Elevator Access Control Examined

By: Brian Rhodes, Published on May 06, 2013

Doors are certainly the first thing that comes to mind when thinking about electronic access control. However, EAC can also be very valuable for controlling elevators. Keeping unauthorized riders out of elevator cars or off certain floors is a significant security benefit. In this note we examine this, breaking down the two main methods of control, how to integrate access control for each, plus how to deal with the key risk of tailgating.

Two Methods

Securing control of an elevator system has two options depending upon the desired level of control. Determining which method is best depends on which of the following two is more important:

  • Unauthorized access to specific floors, or
  • Unauthorized use of the elevator?

For example, if keeping people from 'nuisance calling' the elevator or to prohibit anyone except credentialed personnel from using the lift, controlling the call buttonsis often the best solution. However, if administrating access to specific floors is required, then the car must be equipped with a controller that interfaces access levels with the elevator's mechanical systems.

The two methods vary broadly in cost of equipment and integration; points we examine in the following sections:

Interrupt the Call Buttons: Of the two options, this level of integration is simpler and inexpensive, but only provides "all floors, or nothing" control. This involves wiring the power of the call button keypad to be switched on according to credential reads of an adjacent reader. In order to activate the call buttons to request a car, the controller closes relay contacts between the call button's power supply and keypad. Only a card granted access to the elevator is eligible to use the elevator, but once the elevator arrives, the user is able to key access to any floor the elevator normally has access to; potentially all floors in a building.

The biggest advantage afforded by this method is how inexpensive and quickly it can be installed. The process of integrating call button power to a controller often requires an external relay of some type, but otherwise it schematically installs and performs like access through any other opening, except with outputs routing power to buttons rather than door locks.

The second method is more challenging.

Controller Onboard: This method requires deeper integration, specialized equipment, and higher configuration costs, but results in a greater degree of control to specific floors rather than the car itself. Take this manufacturer's example schematic below:

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

With this type of integration, the position of the car relative to a floor is fed back into the controller, typically installed on the cab itself, or connected to the cab via the travelling 'control cable' networking the car to its mechanical control system. Users are configured access to specific floors; for example, a rider may be able to call an elevator from 'Floor 1' and only be able to ascend to 'Floor 3' based on access rights, bypassing 'Floor 2' altogether.

This method requires interfacing the access control system with the elevator control system, and may require coordination with the elevator company's service technicians.

Traveling Cable: Another complicating feature of onboard control is networking components like readers and controllers to the 'head end'. Mounting the controller onboard the car is not often required, but is done to mitigate the need of running expensive, maintenance hungry elevator cables to connect components. As we noted in our "Elevator Surveillance Tutorial", networking devices in a moving car is prone to a host of cabling issues complicated by the notorious difficulty in coordinating work with Elevator Service Technicans.

Tailgating Risk

Regardless of the method chosen, access control is endangered by 'tailgating', that is, an unauthorized person passing through a controlled opening before it is closed and relocked after a valid credential read. In the case of either elevator control options above, an unauthorized person can both enter a car before the doors close, or exit into a restricted floor when someone else leaves.

Elevator safety interlock controls [link no longer available] always incorporate some manner of keeping doors from automatically closing and potentially crushing or moving before occupants are completely onboard. One characteristic of these controls are the slow closing speed of the opening, a variable that cannot be addressed by the EAC system. Because of the life/safety risk, ensuring access control can only be achieved via limiting occupants in a car to a single passenger or expanding access controls to doors beyond the elevators.

Because of the tailgating risk, some end-users question the security value of access controlling elevators. Rather, the strongest benefit of controlling elevators comes in the form of restricting use, leading to increased car availability for VIPs and lowering the occurrence of vagrancy inside elevator cabs.

Comments (8) : Members only. Login. or Join.

Related Reports

Door Operators Access Control Tutorial on Apr 17, 2019
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Propped Doors Access Control Tutorial on Jan 07, 2020
Doors should keep 'bad guys' out, but a common access control problem is people propping doors open, preventing them from being secure. Even...
Door Position Switches (DPS) For Access Control Tutorial on Mar 05, 2018
Door position switches do not get enough respect. They solve a major problem of access control systems yet are frequently ignored or...
Fail Safe vs. Fail Secure Tutorial on Oct 02, 2019
Few terms carry greater importance in access control than 'fail safe' and 'fail secure'. Access control professionals must know how these...
Exit Devices For Access Control Tutorial on Aug 28, 2018
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety codes the world over, and become integral parts of electronic access...
Access Controller Software Guide on Dec 11, 2017
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...
Access Control Request to Exit (RTE) Tutorial on May 13, 2019
For access controlled doors, especially those with maglocks, 'Request to Exit', or 'RTE' devices are required to override electrified locks to...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...
Axis Tailgate Detection Tested on Jan 04, 2019
Axis is aiming to tackle tailgating, one of access control's biggest issues, with the Tailgating Detector ACAP application. This camera app claims...
Glass Doors and Access Control Tutorial on Nov 21, 2019
One of the biggest access challenges are locking and securing glass doors. Unlike wood or steel doors that can be modified to work with...

Most Recent Industry Reports

Sperry West / Alibaba Tablet Temperature Measurement Tested on Jul 07, 2020
In April, we ordered a ~$500 temperature tablet from Alibaba. We set it to the side while doing 18 other temperature screening tests but, after...
Video Surveillance 101 Book Released on Jul 07, 2020
IPVM's unique introduction to video surveillance series is now available as a 145-page eBook. Designed for managers, salespeople, and engineers new...
Startup Duranc Presents AI VSaaS on Jul 06, 2020
Duranc presented its system at the May 2020 IPVM Startups show. A 30-minute video from Duranc including IPVM Q&A Background on the...
Low Voltage Nation Wants to "Help You Carve Out A Fulfilling Career" Interviewed on Jul 06, 2020
It is difficult to make your way in this industry as there is little formal schooling. However, one person, Blake Urmos, the Founder of Low Voltage...
The Next Hot Fever Detection Trend - $100 Wall-Mounted Units on Jul 06, 2020
The first wave of the booming fever detecting market was $10,000+ cameras, now interest for ~$2,000 tablets is high and the next big thing may be...
Cisco Meraki Unlocks IP Cameras With RTSP Tested on Jul 06, 2020
Meraki opened up its cameras to 3rd party NVRs/VMSes by offering RTSP streaming because of "the need to solve a business problem". We tested...
Hikvision Illicitly Uses Back To The Future In Marketing on Jul 03, 2020
NBCUniversal told IPVM that Hikvision UK's ongoing coronavirus marketing campaign using NBCUniversal's assets was not allowed. Hikvision mass...
Verkada: "IPVM Should Never Be Your Source of News" on Jul 02, 2020
Verkada was unhappy with IPVM's recent coverage declaring that reading IPVM is 'not a good look' and that 'IPVM should never be your source of...
Vintra Presents FulcrumAI on Jul 02, 2020
Vintra presented its FulcrumAI object recognition and mask detection offering at the May 2020 IPVM Startups show. Inside this report: A...