Technical requirements for intrusion control system

Technical requirements for intrusion control system
1 Scope This standard specifies the general technical requirements for intrusion alarm systems (manual and passive) that protect users, property, and the environment, and is the basic basis for the design, installation, and acceptance of intrusion alarm systems.
This standard applies to intrusion alarm systems inside and outside buildings. This standard does not involve the remote center, nor does it include the loading and unloading of communication data between the intrusion alarm system and the remote center.
2 Normative reference documents The clauses in the following documents become the clauses of this standard through the quotation of this standard. For dated reference documents, all subsequent amendments (not including errata content) or revisions are not applicable to this standard. However, parties that have reached an agreement based on this standard are encouraged to study whether the latest versions of these documents can be used . For the cited documents without date, the latest version is applicable to this standard.
GB 10408.1 Intrusion detector Part 1: General requirements (idt IEC 60839-2-2)
GB 10408.2 Intrusion detector Part 2: Ultrasonic Doppler detector for indoor use (idt IEC 60839-2-4)
GB 10408.3 Intrusion detector Part 3: Microwave Doppler detector for indoor use (idt IEC 60839-2-5)
GB 10408.4 Intrusion detector Part 5: Passive infrared detector for indoor use (idt IEC 60839-2-3)
GB 10408.5 Intrusion detector Part 4: Active infrared intrusion detector (idt IEC 60839-2-6)
GB 10408.6 Combined microwave and passive infrared intrusion detector
GB 12663 General technical requirements for anti-theft alarm controller
GB 15207 Video Intrusion Alarm
GB 15209 Magnetic switch intrusion detector
GB / T 15211 Environmental Test of Alarm System
GB 15407 Technical requirements and test specifications for shielded microwave intrusion detectors (idt IEC 60839-1-2)
GB / T 15408 Alarm system power supply device, test method and performance specification (idt IEC 60839-1-2)
GB / T 16572 anti-theft alarm center console
GB 16796 Safety requirements and test methods for security and alarm equipment
GB / T 17626.2-1998 Electromagnetic compatibility test and measurement technology Electrostatic discharge immunity test
GB / T 17626.3-1998 Electromagnetic Compatibility Test and Measurement Technology Radio Frequency Electromagnetic Field Radiation Immunity Test
GB / T 17626.4-1998 Electromagnetic compatibility test and measurement technology Electrical fast transient burst immunity test
GB / T 17626.5-1999 EMC test and measurement technology surge immunity test
GB / T 17626.11-1999 Electromagnetic compatibility test and measurement technology Voltage sag, short interruption and voltage change immunity test
GA / T 74 general graphical symbols for security systems
GA / T 75 safety precautions engineering procedures and requirements
IEC 60839-5 Alarm System Part 5: Technical Requirements for Alarm Signal Transmission System
IEC 60839-7 Alarm System Part 7: Serial Data Interface Information Format and Protocol in Alarm Transmission System
3 Terms and definitions The following terms and definitions apply to this standard
3.1 Alarm
Warn when there is a serious threat to life, property or the environment. [IEC 60839-1-1]
3.2 Intrusion alarm system
An electronic system or network used to detect illegal intrusions in fortified areas and issue alarm signals. [IEC 60839-1-1]
3.3 normal state normal condiTIon
The alarm system is in a fully usable state without any other limited circumstances. [IEC 60839-1-1]
3.4 Alarm status alarm condiTIon
The state of an alarm system or part of it in response to a hazard. [IEC 60839-1-1]
3.5 Fault state fault condiTIon
The state of the system that prevents the alarm system from working in accordance with the technical requirements of the relevant standards. [IEC 60839-1-1]
3.6 Test status test condiTIon
The normal function of the system is used as the alarm system status for the test. [IEC 60839-1-1]
3.7 Disconnection condition
The state of the alarm system intentionally created makes part of the system inoperable. [IEC 60839-1-1]
3.8 Alarm signal
A signal sent by an alarm system in an alarm state. [IEC 60839-1-1]
3.9 fault signal
The signal issued by the intrusion alarm system in a fault state. [IEC 60839-1-1]
3.10 tamper device
A device used to detect a part or part of an alarm system that intentionally interferes (disassembles or opens). [IEC 60839-1-1]
3.11 tamper detection
Use anti-tamper devices to detect intentional interference with the alarm system or parts of it. [IEC 60839-1-1]
3.12 Tamper alarm
Use electrical or mechanical methods to prevent intentional interference with the alarm system or its parts. [IEC 60839-1-1]
3.13 tamper alarm
Alarm issued by the action of the anti-tamper device. [IEC 60839-1-1]
