1 General Provisions
1.0.1 This code was formulated in order to standardize the design of access control systems engineering, improve the quality of access control systems engineering, and protect the personal safety and the security of the state, collective and personal property.
1.0.2 This code is applicable to the access doors of various newly-built, reconstructed and extended buildings (structures) as well as their colony with a purpose of security and protection.
1.0.3 The construction of access control systems engineering shall have unified planning with the design of its strong and light-current system, they may be built once or in steps according to the practical situations.
1.0.4 The access control system shall be featured of security, reliability, openness, expandability and application flexibility, and also shall realize state-of-art technology, economic feasibility, practicality and reliability.
1.0.5 The design of access control systems engineering shall not only comply with this code, but also shall comply with those specified in the current relevant national technical standards and codes.
2 Terms
2.0.1 Access control system (ACS)
The self-defined symbol or/and pattern identification technique shall be adopted to identify the objects at access and control the electronic system or network at access that execute the start and stop of the structure.
2.0.2 Object
The staff and/or article that pass through the access door will be controlled.
2.0.3 Object information
It is the recognizable characteristic that is endowed to the object or is the characteristic information of the object. Figure, characters, diagram and picture, human body biologic characteristic, article characteristic, and time all may become the object information.
2.0.4 Key
The information and/or its bearer that are used for operating the access control system and obtaining the accessing right.
The information represented by the key may be featured of such uniterm or multiterm functions as status of person and/or matter, accessing authority, and authority on the operation of system.
2.0.5 Self-defined diagnostic information identification
1 Human coding identification
It is a kind of identification that obtains the personal coded information of object staff through coded identification (input) equipment.
2 Article coding identification
It is a kind of identification of article characteristic by reading the appurtenant code bearer of this object article with coded identification (input) equipment.
2.0.6 Pattern characteristic identification
1 Human body biologic characteristic
It is the characteristic such as the posture nude characteristics or behaviors and those can not or are hard to be simulated of the object individual staff that may be changed into the specific characteristic of the object.
2 Human body biologic characteristic identification
It is a kind of identification on the biologic characteristic of the object staff that is obtained with biological measurement (statistics) method.
3 Article characteristic
It means the specific physical and chemical characteristic or the characteristic that may be changed into the particular characteristic of the object article.
4 Article characteristic identification
It is the identification carried on the characteristic of slated articles with identification equipment.
2.0.7 Key-code, amount of key-code, difference of key-code
The object information that can form one single key is the key-code.
The amount of all the key-codes that the system may characterize theoretically is the amount of system key-code. If one system has different kinds of keys with equal authorities, the amount of each kind of key-code shall be calculated respectively, and the smallest amount of key-code shall be taken as the amount of system key-code.
The difference among the object information that can form into single keys is the difference of key-code.
2.0.8 Key authorization
It means to permit operation of one or a certain key or some keys in the one system.
2.0.9 False identification
It means the system indentified its a certain key as its other keys, including false entering identification and false refuse identification, and generally is represented in the false identification ratio.
2.0.10 Refuse identification
It means the system does not have any identification response to one key of normal operation, which generally is represented in refuse identification ratio.
2.0.11 Identification locale
The place and/or environment where the key is read and indentified
2.0.12 Locale identify equipment
The equipment (device) with protection surface that can be contacted by the in and out objects at the identification site
2.0.13 Protection surface
It the structural surface of the installed equipments at identification locale to protected against such possible man-made damaged technical opening.
2.0.14 Anti destroyed ability
It is ability of the equipment (device) that with protection surface to defend against the destructive attack of specialized technical personnel with specified tool after the system is installed, which also means the anti-opened ability of access doors (being represented in the net working time required for protecting the access door from being opened).
2.0.15 Anti technical opened ability
It is ability of the equipment (device) that with protection surface to defend against the technical opening carried out by specialized technical personnel with specified tool after the system is installed (make the system open through false identification or malfunction with such methods as inspection, scanning and interference), which also means the anti-opened ability of access doors (being represented in the net working time required for protecting the access door from being opened).
