Lock Status Monitoring Tutorial

By: Brian Rhodes, Published on Oct 28, 2019

Just because access doors are closed does not mean they are locked.

Unless access systems are using lock status monitoring, the doors and areas they protect could be left insecure. How can you tell when doors are locked?

Lock status monitoring addresses a key vulnerability of many access control systems, but its value is commonly ignored or misunderstood. Inside this note, we explain:

  • How Lock Status Monitoring Prevents Security Risks
  • Why Shut Doors Do Not Mean Secure Doors
  • Tradeoffs Of Door Position vs.or Lock Monitoring
  • Typical Lock Monitoring Cost
  • Examining Latchbolt Monitoring vs Latchbolt Strike Monitoring
  • Explaining Maglock Bond Sensors

The Importance Of Lock Monitoring

'Lock monitoring' checks to see whether an opening's hardware lock is reporting itself as locked.

Because most electrified locks can only secure openings properly when the door is shut, Lock Monitoring essentially notifies access systems that doors are both closed and secured.

Monitoring Against Lock Tampering

Even with sophisticated electronic access locks, door hardware is vulnerable to tampering. Unless the lock hardware itself is monitored as being locked, tampering can defeat their strength and be undetected by the system.

For example, electric strikes can be neutralized by placing foreign objects in the strike so the latchbolt never fully engages, or held in with tape so they never extend at all. The image to the right shows how trash can be used to prevent the latch from extending into the strike to keep a door locked.

And while maglocks generate large amounts of holding force, it works only when the magnet and the armature have full contact.

The rated magnetic holding force drops drastically if their pieces are not allowed to contact each other, even just through covering the surface with tape or paper, dropping the bond from thousands of pounds to just a few hundred, allowing for doors to be easily kicked open.

The image below shows a strap of velcro used to interfere with a maglock's bond so the door can be opened even if the maglock is configured to be locked:

Shut Doors Do Not Mean Secure

**** ******* ****** ***** are ****** **** *** mean **** *** ******.

****** ****** ******* *** using **** ****** **********, the ***** *** ***** they ******* ***** ** left ********. *** *** you **** **** ***** are ******?

**** ****** ********** ********* a *** ************* ** many ****** ******* *******, but *** ***** ** commonly ******* ** *************. Inside **** ****, ** explain:

  • *** **** ****** ********** Prevents ******** *****
  • *** **** ***** ** Not **** ****** *****
  • ********* ** **** ******** vs.or **** **********
  • ******* **** ********** ****
  • ********* ********* ********** ** Latchbolt ****** **********
  • ********** ******* **** *******

The ********** ** **** **********

'**** **********' ****** ** see ******* ** *******'* hardware **** ** ********* itself ** ******.

******* **** *********** ***** can **** ****** ******** properly **** *** **** is ****, **** ********** essentially ******** ****** ******* that ***** *** **** closed *** *******.

Monitoring ******* **** *********

**** **** ************* ********** access *****, **** ******** is ********** ** *********. Unless *** **** ******** itself ** ********* ** being ******, ********* *** defeat ***** ******** *** be ********** ** *** system.

*** *******,******** ********** ** *********** ** placing ******* ******* ** the ****** ** *** latchbolt ***** ***** *******, or **** ** **** tape ** **** ***** extend ** ***. *** image ** *** ***** shows *** ***** *** be **** ** ******* the ***** **** ********* into *** ****** ** keep * **** ******.

*** ********************* ***** ******* ** holding *****, ** ***** only **** *** ****** and *** ******** **** full *******.

*** ***** ******** ******* force ***** *********** ** their ****** *** *** allowed ** ******* **** other, **** **** ******* covering *** ******* **** tape ** *****, ******** the **** **** ********* of ****** ** **** a *** *******, ******** for ***** ** ** easily ****** ****.

*** ***** ***** ***** a ***** ** ****** used ** ********* **** a *******'* **** ** the **** *** ** opened **** ** *** maglock ** ********** ** be ******:

Shut ***** ** *** **** ******

[***************]

*** ***** **** ** that ***** ***** *** otherwise ****** ***** ****** to ** ****** ******, but ** ************* ******** and ******** ** ****** locked ** *******. **** a **** ******** ******** ******** *********** **** **** ****** operators ** * **** is **** ** ****, leaving *** ********** **** 'closed' **** ***** '******'.