3.14 false alarm
Alarm signal issued due to accidental touch of manual device or automatic device in response to undesigned alarm status, erroneous operation or damage of components, or personnel error. [IEC 60839-1-1]
3.15 false alarm
Intrusion has occurred, and the system has not responded or indicated an alarm.
3.16 detector
It is used to discriminate the device that generates an alarm state under the abnormal situation facing danger. [IEC 60839-1-1]
3.17 Sensor
The detector is used to identify the part of the state change. This state change can indicate the danger. [IEC 60839-1-1]
3.18 processor
A device that determines whether an alarm condition should be generated by processing the output of one or more sensors.
3.19 controller
A device that processes the signals of the detector to determine whether an alarm condition should be generated and to complete certain display, control, recording, and communication functions. [IEC 60839-1-1]
3.20 system response time
The time required for the detector (including the manual start switch, button or electric key) to detect the target and generate the alarm status information until the controller receives the information and issues an alarm signal.
3.21 central control equipment (central console) central control equipment
A device that receives, processes, and displays information from detectors, controllers, and various control commands.
3.22 remote center
Stay away from protected locations, collect status information about one or more alarm systems here, or use it as a report (in terms of receiving center) or for forward transmission (in terms of satellite station or collection point). [IEC 60839-1-1]
3.23 alarm receiving center
A continuous remote center with people * reporting information about one or more alarm systems to it. [IEC 60839-1-1]
3.24 satellite station
Normally no one * Even though there is equipment for people * to work in an emergency, information about the status of several alarm systems is collected here, either directly or forward to the alarm reception center through a remote satellite station . [IEC 60839-1-1]
3.25 collector point
The unmanned remote center has no equipment for people to operate in an emergency. There are several alarm system status information collected here, either directly or forwarded to the alarm receiving center through a satellite station. [IEC 60839-1-1]
3.26 monitoring center
Someone's remote center, the status of the alarm signal transmission system is monitored here. [IEC 60839-1-1]
3.27 combined system
In the detection, transmission, control and processing links, more than two (including two) technology alarm systems are used. [IEC 60839-1-1]
3.28 alarm transmission system
It is used to transmit the information of the status of one or more alarm systems to the equipment and network of one or more receiving centers. [IEC 60839-1-1]
3.29 Manual protection device physical protection
Manual * that affects the action of the alarm control unit is used as a switch, button or electric key. [IEC 60839-1-1]
3.30 physical protection
Protection against damage to parts or protection against injury. [IEC 60839-1-1]
3.31 Set alert (armed state) set condition
A state that enables an alarm state to be indicated.
3.32 Unset condition (disarmed state) unset condition
A state in which the alarm state cannot be indicated.
4 Technical requirements
4.1 System Overview The intrusion alarm system should include front-end equipment, transmission equipment and control / display / processing / recording equipment. Front-end equipment includes one or more detectors; transmission equipment includes cables or data acquisition and processors (or address editing decoders / transceivers); control equipment includes controllers or central consoles, which should include Control motherboard, power supply, sound and light indication, programming, recording device and signal communication interface, etc. The intrusion alarm system equipment shall comply with the technical requirements of relevant standards such as GB 10408 series standard, IEC 60839-5 series standard, IEC 50839-7 series standard, GB 12663, GB 15207, GB 15209, GB 15407, GB / T 16572 and other related standards.
The intrusion alarm system can have multiple composition modes. The basic structure of the common parts of various intrusion alarm systems is shown in Figure 1.
Note 1: The sound and light indication, programming device, and signal communication interface can be separate components, or combined or integrated components.
Note 2: In the intrusion alarm system, the signal transmission between the detector and the controller, and between the controller and the remote center can be wired or / and wireless.
Note 3: The intrusion alarm system may include other additional devices, but they should all meet the relevant requirements of this standard.

