CLC TS 50131-9-2014 Alarm systems - Intrusion and hold-up systems - Part 9 Alarm verification - Methods and principles.pdf
《CLC TS 50131-9-2014 Alarm systems - Intrusion and hold-up systems - Part 9 Alarm verification - Methods and principles.pdf》由会员分享,可在线阅读,更多相关《CLC TS 50131-9-2014 Alarm systems - Intrusion and hold-up systems - Part 9 Alarm verification - Methods and principles.pdf(32页珍藏版)》请在麦多课文档分享上搜索。
1、BSI Standards PublicationAlarm systems Intrusion and hold-up systemsPart 9: Alarm verification Methods and principlesPD CLC/TS 50131-9:2014National forewordThis Published Document is the UK implementation of CLC/TS50131-9:2014.The UK participation in its preparation was entrusted by TechnicalCommitt
2、ee GW/1, Electronic security systems, to Subcommittee GW/1/2,Installed alarm systems.A list of organizations represented on this committee can be obtained onrequest to its secretary.This publication does not purport to include all the necessary provisions ofa contract. Users are responsible for its
3、correct application. The British Standards Institution 2014.Published by BSI Standards Limited 2014ISBN 978 0 580 71373 6ICS 13.320Compliance with a British Standard cannot confer immunity fromlegal obligations.This British Standard was published under the authority of theStandards Policy and Strate
4、gy Committee on 31 July 2014.Amendments/corrigenda issued since publicationDate Text affectedPUBLISHED DOCUMENTPD CLC/TS 50131-9:2014TECHNICAL SPECIFICATION SPCIFICATION TECHNIQUE TECHNISCHE SPEZIFIKATION CLC/TS 50131-9 June 2014 ICS 13.320 English Version Alarm systems - Intrusion and hold-up syste
5、ms - Part 9: Alarm verification - Methods and principles Systmes dalarme - Systmes dalarme contre lintrusion et les hold-up - Partie 9: Vrification dalarme - Mthodes et principes Alarmanlagen - Einbruch- und berfallmeldeanlagen - Teil 9: Alarmvorprfung - Verfahren und Grundstze This Technical Specif
6、ication was approved by CENELEC on 2014-04-11. CENELEC members are required to announce the existence of this TS in the same way as for an EN and to make the TS available promptly at national level in an appropriate form. It is permissible to keep conflicting national standards in force. CENELEC mem
7、bers are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic, Denmark, Estonia, Finland, Former Yugoslav Republic of Macedonia, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the Netherlands, No
8、rway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the United Kingdom. European Committee for Electrotechnical Standardization Comit Europen de Normalisation Electrotechnique Europisches Komitee fr Elektrotechnische Normung CEN-CENELEC Management Centre: Aven
9、ue Marnix 17, B-1000 Brussels 2014 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members. Ref. No. CLC/TS 50131-9:2014 EPD CLC/TS 50131-9:2014CLC/TS 50131-9:2014 (E) - 2 - Contents page Foreword 4 Introduction . - 5 - 1 Scope . - 6 - 2 Normative refer
10、ences . - 6 - 3 Terms, definitions and abbreviations . - 6 - 3.1 Terms and definitions . - 6 - 3.2 Abbreviations . . - 9 - 4 Overview . . - 9 - 5 Parameter variation . . - 10 - 6 General recommendations for I to allow alarm verification to be tested before review and eventual incorporation into Euro
11、pean Standards; to recommend the additional product requirements necessary to provide the additionalfunctionality for an installed I it should also be noted that some aspects of alarm verification do not have a related standard(e.g. audible and visual methods and related equipment). Methods of reduc
12、ing unwanted alarms specific to entry and exit procedures will be detailed in a futurestandard. PD CLC/TS 50131-9:2014CLC/TS 50131-9:2014 (E) - 6 - 1 Scope This European Technical Specification is available for use where alarm verification methods areconsidered necessary. It provides recommendations
13、 for the addition and use of alarm verificationtechnology in Intrusion and Hold-up Alarm Systems (I sequentially verified alarm; automatic reinstatement; detector inhibited at automatic reinstatement (including, at grades 3 and 4, identification ofdetector). If the unverified alarm or sequentially v
14、erified alarm is generated by a tamper condition, this should beseparately identified, as required by EN 50131-1, for I sequentially verified alarm; automatic reinstatement; automatic reinstatement with detector inhibited. If the unverified or sequentially verified alarm is generated by a tamper con
15、dition, the tamper condition should be separately notified, as required by EN 50131-1:2006, Table 8, for I sequentially verified alarm; automatic reinstatement; detector inhibited at automatic reinstatement (including, at grades 3 and 4, identification of detector). NOTE 1 The recording of events is
16、 optional at grade 1 NOTE 2 The requirement of EN 50131-1:2006, Table 22, for an “intruder alarm” event is met by the “unverifiedalarm.” If an unverified alarm or sequentially verified alarm is generated by a tamper condition, this should beidentified accordingly, as required by EN 50131-1:2006, Tab
17、le 22. NOTE 3 For a sequentially verified I the number of events recorded could therefore exceed ten during asingle set period. PD CLC/TS 50131-9:2014CLC/TS 50131-9:2014 (E) - 12 - 6.6 Restore Reference EN 50131-1:2006, Table 6, the permitted access level to restore an unverified alarm shouldbe as s
18、pecified for “hold-up,” “intruder” or “tamper” as applicable. Restoration of an I cautions for the client with regard to response limitations imposed by the system design choicesmade; the location of each HUA device, which information should be available to the ARC (see 8.1.1). 6.8 Hold-up alarms Ve
19、rification of hold-up alarms should be applied only where considered necessary or is specified(EXAMPLE: by response authority) It is recommended that a telephone call-back procedure should be available for the ARC to follow ifthe results of any method of alarm verification are inconclusive. Where th
20、is method is used, onlycorrect use of an identity code or password should be acceptable to cancel response to a hold-upalarm. NOTE A single identification code / password may be shared by all users at the supervised premises. 7 Sequential verification of intruder alarms 7.1 General IAS set Alarm = v
21、erified alarmVerification timeAlarm = unverified alarmIAS unset IAS restoreNotificationto ARC:Events:SET UNVERIFIEDALARMVERIFIEDALARMUNSET RESTOREFigure 1 Time line of completed sequentially verified alarm sequence PD CLC/TS 50131-9:2014 CLC/TS 50131-9:2014 (E) - 13 - IAS setVerification timeAlarm =
22、unverified alarmNotificationto ARC:Events:SET UNVERIFIED ALARMREINSTATEMENTReady foradditionaleventsFigure 2 Time line of unverified alarm sequence 7.2 Recommendations for system requirements 7.2.1 General These recommendations are additional to the requirements of EN 50131-1. The following recommen
23、dations are applicable to all IAS using sequential alarm verification, at allsecurity grades (except where stated). 7.2.2 Types of alarm An alarm should be designated as sequentially verified when a minimum of two of the conditionsidentified in Table 1 are present in any combination. Table 1 Types o
24、f alarm permitted to contribute to a sequentially verified intruder alarm Type of alarm Notes a Intruder Meeting the recommendations of 7.3.2 b Intruder during entry time (detector not part of entry route) Subject to special conditions ofEN 50131-1:2006, 8.3.8.2 c Expiry of entry timed TamperTamper
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- CLCTS5013192014ALARMSYSTEMSINTRUSIONANDHOLDUPSYSTEMSPART9ALARMVERIFICATIONMETHODSANDPRINCIPLESPDF

链接地址:http://www.mydoc123.com/p-629574.html