*************, **** ******** ** defeat ****** ******** **** from ********, ***** *** convenience *** *** ******, as ***** ** ********** ***** ****** ******* Tutorial. *******, **** ** done ******* ******** **********, tampering **** *** ****** lock *** ***** ****, uncontrolled ***** ******* *** door ** ********* ** outsiders *****.

Door ******** ****** **** *** **** **********

** **** *****, ***** lock ********** ***** ********** more **** **** ******** switches. *** **** ********** ***********, ****** **** ******** Switches ** **** ******** are ********* ** *** 'Door *******' *****, ******* a ****** ******-****** ******* on *** ********** *****.

**** ** ** ******* wiring ******* *** ** HID **********:

*** **** ** ****** a *******-***** **** ******* can **** ** ****** as $* *** ***, and **** * *** minutes ** *******, ********* to ** ****** ******. However, ********** ********** **** monitoring ** *** **** itself *** *** *% - **%, ***** $** or $** ** *** item's ****. *** **** difference *** ******* *** lock ********** ** *** as ******** **** ** Door ******** ********.

** *** ****** *****, the ********** ***** ******* is ********* ** *********** by *** ** *** yellow *** ***** *****:

*** ****** ******* *** these ********** ** *** types ** ***** (**: strikes, ********, ** ******** latches) ** ***** ******* separate **** ***** *****, and ******* ***** ********** unconnected ********* ***** ****** the **** ******** ***********.

Three ****** *****

**** ********** ** ******* deployed ** ***** ****:

  • ********* ********** (***)
  • ********* ****** ********** (****)
  • ******* **** *******

***** *** ***** *** seem ** ** ******* almost *** ****, *** monitoring ******* *** *********** different. *** **** * lock **** ** ****** parts, **** * *******, can ** ********* ** checking *** **** ********. We ******* *** ***** methods *****:

Latchbolt **********

*** *** ** ***** if ***** *** ****** and ***** ******* ******* is ** '********* **********'. In **** ******, * mechanical ** ********* ****** built ****** *** ****** checks ******* ** *** the ****'* ********* ** deadbolt ** ********. ** the ***** ** ******, the *** ******* **. If *** ***** ** not ******, *** **** is ********, *** *** switch ******* ********* ** uncontacted ** *** *****.

****'* ** ***** ******* the ******** ** *** monitoring ****** ****** * lock:

***** ****** ****** ************* this ******* **** *% - **% *** ****, often $** ** $**, and ****** ** ******* requires ********* ******** *****.

Latchbolt ****** **********

******* ****** ** ********** strikes ******** ******** *** internal ******** ********, ** that ********* ******* ** no *** ****** ****** is ******* *** ********* lock *******. *** ********* of **** ** **** they *** **** ******* and **** ***** ** malfunction *** ********, *** they *** *** ** common ** *** ******* on *******.

**** ******* ***** **** as ** ******, **** this ******:

Bond *******

*** **** ****** ****** of ********** ******** ******** a ****** **** ****** the ***** ******** ** the *************** **** ****** the ****. **** *** field ** ********* ** within ****, ** ********** LED ** **** ****** loop ******* *** **** is ****** ******. *** image ***** ***** *** 'green ** ****' *** indicator ** *** *******:

** **** *****, **** sensors *** * ******* option, *** ***** **** adds ** **** ***** they *** ******* ********. However, ***** ******* *** go '***' **** ****, and *** ********* ******** fail **** ******* ***. Periodic *********** ********* * technician ****** *** * replacement ****** ******* * few ******* *** ** needed **** ** ***** in *** **** ** five ***** *** ***** maglocks.

Using **** *** *** **** ********** ********

*** ******* ********, **** installers *** **** **** position *** **** ********** at *** **** **** by ****** *** ******** in ****** **** *** door ******** ******. ******* of ****** ******* * door ** **** ** closed, *** ****** ***** see ** ** **** and *** ****** ** closed *** ******.