4.2 System design
4.2.1 The design of the normative and practical intrusion alarm system should be based on the actual investigation of the site, and should be designed according to factors such as environmental conditions, objects of prevention, investment scale, maintenance, and methods of receiving and handling the police. The design of the system should meet the requirements of the relevant risk level and protection level standards, and the management and use requirements of the relevant design specifications, design mission statement, and builder. Equipment selection should meet the requirements of relevant national standards, industry standards and relevant management regulations.
4.2.2 The design and technology of the advanced and interchangeable intrusion alarm system should be moderately advanced and interchangeable, leaving room for system expansion and / or modification.
4.2.3 Accuracy The intrusion alarm system should be able to accurately and timely detect intrusion behavior and issue an alarm credit card number; there should be clear and obvious instructions on the source of the intrusion alarm line number, anti-folding alarm signal and fault signal.
The intrusion alarm system should be capable of sound review, and the intrusion alarm system linked with the TV monitoring system should be able to perform sound review and image review at the same time.
The system false alarm rate should be controlled within acceptable limits. The intrusion alarm system does not allow leak alarms.
4.2.4 Integrity should take precautionary measures against all paths in the intrusion fortification area, and strengthen precautions against possible weak links in physical protection on the intrusion path. There shall be no blind spots within 5m of the protected object.
4.2.5 The design of the in-depth protection intrusion alarm system shall adopt the in-depth protection system, and shall implement fortification at different levels and levels according to the risk level and protection level of the protected objects. A complete defense zone shall include four different types of defense zones, including perimeter, surveillance zone, protective zone and restricted zone, and different protective measures shall be adopted for them.
A control center shall be set up in the protection zone, and one or more sub-control centers may be set up if necessary. The control center should be located in the restricted area, at least in the protection area.
4.2.6 Linkage compatibility The intrusion alarm system should be able to link with the TV monitoring system and entrance control system. When jointly designing with other systems, system integration design should be carried out, and each system should be compatible with each other and work independently. Intrusion alarms are second only to fire alarms.
4.3 Basic system functions
4.3.1 The intrusion detection alarm system should accurately and real-time detect the following possible intrusion behaviors and generate an alarm status:
a) Open doors, windows, air-conditioning shutters, etc .;
b) Use violence to pass through doors, windows, ceilings, walls and other building structures;
c) broken glass;
d) move inside the building;
e) Touch or approach safes or important items;
f) Triggering of emergency alarm devices.
4.3.2 When an alarm occurs in one or more fortified areas, the response time of the intrusion alarm system shall meet the following requirements:
a) Sub-line intrusion alarm system: no more than 2s;
b) The first alarm in any zone of the intrusion alarm system without tension and bus system: no more than 3s;
Subsequent alarms in other defense zones: no more than 2s;
4.3.3 Indication of the intrusion alarm system should be able to give an indication of the source and time of occurrence of the following states;
a) Normal state;
b) Test status;
c) The alarm status caused by intrusion;
d) Anti-demolition alarm status;
e) Fault state;
f) The main power supply is powered off and the backup power supply is under voltage;
g) Coordinate the alert (arm) / disarm (disarm) status;
h) Failed to transfer information.
4.3.4 The control intrusion alarm system should be able to program the following functions;
a) Instant defense zone and delayed defense zone;
b) All or part of the detection circuit equipment alert (armed) and disarmed (disarmed);
c) Transmission of information to the remote center or cancellation;
d) Send a signal to the auxiliary device;
e) The system test should be carried out with minimal disruption to the normal operation of the system.
4.3.5 Record and query The intrusion alarm system should be able to record and query the following events:
a) The events listed in 4.3.3, the programming settings listed in 4.3.4;
b) * The name of the operator and the switch-on time;
c) Dealing with the police situation;
d) Repair.
4.3.6 Transmission
a) The transmission of the alarm signal can be wired and / or wireless;
b) The alarm transmission system should have self-inspection and inspection functions;
c) The intrusion alarm system should have wired and / or wireless communication interface with the remote center, and be able to monitor the communication line failure;
