magnetic).pdf)为本站会员(testyield361)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

CLC TS 50131-2-10-2014 Alarm systems - Intrusion and hold-up systems - Part 2-10 Intrusion detectors - Lock state contacts (magnetic).pdf

1、BSI Standards PublicationAlarm systems Intrusion and hold-up systemsPart 2-10: Intrusion detectors Lock state contacts (magnetic)PD CLC/TS 50131-2-10:2014National forewordThis Published Document is the UK implementation of CLC/TS 50131-2-10:2014.The UK participation in its preparation was entrusted

2、by TechnicalCommittee GW/1, Electronic security systems, to Subcommittee GW/1/1,Alarm components.A list of organizations represented on this committee can be obtained onrequest to its secretary.This publication does not purport to include all the necessary provisions ofa contract. Users are responsi

3、ble for its correct application. The British Standards Institution 2014.Published by BSI Standards Limited 2014ISBN 978 0 580 82745 7ICS 13.320Compliance with a British Standard cannot confer immunity fromlegal obligations.This Published Document was published under the authority of theStandards Pol

4、icy and Strategy Committee on 31 May 2014.Amendments/corrigenda issued since publicationDate Text affectedPUBLISHED DOCUMENTPD CLC/TS 50131-2-10:2014TECHNICAL SPECIFICATION CLC/TS 50131-2-10 SPCIFICATION TECHNIQUE TECHNISCHE SPEZIFIKATION January 2014 CENELEC European Committee for Electrotechnical

5、Standardization Comit Europen de Normalisation Electrotechnique Europisches Komitee fr Elektrotechnische Normung CEN-CENELEC Management Centre: Avenue Marnix 17, B - 1000 Brussels 2014 CENELEC - All rights of exploitation in any form and by any means reserved worldwide for CENELEC members. Ref. No.

6、CLC/TS 50131-2-10:2014 E ICS 13.320 English version Alarm systems - Intrusion and hold-up systems - Part 2-10: Intrusion detectors - Lock state contacts (magnetic) Systmes dalarme - Systmes dalarme contre lintrusion et les hold-up - Partie 2-10: Dtecteurs dintrusion - Contact dtat de verrouillage (m

7、agntique) Alarmanlagen - Einbruch- und berfallmeldeanlagen - Teil 2-10: Einbruchmelder - Verschluss- und ffnungsberwachungskontakte (magnetisch) This Technical Specification was approved by CENELEC on 2013-12-02. CENELEC members are required to announce the existence of this TS in the same way as fo

8、r an EN and to make the TS available promptly at national level in an appropriate form. It is permissible to keep conflicting national standards in force. CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic, Denmark, Estonia

9、, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the United Kingdom. PD CLC/TS 50131-2-10:2

10、014CLC/TS 50131-2-10:2014 2 Contents Page Foreword . 4 Introduction . 5 1 Scope 6 2 Normative references 6 3 Terms, definitions and abbreviations 7 3.1 Terms and definitions . 7 3.2 Abbreviations . 8 4 Functional requirements. 9 4.1 Events . 9 4.2 Signals or messages . 9 4.3 Detection 10 4.4 Operati

11、onal requirements . 11 4.5 Tamper security . 11 4.6 Electrical requirements . 13 4.7 Environmental classification and conditions . 14 5 Marking, identification and documentation 15 5.1 Marking and/or identification . 15 5.2 Documentation 15 6 Testing 15 6.1 Generalities 15 6.2 General test condition

12、s. 15 6.3 Basic test of detection capability 16 6.4 Verification of detection performance . 16 6.5 Switch-on delay, time interval between signals, and indication of detection . 17 6.6 Tamper security . 17 6.7 Electrical tests . 19 6.8 Environmental classification and conditions . 20 6.9 Marking, ide

13、ntification and documentation 22 Annex A (normative) Dimensions EN 50131-2-3, Alarm systems Intrusion and hold-up systems Part 2-3: Requirements for microwave detectors; EN 50131-2-4, Alarm systems Intrusion and hold-up systems Part 2-4: Requirements for combined passive infrared and microwave detec

14、tors; EN 50131-2-5, Alarm systems Intrusion and hold-up systems Part 2-5: Requirements for combined passive infrared and ultrasonic detectors; EN 50131-2-6, Alarm systems Intrusion and hold-up systems Part 2-6: Opening contacts (magnetic); CLC/TS 50131-2-8, Alarm systems Intrusion and hold-up system