**********, **** ********** ******* may ** *** ** separate ******* ********** ******. If ***** **** ** display **** ****** **********, this ****** *** **** be ****** ** *** accurate ******. *** *******, if ***** ******** ****** the *** ****** ** kept ******, ******** ********** from **** *** *** lock ********** ** ********.

Comments (1)

* ***** **** ** have **** ****** ********** at *** **********. *** too **** ** ****** door ******** ******** *** it ** **** ** a ***** *****. ******* adequate ******** ** ****** coverage ** ********* *** is ********* *** ****** it *** ** * nightmare ** ***** ****. So *** ***** **** for ****** ********** ** the ***** *** ***** well ***** ** ** the **** ***.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Door Operators Access Control Tutorial on Apr 17, 2019
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Door Closers Access Control Tutorial on May 02, 2019
Door Closers have an important job: automatically shut doors when they are opened, because an open door cannot control access. In this note, we...
Access Control Request to Exit (RTE) Tutorial on May 13, 2019
For access controlled doors, especially those with maglocks, 'Request to Exit', or 'RTE' devices are required to override electrified locks to...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Access Control Mantraps Guide on Sep 26, 2019
One of access's primary goals is keeping people out of places they should not be, but slipping through open doors (ie: Tailgating) is often...
Fail Safe vs. Fail Secure Tutorial on Oct 02, 2019
Few terms carry greater importance in access control than 'fail safe' and 'fail secure'. Access control professionals must know how these...
Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...
Tailgating: Access Control Tutorial on Oct 31, 2019
Nearly all access control systems are vulnerable to an easy exploit called 'tailgating'. Indeed, a friendly gesture in holding doors for others...
Propped Doors Access Control Tutorial on Jan 07, 2020
Doors should keep 'bad guys' out, but a common access control problem is people propping doors open, preventing them from being secure. Even...
Low-Tech Access Control: Master Keying Explained on Jan 09, 2020
Mechanical keys are one of the most fundamental forms of access control. 'Master Keying' can allow individually different credential keys to...

Most Recent Industry Reports

Dahua CEO Is Out on Feb 28, 2020
Dahua CEO Li Ke has resigned less than 3 years after he was brought in from Huawei to professionalize management. Inside this note, we examine...
Hazardous & Explosion Proof Access Control Tutorial on Feb 27, 2020
Controlling access to hazardous environments requires equipment meeting specific ratings that certify they will not start fires or will not...
Motorola / Avigilon Drops ISC West on Feb 26, 2020
Motorola Solutions has pulled out of ISC West 2020 effective immediately, because of coronavirus concerns, IPVM has learned. This is done amidst...
Cancel or Not? Industry Split Over ISC West on Feb 26, 2020
The industry is split, polarized, over whether ISC West 2020 should run or be canceled. New IPVM survey results of 400+ respondents show heated...
Coronavirus Hits Sony, Bosch Says Switch on Feb 26, 2020
Sony's fall in video surveillance has been severe over the past decade. Now, they may be done. In this note, we examine Bosch's new...
Video Surveillance Cameras 101 on Feb 25, 2020
Cameras come in many shapes, sizes and specifications. This 101 examines the basics of cameras and features used in 2020. In this report, we...
Favorite Video Analytic Manufacturers 2020 on Feb 25, 2020
Video analytics is now as hot as ever, driven by the excitement of advancing deep learning offers. But what are actually integrator's...
Latest London Police Facial Recognition Suffers Serious Issues on Feb 24, 2020
On February 20, IPVM visited another live face rec deployment by London police, but this time the system was thwarted by technical problems and...
Masks Cause Major Facial Recognition Problems on Feb 24, 2020
Coronavirus is spurring an increase in the use of medical masks, which new IPVM test results show cause major problems for facial recognition...
Every VMS Will Become a VSaaS on Feb 21, 2020
VMS is ending. Soon every VMS will be a VSaaS. Competitive dynamics will be redrawn. What does this mean? VMS Historically...