d) The technical requirements of the alarm signal transmission system should comply with IEC 60839-5;
e) The information format and protocol of the serial data interface of the alarm transmission system shall comply with the requirements of IEC 60839-7.
4.4 Equipment installation requirements The installation of intrusion alarm system equipment and the laying of cables shall comply with the requirements of relevant national standards, industry standards and relevant management regulations.
4.5 The power supply device of the power supply intrusion alarm system shall meet the requirements of GB / T 15408. The system shall have a backup power supply, and its capacity shall at least ensure that the normal working time of the system is greater than 8h. The backup power supply can be one or a combination of the following;
a) Secondary battery and charger;
b) UPS power supply;
c) Generator.
5 Security requirements
5.1 The equipment used in the intrusion alarm system should meet the safety requirements specified in GB 16796 and related product standards.
5.2 The mechanical structure of any part of the intrusion alarm system should have sufficient strength to meet the requirements of the use environment, and can prevent injuries to personnel due to mechanical instability, movement, protrusions and sharp edges.
5.3 In special areas with flammable and explosive substances, the intrusion alarm system should have explosion-proof measures and comply with relevant regulations.
5.4 The lines of the outdoor wired intrusion alarm system should be shielded.
6 Electromagnetic compatibility requirements The equipment used in the intrusion alarm system should be able to withstand the following electromagnetic compatibility test requirements;
a) In GB / T 17626.2-1998, the electrostatic discharge interference of severity level 3;
b) Severity level 3 RF electromagnetic field interference in GB / T 17626.3-1998;
c) In GB / T 17626.4-1998, the severity level 3 electrical fast transient burst interference;
d) Severity level in GB / T 17626.5-1998: Surge interference of AC power cord not exceeding 3 and signal cord not exceeding 2;
e) In GB / T 17626.11-1998, the severity level: 40% UT10 cycles of voltage sag, 0% UT10 cycles of short interruption interference;
During the test, the system works normally, and no alarm or leak alarm should be generated.
7 Lightning protection and grounding requirements
7.1 When designing an intrusion alarm system, the equipment selected should meet the lightning protection requirements of electronic equipment.
7.2 The intrusion alarm system shall have anti-lightning measures. Power supply lightning protection devices should be installed, and signal lightning protection devices should be installed.
7.3 The system shall be equipotential grounded; the grounding cathode shall be no more than 4 Ω, and the cross section of the grounding conductor shall be greater than 25mm2.
7.4 The lightning protection and grounding design of outdoor installations and lines shall comply with relevant national standards and industry standards.
8 Environmental adaptability requirements The equipment used in the intrusion alarm system should meet the requirements of GB / T 15211;
The intrusion alarm system equipment working in corrosive gas and flammable and explosive environment shall have corresponding protection measures.
9 Reliability requires that the equipment used in the intrusion alarm system, the mean time between failures (MTBF) should not be less than 5000h;
The first failure time after system acceptance is greater than 3 months
10 The equipment used to mark the intrusion alarm system shall clearly and permanently mark the following information on it:
a) Manufacturer's name;
b) batch number;
c) Production date (code can be used);
d) Power supply rating, such as nominal voltage, current and frequency;
Terminals and leads should be numbered, colored or otherwise identified.
The mark must be durable and easy to read, and the sign should not be easily removed and not curled.
11 Documents provided
11.1 If the information provided with the equipment cannot be clearly seen from the equipment, a detailed instruction manual for proper installation should be provided with the equipment. Any equipment that may be damaged when the input polarity is reversed should be clearly stated in the instruction manual.
11.2 Design documents The contractor shall provide all the prescribed design documents to the constructor in accordance with the requirements of GA / T 75; the drawings shall be standardized and the graphical symbols shall comply with the requirements of GA / T 74

We'd love to create a bespoke Neon LED Sign just for you!

Our signs are made to order. We can create anything your heart desires! Weddings, events, business signs, in your home - big, small - we can make it a reality!

MOQ: 1 piece only.

Neon Wedding Signs

Neon Wedding Sign, Neon Party Sign, Neon Wedding Light

Shenzhen Oleda Technology Co.,Ltd , https://www.baiyangsign.com

This entry was posted in on