2.0.16 Combination identification
It is a kind of recognition mode for the system to adopt two or more than two characteristic identification modes towards in and out behaviors of one object and also carry out logic judgment.
2.0.17 Anti pass-back
It is a kind of control mode to restrict one object that has pass through the access door by normal operation from passing through this access door again by operation not through normal passing track.
2.0.18 Multi-identification control
It is a kind of control mode that the system completes the controlling of one access door after identifying two or more object information by adopting with certain identification mode at the same time or within an agreed time.
2.0.19 Remote approve control
It is a kind of control mode that the system operating staff re-identifies the object that is able to pass the system identification and allowed to pass in and out not at the identification locale (generally the control center) and remotely controls to close or open one access door aiming at this object.
2.0.20 Controlled area, the same controlled area, high level controlled area
If one area only has one access door (or several access doors of the same function), this area is regarded as the controlled area of this (these) access door, which means that the corresponding area where is controlled by one (several access doors of the same functions) access door is its (their) controlled area.
The controlled areas that have same accessing controlling are named as the same controlled area mutually.
Other controlled areas that have much stricter accessing restricting that a certain controlled area is named as a high level controlled area in relation to this controlled area.
1 General Provisions
2 Terms
3 Basic Provisions
4 System Compositions
5 Function and Performance Design of System
5.1 General Provisions
5.2 Function and Performance Design of Each Part
6 Types and Installation of Equipments
7 Transmittal Mode, Types of Wire Cables and Wiring
8 Power Supply, Lightning Protection and Ground Connection
9 Safety, Reliability, Electromagnetic Compatibility and Environmental Compatibility of System
10 Monitoring Centre
Annex A Design Process and Depth
Annex B Classification of the Protection Grade of System
Annex C Type Requirements of Common Identify Equipments
Annex D Type Requirements of Common Actuating Equipments
Wording Explanations
1 General Provisions
1.0.1 This code was formulated in order to standardize the design of access control systems engineering, improve the quality of access control systems engineering, and protect the personal safety and the security of the state, collective and personal property.
1.0.2 This code is applicable to the access doors of various newly-built, reconstructed and extended buildings (structures) as well as their colony with a purpose of security and protection.
1.0.3 The construction of access control systems engineering shall have unified planning with the design of its strong and light-current system, they may be built once or in steps according to the practical situations.
1.0.4 The access control system shall be featured of security, reliability, openness, expandability and application flexibility, and also shall realize state-of-art technology, economic feasibility, practicality and reliability.
1.0.5 The design of access control systems engineering shall not only comply with this code, but also shall comply with those specified in the current relevant national technical standards and codes.
2 Terms
2.0.1 Access control system (ACS)
The self-defined symbol or/and pattern identification technique shall be adopted to identify the objects at access and control the electronic system or network at access that execute the start and stop of the structure.
2.0.2 Object
The staff and/or article that pass through the access door will be controlled.
2.0.3 Object information
It is the recognizable characteristic that is endowed to the object or is the characteristic information of the object. Figure, characters, diagram and picture, human body biologic characteristic, article characteristic, and time all may become the object information.
2.0.4 Key
The information and/or its bearer that are used for operating the access control system and obtaining the accessing right.
The information represented by the key may be featured of such uniterm or multiterm functions as status of person and/or matter, accessing authority, and authority on the operation of system.
2.0.5 Self-defined diagnostic information identification
1 Human coding identification
It is a kind of identification that obtains the personal coded information of object staff through coded identification (input) equipment.
2 Article coding identification
It is a kind of identification of article characteristic by reading the appurtenant code bearer of this object article with coded identification (input) equipment.
2.0.6 Pattern characteristic identification
1 Human body biologic characteristic
It is the characteristic such as the posture nude characteristics or behaviors and those can not or are hard to be simulated of the object individual staff that may be changed into the specific characteristic of the object.