15、s Part 2-8: Intrusion detectors Shock detectors; CLC/FprTS 50131-2-9, Alarm systems Intrusion and hold-up systems Part 2-9: Intrusion detectors Active infrared beam detectors; CLC/TS 50131-2-10, Alarm systems Intrusion and hold-up systems Part 2-10: Intrusion detectors Lock state contacts (magnetic)

16、 the present document; EN 50131-2-7-1, Alarm systems Intrusion and hold-up systems Part 2-7-1: Intrusion detectors Glass break detectors (acoustic); EN 50131-2-7-2, Alarm systems Intrusion and hold-up systems Part 2-7-2: Intrusion detectors Glass break detectors (passive); EN 50131-2-7-3, Alarm syst

17、ems Intrusion and hold-up systems Part 2-7-3: Intrusion detectors Glass break detectors (active). Attention is drawn to the possibility that some of the elements of this document may be the subject of patent rights. CENELEC and/or CEN shall not be held responsible for identifying any or all such pat

18、ent rights. PD CLC/TS 50131-2-10:2014CLC/TS 50131-2-10:2014 5 Introduction This Technical Specification applies to lock state contacts (magnetic) used as part of intrusion and hold-up alarm systems (I BTD Basic Test of Detection capability; PD CLC/TS 50131-2-10:2014CLC/TS 50131-2-10:2014 9 DC Direct

19、 Current; EMC Electromagnetic Compatibility; RFID Radio Frequency Identification. 4 Functional requirements 4.1 Events The detector shall respond to events in accordance with Table 1 and as defined in this Clause 4. Table 1 Events to be processed and main functions to be provided by grade Event to b

20、e processed and functions to be provided Grade 1 2 3 4 Break distance exceeded M M M M Inside make distance M M M M Remote enable of detection indication aOp Op M M Connecting field interference Op Op M M Prevention and detection of access to the inside of the detector OpbMcMcMcRemoval from the moun

21、ting surfacedOp M M M Low power supply voltageeOp Op M M Total loss of external powerfM M M M Matched pairs, coding and encryptionOp Op M gM gKey M = Mandatory Op = Optional a Only required if detection indicator present. b Generation of a tamper signal for opening by normal means is not required. c

22、 Not required for sealed lock state contacts according to 4.5.2. d Mandatory for wire-free at grades 2, 3 and 4; mandatory for all grade 4 types, optional for wired grades 1, 2 and 3. e See 4.6.7. f See 4.6.6. g See 4.5.5. 4.2 Signals or messages The response to the signals or messages generated by

23、the detector is determined by the I at least one of these signals or messages (Intrusion or/and Tamper or/and Fault) shall be generated or an independent signal or message shall be generated. b Required only if the make and break distances are greater than twice the distances specified by the manufa

24、cturer (see 6.6.4); either intrusion AND fault signals or messages, OR an independent signal or message shall be generated. c See 4.6.7. d See 4.6.6. 4.3 Detection 4.3.1 Detection performance 4.3.1.1 Generalities The operating parameters of the detector shall be verified as specified by the manufact

25、urer for the axes of movement shown in Annex D. The operating parameters shall be defined under the condition that a successful locking position is ensured. The manufacturer shall clearly state in the product documentation all removal/break and approach/make distances including their tolerance range

26、 for each distance in order to specify all potential variances due to product design and manufacturing. Furthermore, the manufacturer shall clearly state as well in the product documentation any special limitation concerning installation e.g. a prohibited area between a surface on the detector and t

27、he minimum make distance. 4.3.1.2 Removal/break distance The detector shall generate an intrusion signal or message at the removal/break distance specified by the manufacturer. This distance shall be specified for all normal operating axes. If the detector is designed for installation on ferromagnet

28、ic surfaces or in ferromagnetic material, the removal/break distance shall also be specified for all normal operating axes when the detector is mounted using the material as specified in Annex E. PD CLC/TS 50131-2-10:2014CLC/TS 50131-2-10:2014 11 4.3.1.3 Approach/make distance The detector shall gen

29、erate a reverse signal or message at the minimum separation distance(s) specified by the manufacturer. This distance(s) shall be specified for all normal operating axes. If the detector is designed for installation on ferromagnetic surfaces or in ferromagnetic material, the approach/make distance sh

30、all be specified for all normal operating axes when the detector is mounted using the material as specified in Annex E. 4.3.2 Indication of detection When a detection indicator is provided to show when an intrusion signal or message is generated and in normal operation visible (e.g. surface mounted

31、contacts) when installed according to the manufacturers instructions, this indicator shall be capable of being enabled and disabled. The adjustment to enable or disable this indication locally within the detector shall only be accessible when the detector is opened by normal means, in case of openin

