Elevator Access Control Examined

By: Brian Rhodes, Published on May 06, 2013

Doors are certainly the first thing that comes to mind when thinking about electronic access control. However, EAC can also be very valuable for controlling elevators. Keeping unauthorized riders out of elevator cars or off certain floors is a significant security benefit. In this note we examine this, breaking down the two main methods of control, how to integrate access control for each, plus how to deal with the key risk of tailgating.

Two Methods

Securing control of an elevator system has two options depending upon the desired level of control. Determining which method is best depends on which of the following two is more important:

  • Unauthorized access to specific floors, or
  • Unauthorized use of the elevator?

For example, if keeping people from 'nuisance calling' the elevator or to prohibit anyone except credentialed personnel from using the lift, controlling the call buttonsis often the best solution. However, if administrating access to specific floors is required, then the car must be equipped with a controller that interfaces access levels with the elevator's mechanical systems.

The two methods vary broadly in cost of equipment and integration; points we examine in the following sections:

Interrupt the Call Buttons: Of the two options, this level of integration is simpler and inexpensive, but only provides "all floors, or nothing" control. This involves wiring the power of the call button keypad to be switched on according to credential reads of an adjacent reader. In order to activate the call buttons to request a car, the controller closes relay contacts between the call button's power supply and keypad. Only a card granted access to the elevator is eligible to use the elevator, but once the elevator arrives, the user is able to key access to any floor the elevator normally has access to; potentially all floors in a building.

The biggest advantage afforded by this method is how inexpensive and quickly it can be installed. The process of integrating call button power to a controller often requires an external relay of some type, but otherwise it schematically installs and performs like access through any other opening, except with outputs routing power to buttons rather than door locks.

The second method is more challenging.

Controller Onboard: This method requires deeper integration, specialized equipment, and higher configuration costs, but results in a greater degree of control to specific floors rather than the car itself. Take this manufacturer's example schematic below:

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

With this type of integration, the position of the car relative to a floor is fed back into the controller, typically installed on the cab itself, or connected to the cab via the travelling 'control cable' networking the car to its mechanical control system. Users are configured access to specific floors; for example, a rider may be able to call an elevator from 'Floor 1' and only be able to ascend to 'Floor 3' based on access rights, bypassing 'Floor 2' altogether.

This method requires interfacing the access control system with the elevator control system, and may require coordination with the elevator company's service technicians.

Traveling Cable: Another complicating feature of onboard control is networking components like readers and controllers to the 'head end'. Mounting the controller onboard the car is not often required, but is done to mitigate the need of running expensive, maintenance hungry elevator cables to connect components. As we noted in our "Elevator Surveillance Tutorial", networking devices in a moving car is prone to a host of cabling issues complicated by the notorious difficulty in coordinating work with Elevator Service Technicans.

Tailgating Risk

Regardless of the method chosen, access control is endangered by 'tailgating', that is, an unauthorized person passing through a controlled opening before it is closed and relocked after a valid credential read. In the case of either elevator control options above, an unauthorized person can both enter a car before the doors close, or exit into a restricted floor when someone else leaves.

Elevator safety interlock controls always incorporate some manner of keeping doors from automatically closing and potentially crushing or moving before occupants are completely onboard. One characteristic of these controls are the slow closing speed of the opening, a variable that cannot be addressed by the EAC system. Because of the life/safety risk, ensuring access control can only be achieved via limiting occupants in a car to a single passenger or expanding access controls to doors beyond the elevators.

Because of the tailgating risk, some end-users question the security value of access controlling elevators. Rather, the strongest benefit of controlling elevators comes in the form of restricting use, leading to increased car availability for VIPs and lowering the occurrence of vagrancy inside elevator cabs.

Comments (8) : PRO Members only. Login. or Join.

Related Reports

Open Access Controller Guide (Axis, HID, Isonas, Mercury) on Sep 19, 2019
In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers. Recently,...
Directory of 68 Video Surveillance Startups on Sep 18, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
Installation Course - Last Chance - Register Now on Sep 12, 2019
Last Chance - Register Now - September 2019 Video Surveillance Install Course. Thursday, September 12th is your last chance to register for the...
Fingerprints for Access Control Guide on Sep 09, 2019
Users can lose badges, but they never misplace a finger, right? The most common biometric used in access are fingerprints, and it has become one...
Assa Acquires LifeSafety Power on Sep 04, 2019
Assa Abloy is acquiring LifeSafety Power, adding to their growing collection of access control brands like Mercury, August, Pioneer Doors, and...
Top Ways Security Integrators Improve Their Careers on Sep 03, 2019
With DIY products expanding and the future of integration debated, how do integrators stay sharp so they are not left behind? 180+ integrators...
Register Now - October 2019 IP Networking Course on Aug 28, 2019
Register now for the Fall 2019 IP Networking Course. This is the only networking course designed specifically for video surveillance...
Mobile Access Control Guide on Aug 28, 2019
One of the biggest trends in access for the last few years has been the marriage of mobile phones and access cards. But how does this...
Critical Vulnerability Across 18+ Network Switch Vendors: Cisco, Netgear, More on Aug 26, 2019
Cisco, Netgear and more than a dozen other brands, including small Asian ones, have been found to share the same critical vulnerability, discovered...
ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...

Most Recent Industry Reports

ONVIF Suspends Huawei on Sep 20, 2019
Huawei has been 'suspended', and effectively expelled, from ONVIF so long as US sanctions remain on the mega Chinese manufacturer. Inside this...
Open Access Controller Guide (Axis, HID, Isonas, Mercury) on Sep 19, 2019
In the access control market, there are many software platforms, but only a few companies that make non-proprietary door controllers. Recently,...
Axis Perimeter Defender Improves, Yet Worse Than Dahua and Wyze on Sep 19, 2019
While Axis Perimeter Defender analytics improved from our 2018 testing, the market has improved much faster, with much less expensive offerings...
Directory of 68 Video Surveillance Startups on Sep 18, 2019
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known. 2019...
Uniview Prime Series 4K Camera Tested on Sep 18, 2019
Is the new Uniview 'Prime' better than the more expensive existing Uniview 'Pro'? In August, IPVM tested Uniview 4K 'Pro' but members advocated...
US Army Base To Buy Banned Honeywell Surveillance on Sep 17, 2019
The U.S. Army's Fort Gordon, home to their Cyber Center of Excellence, has issued a solicitation to purchase Honeywell products that are US...
Vivotek "Neural Network-Powered Detection Engine" Analytics Tested on Sep 17, 2019
Vivotek has released "a neural network-powered detection engine", named Smart Motion Detection, claiming that "swaying vegetation, vehicles passing...
Schmode is Back, Aims To Turn Boulder AI Into Giant on Sep 16, 2019
One of the most influential and controversial executives in the past decade is back. Bryan Schmode ascended and drove the hypergrowth of Avigilon...
Manufacturers Unhappy With Weak ASIS GSX 2019 And 2020 Shift on Sep 16, 2019
Manufacturers were generally unhappy with ASIS GSX, both for weak 2019 booth traffic and a scheduling shift for the 2020 show, according to a new...