2 Human body biologic characteristic identification
It is a kind of identification on the biologic characteristic of the object staff that is obtained with biological measurement (statistics) method.
3 Article characteristic
It means the specific physical and chemical characteristic or the characteristic that may be changed into the particular characteristic of the object article.
4 Article characteristic identification
It is the identification carried on the characteristic of slated articles with identification equipment.
2.0.7 Key-code, amount of key-code, difference of key-code
The object information that can form one single key is the key-code.
The amount of all the key-codes that the system may characterize theoretically is the amount of system key-code. If one system has different kinds of keys with equal authorities, the amount of each kind of key-code shall be calculated respectively, and the smallest amount of key-code shall be taken as the amount of system key-code.
The difference among the object information that can form into single keys is the difference of key-code.
2.0.8 Key authorization
It means to permit operation of one or a certain key or some keys in the one system.
2.0.9 False identification
It means the system indentified its a certain key as its other keys, including false entering identification and false refuse identification, and generally is represented in the false identification ratio.
2.0.10 Refuse identification
It means the system does not have any identification response to one key of normal operation, which generally is represented in refuse identification ratio.
2.0.11 Identification locale
The place and/or environment where the key is read and indentified
2.0.12 Locale identify equipment
The equipment (device) with protection surface that can be contacted by the in and out objects at the identification site
2.0.13 Protection surface
It the structural surface of the installed equipments at identification locale to protected against such possible man-made damaged technical opening.
2.0.14 Anti destroyed ability
It is ability of the equipment (device) that with protection surface to defend against the destructive attack of specialized technical personnel with specified tool after the system is installed, which also means the anti-opened ability of access doors (being represented in the net working time required for protecting the access door from being opened).
2.0.15 Anti technical opened ability
It is ability of the equipment (device) that with protection surface to defend against the technical opening carried out by specialized technical personnel with specified tool after the system is installed (make the system open through false identification or malfunction with such methods as inspection, scanning and interference), which also means the anti-opened ability of access doors (being represented in the net working time required for protecting the access door from being opened).
2.0.16 Combination identification
It is a kind of recognition mode for the system to adopt two or more than two characteristic identification modes towards in and out behaviors of one object and also carry out logic judgment.
2.0.17 Anti pass-back
It is a kind of control mode to restrict one object that has pass through the access door by normal operation from passing through this access door again by operation not through normal passing track.
2.0.18 Multi-identification control
It is a kind of control mode that the system completes the controlling of one access door after identifying two or more object information by adopting with certain identification mode at the same time or within an agreed time.
2.0.19 Remote approve control
It is a kind of control mode that the system operating staff re-identifies the object that is able to pass the system identification and allowed to pass in and out not at the identification locale (generally the control center) and remotely controls to close or open one access door aiming at this object.
2.0.20 Controlled area, the same controlled area, high level controlled area
If one area only has one access door (or several access doors of the same function), this area is regarded as the controlled area of this (these) access door, which means that the corresponding area where is controlled by one (several access doors of the same functions) access door is its (their) controlled area.
The controlled areas that have same accessing controlling are named as the same controlled area mutually.
Other controlled areas that have much stricter accessing restricting that a certain controlled area is named as a high level controlled area in relation to this controlled area.
Contents of GB 50396-2007
1 General Provisions
2 Terms
3 Basic Provisions
4 System Compositions
5 Function and Performance Design of System
5.1 General Provisions
5.2 Function and Performance Design of Each Part
6 Types and Installation of Equipments
7 Transmittal Mode, Types of Wire Cables and Wiring
8 Power Supply, Lightning Protection and Ground Connection
9 Safety, Reliability, Electromagnetic Compatibility and Environmental Compatibility of System
10 Monitoring Centre
Annex A Design Process and Depth
Annex B Classification of the Protection Grade of System
Annex C Type Requirements of Common Identify Equipments
Annex D Type Requirements of Common Actuating Equipments
Wording Explanations