1 General Provisions
1.0.1 This code was formulated with a view to regulating the design of intrusion alarm system engineering, improving the quality of intrusion alarm system engineering and protecting the personal safety of citizens and safety of the national, collective and personal properties.
1.0.2 This code is applicable to the design of intrusion alarm system engineering of the new, rebuilt and extended various buildings (structures) and their groups for the purpose of safety precaution.
1.0.3 Construction of the intrusion alarm systems engineering shall be uniformly planned together with the design of the building and its strong/light current systems. It may be completed once or in steps according to the practical situation.
1.0.4 Intrusion alarm system engineering shall be provided with safety, reliability, openness, expandability and flexibility in application and shall live up to state-of-the-art technologies, economy and rationality, practicality and reliability.
1.0.5 Except for those requirements stipulated in this code, those in the current relevant technical standards of the nation also shall be complied with for the design of intrusion alarm system engineering.
2 Terms
2.0.1 Intruder alarm system (IAS)
Electronic system or network is used to detect and display behaviors intruding or trying to intrude the set condition area (including triggering the emergency alarm switches on purpose when facing the conditions of being hijacked or robbed or other emergent conditions through subjective judgment) and give out alarm messages by sensor technology and electronic information technology.
2.0.2 Alarm condition
State refers the system makes response and alarm when risks are detected.
2.0.3 Fault condition
It refers to the state in which the system can not work normally in line with the design requirement.
2.0.4 Tamper alarm
Alarm is caused by triggering tamper detectors.
2.0.5 Tamper device
Parts, components or partial of them are used to detect dismantling or opening the alarm system.
2.0.6 Set condition
Operation makes the entire or partial defence area of the system on alert.
2.0.7 Unset condition
Operation makes the entire or partial defence area of the system off alert.
2.0.8 Defence area
It refers to area where the protected objects are protected by the detector (including the emergency alarm switches) and the alarm positions can be definitely displayed on the controllers.
2.0.9 Perimeter
It refers to the boundary of area requiring physical protection or/and electronic protection.
2.0.10 Surveillance area
Area is between the boundary of protection area and the perimeter guide line composed by the physical perimeter protection system and/or electronic perimeter protection system.
2.0.11 Protection area
Area or position is allowed to access by the public and is the location of the protected objects.
2.0.12 Restricted area
Protection area or position is disallowed to access (or peek) by unauthorized personnel.
2.0.13 Blind zone
Area is not covered by security and protection systems in the warning limit.
2.0.14 Leakage alarm
The system fails to alarm or display when the intrusion behavior has already occurred.
2.0.15 False alarm
Alarm signals are sent due to accidental touching the manual devices or automatic devices which respond to the un-designed alarm condition, malfunction or damage of parts and misoperation of the operators.
2.0.16 Check to alarm
Method is used to check the authenticity of locale alarm by sound and/or image information.
2.0.17 Emergency alarm
Alarm is triggered on purpose by uses when they are facing being hijacked or robbed or other critical conditions through subjective judgment.
1 General Provisions
2 Terms
3 Basic Provisions
4 System Constitutions
5 System Design
5.1 Design of Longitudinal-depth Protection Systems
5.2 Function and Performance Design of System
6 Equipment Selection and Installation
6.1 Detector
6.2 Controller
6.3 Wireless Devices
6.4 Management Software
7 Transmission Mode, Wire Cable Selection And Wiring
7.1 Transmission Mode
7.2 Wire Cable Selection
7.3 Wiring Design
8 Power Supply, Lightning Protection and Grounding
9 System Safety, Reliability, ELECTROMAGNETIC COMPATIBILITY and Environmental Compatibility
10 Monitoring Center
Annex A Design Process and Depth
Annex B Selection Requirements of Common Intrusion Detector
Wording Explanation
1 General Provisions
1.0.1 This code was formulated with a view to regulating the design of intrusion alarm system engineering, improving the quality of intrusion alarm system engineering and protecting the personal safety of citizens and safety of the national, collective and personal properties.
1.0.2 This code is applicable to the design of intrusion alarm system engineering of the new, rebuilt and extended various buildings (structures) and their groups for the purpose of safety precaution.
1.0.3 Construction of the intrusion alarm systems engineering shall be uniformly planned together with the design of the building and its strong/light current systems. It may be completed once or in steps according to the practical situation.
1.0.4 Intrusion alarm system engineering shall be provided with safety, reliability, openness, expandability and flexibility in application and shall live up to state-of-the-art technologies, economy and rationality, practicality and reliability.
1.0.5 Except for those requirements stipulated in this code, those in the current relevant technical standards of the nation also shall be complied with for the design of intrusion alarm system engineering.
2 Terms
2.0.1 Intruder alarm system (IAS)
Electronic system or network is used to detect and display behaviors intruding or trying to intrude the set condition area (including triggering the emergency alarm switches on purpose when facing the conditions of being hijacked or robbed or other emergent conditions through subjective judgment) and give out alarm messages by sensor technology and electronic information technology.
2.0.2 Alarm condition
State refers the system makes response and alarm when risks are detected.
2.0.3 Fault condition
It refers to the state in which the system can not work normally in line with the design requirement.
2.0.4 Tamper alarm
Alarm is caused by triggering tamper detectors.
2.0.5 Tamper device
Parts, components or partial of them are used to detect dismantling or opening the alarm system.
2.0.6 Set condition
Operation makes the entire or partial defence area of the system on alert.
2.0.7 Unset condition
Operation makes the entire or partial defence area of the system off alert.
2.0.8 Defence area
It refers to area where the protected objects are protected by the detector (including the emergency alarm switches) and the alarm positions can be definitely displayed on the controllers.
2.0.9 Perimeter
It refers to the boundary of area requiring physical protection or/and electronic protection.
2.0.10 Surveillance area
Area is between the boundary of protection area and the perimeter guide line composed by the physical perimeter protection system and/or electronic perimeter protection system.
2.0.11 Protection area
Area or position is allowed to access by the public and is the location of the protected objects.
2.0.12 Restricted area
Protection area or position is disallowed to access (or peek) by unauthorized personnel.
2.0.13 Blind zone
Area is not covered by security and protection systems in the warning limit.
2.0.14 Leakage alarm
The system fails to alarm or display when the intrusion behavior has already occurred.
2.0.15 False alarm
Alarm signals are sent due to accidental touching the manual devices or automatic devices which respond to the un-designed alarm condition, malfunction or damage of parts and misoperation of the operators.
2.0.16 Check to alarm
Method is used to check the authenticity of locale alarm by sound and/or image information.
2.0.17 Emergency alarm
Alarm is triggered on purpose by uses when they are facing being hijacked or robbed or other critical conditions through subjective judgment.
Contents of GB 50394-2007
1 General Provisions
2 Terms
3 Basic Provisions
4 System Constitutions
5 System Design
5.1 Design of Longitudinal-depth Protection Systems
5.2 Function and Performance Design of System
6 Equipment Selection and Installation
6.1 Detector
6.2 Controller
6.3 Wireless Devices
6.4 Management Software
7 Transmission Mode, Wire Cable Selection And Wiring
7.1 Transmission Mode
7.2 Wire Cable Selection
7.3 Wiring Design
8 Power Supply, Lightning Protection and Grounding
9 System Safety, Reliability, ELECTROMAGNETIC COMPATIBILITY and Environmental Compatibility
10 Monitoring Center
Annex A Design Process and Depth
Annex B Selection Requirements of Common Intrusion Detector
Wording Explanation