32、g is required. A detector at grade 3 or grade 4 shall be capable of receiving indication enable and disable commands from the CIE when such an indicator is present, according to clause one of this paragraph. 4.4 Operational requirements 4.4.1 Time interval between intrusion signals or messages Detec

33、tors using wired interconnections shall be able to provide an intrusion signal or message not more than 15 s after the end of the preceding intrusion signal or message. Detectors using wire free interconnections shall be able to provide an intrusion signal or message after the end of the preceding i

34、ntrusion signal or message within the following times: Grade 1 300 s; Grade 2 180 s; Grade 3 30 s; Grade 4 15 s. 4.4.2 Switch on delay Where a detector requires an internal or external power supply in accordance with 4.6, the detector shall meet all functional requirements within 180 s of the power

35、supply reaching its nominal voltage. 4.4.3 Fault condition signals A detector shall generate a fault signal or message in accordance with the manufacturers specification and the provisions of Table 2 in the presence of a fault condition, according to Table 1, or as a result of an internal self-test,

36、 if this feature is provided. 4.5 Tamper security 4.5.1 Tamper security requirements All terminals and means of mechanical and electronic adjustments shall be located within the detectors housings. The tamper security requirements for each grade of detector are shown in Table 1. PD CLC/TS 50131-2-10

37、:2014CLC/TS 50131-2-10:2014 12 4.5.2 Prevention and detection of access to the inside of the detector through covers and existing holes Access holes shall not allow interference with the operation of the detector by probing with commonly available tools. Damage shall not be caused that would prevent

38、 normal operation. If the detector can be opened, a tool shall be required to open the unit. For grades 2, 3 and 4 detectors all covers giving access to components that could adversely affect the operation of the detector shall be fitted with a tamper detection device that shall generate signals or

39、messages in accordance with Table 2. It shall not be possible to gain such access without generating a tamper signal or message or causing visible damage. Sealed contacts do not require the means to detect access to the inside of the detector. 4.5.3 Detection of removal from the mounting surface Mea

40、ns shall be provided which generates a tamper signal or message in accordance with Table 2 if the detector is removed from the mounting surface. Operation of the tamper detection means shall not be compromised by deliberate tamper actions. The means shall activate before access can be gained to it.

41、4.5.4 Magnetic or electromagnetic field interference When the detector is mounted in accordance with the manufacturers instructions and is subject to the presence of an external field, which is based on the same physical principal as the connecting field (e.g. magnetic or electromagnetic) generated

42、by: the interference test unit as specified in Annex A and one interference test unit which is identical to the corresponding unit, each applied to the faces of the detector according to Annex F for purely magnetic field based products (one after one) to generate an external connecting field; an int

43、erference test unit based on the same physical principal and digital identification means (e.g. tag number provided by a RFID field, if encryption is not provided) applied to the faces of the detector according to Annex F to generate an external connecting field; the detector shall either: a) be imm

44、une to any influence by each of the interference test units and continue to operate normally with the make and break distances not exceeding twice those specified in accordance with 4.3.1, or b) generate an intrusion, and/or tamper, and/or fault, and/or other independent signal or message in accorda

45、nce with Table 2 when the make or break distances exceed twice those specified in accordance with 4.3.1; these signals or messages may be generated either on application of the interference test unit or when the corresponding unit has returned to its original installed position. NOTE The signals or

46、messages generated by a grade 4 detector are intended to be used by the I alternatively, for Grade 3 products, the process unit shall stay in the state that represents an intrusion event. PD CLC/TS 50131-2-10:2014CLC/TS 50131-2-10:2014 13 4.5.5 Matched pairs, coding and encryption If a grade 4 detec

47、tor is a purely magnetic field based product, it shall consist of a matched pair of switch component and corresponding unit or similar means. The means of matching shall have a minimum of 8 differs. It shall not be possible to determine the specific pair identity by visual inspection of the detector

48、. If the connection between the process and the corresponding unit relies purely on digital identification means (e.g. tag number provided by a RFID field), it shall not be easily possible to simply read out the digital identification information and to generate a copy of the unit that holds the dig

49、ital identification information. This applies to grade 3 and grade 4 digital identification means based products. In such cases, encryption, rolling code or other protection mechanisms shall provide a certain level of security. 4.6 Electrical requirements 4.6.1 Grade dependencies The requirements of 4.6.2 to 4.6.5 only apply to detectors having external power to operate the components of the detector. Table 3 Electrical requirements Test Grade 1 Grade 2 Gra

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1