Lock Status Monitoring Tutorial

Author: Brian Rhodes, Published on Dec 18, 2017

Just because your doors look secure does not mean they are. Unless access systems are using lock status monitoring, the doors and areas they protect may not be left insecure. Can you tell whether the door below is locked? How?

Lock status monitoring addresses a key vulnerability of many access control systems, but its value is commonly ignored or misunderstood. Inside this note, we explain:

  • How Lock Status Monitoring Prevents Security Risks
  • Why Shut Doors Do Not Mean Secure Doors
  • Tradeoffs Of Door Position vs.or Lock Monitoring
  • Typical Solution Cost
  • Examining Latchbolt Monitoring vs Latchbolt Strike Monitoring
  • Explaining Maglock Bond Sensors

The Importance Of Lock Monitoring

Simply put, lock monitoring checks to see whether an opening's lock is reporting itself as 'locked'. Because most electrified locks can only lock properly when the door is shut, Lock Monitoring tells access systems the door is both closed and secured.

Even with sophisticated electronic access locks, door hardware is vulnerable to tampering. Unless the lock hardware itself is monitored as being locked, tampering can defeat their strength and be undetected by the system.

For example, electric strikes can be neutralized by placing foreign objects in the strike so the latchbolt never fully engages, or held in with tape so they never extend at all. The image below shows how common trash can be used to prevent the latch from extending into the strike to keep a door locked:

And while maglocks generate large amounts of holding force, it works only when the magnet and the armature have full contact. The rated holding force drops drastically if their pieces are not allowed to contact each other, even just through covering the surface with tape or paper, dropping the bond from thousands of pounds to just a few hundred, allowing for doors to be easily kicked open. The image below shows a strap of tape used to interfere with a maglock's bond so the door can be opened even if it should be locked:

Shut Doors Do Not Mean Secure

**** ******* **** *************** **** *** **** **** ***. ****** ****** ******* *** using **** ****** **********, *** ***** *** ***** **** ******* may *** ** **** ********. *** *** **** ******* *** door ***** ** ******? ***?

**** ****** ********** ********* * *** ************* ** **** ****** control *******, *** *** ***** ** ******** ******* ** *************. Inside **** ****, ** *******:

  • *** **** ****** ********** ******** ******** *****
  • *** **** ***** ** *** **** ****** *****
  • ********* ** **** ******** **.** **** **********
  • ******* ******** ****
  • ********* ********* ********** ** ********* ****** **********
  • ********** ******* **** *******

The ********** ** **** **********

****** ***, **** ********** ****** ** *** ******* ** *******'* lock ** ********* ****** ** '******'. ******* **** *********** ***** can **** **** ******** **** *** **** ** ****, **** Monitoring ***** ****** ******* *** **** ** **** ****** *** secured.

**** **** ************* ********** ****** *****, **** ******** ** ********** to *********. ****** *** **** ******** ****** ** ********* ** being ******, ********* *** ****** ***** ******** *** ** ********** by *** ******.

*** *******,******** ********** ** *********** ** ******* ******* ******* ** *** ****** so *** ********* ***** ***** *******, ** **** ** **** tape ** **** ***** ****** ** ***. *** ***** ***** shows *** ****** ***** *** ** **** ** ******* *** latch **** ********* **** *** ****** ** **** * **** locked:

*** ********************* ***** ******* ** ******* *****, ** ***** **** **** the ****** *** *** ******** **** **** *******. *** ***** holding ***** ***** *********** ** ***** ****** *** *** ******* to ******* **** *****, **** **** ******* ******** *** ******* with **** ** *****, ******** *** **** **** ********* ** pounds ** **** * *** *******, ******** *** ***** ** be ****** ****** ****. *** ***** ***** ***** * ***** of **** **** ** ********* **** * *******'* **** ** the **** *** ** ****** **** ** ** ****** ** locked:

Shut ***** ** *** **** ******

[***************]

*** ***** **** ** **** ***** ***** *** ********* ****** fully ****** ** ** ****** ******, *** ** ************* ******** and ******** ** ****** ****** ** *******. **** * **** equipped ******** ******** *********** **** **** ****** ********* ** * **** ** **** or ****, ******* *** ********** **** '******' **** ***** '******'.

*************, **** ******** ** ****** ****** ******** **** **** ********, often *** *********** *** *** ******, ** ***** ** ********** ***** ****** ******* ********. *******, **** ** **** ******* ******** **********, ********* **** the ****** **** *** ***** ****, ************ ***** ******* *** door ** ********* ** ********* *****.

Door ******** ** **** **********

** **** *****, ***** **** ********** ***** ********** **** **** door ******** ********. *** **** ********** ***********, ****** **** ******** ******** ** **** ******** *** ********* at *** '**** *******' *****, ******* * ****** ******-****** ******* on *** ********** *****. **** ** ** ******* *** ** HID ***** **********:

*** **** ** ****** * *******-***** **** ******* *** **** as ****** ** $* *** ***, *** **** * *** minutes ** ******* **** ** ********* ** ** ****** ******. However, ********** ********** **** ********** ** *** **** ****** *** add *% - **%, ***** $** ** $** ** *** item's ****. *** **** ********** *** ******* *** **** ********** is *** ** ******** **** ** **** ******** ********.

** *** ****** *****, *** ********** ***** ******* ** ********* to *********** ** *** ** *** ****** *** ***** *****:

*** ****** ******* *** ***** ********** ** *** ***** ** locks (**: *******, ********, ** ******** *******) ** ***** ******* separate **** ***** *****, *** ******* ***** ********** *********** ********* still ****** *** **** ******** ***********.

Three ****** *****

**** ********** ** ******* ******** ** ***** ****:

  • ********* ********** (***)
  • ********* ****** ********** (****)
  • ******* **** *******

***** *** ***** *** **** ** ** ******* ****** *** same, *** ********** ******* *** *********** *********. *** **** * lock **** ** ****** *****, **** * *******, *** ** monitored ** ******** *** **** ********. ** ******* *** ***** methods *****:

Latchbolt **********

*** *** ** ***** ** ***** *** ****** *** ***** latches ******* ** ** '********* **********'. ** **** ******, * mechanical ** ********* ****** ***** ****** *** ****** ****** ******* or *** *** ****'* ********* ** ******** ** ********. ** the ***** ** ******, *** *** ******* **. ** *** latch ** *** ******, *** **** ** ********, *** *** switch ******* ********* ** *********** ** *** *****.

****'* ** ***** ******* *** ******** ** *** ********** ****** inside * ****:

***** ****** ****** ************* **** ******* **** *% - **% per ****, ***** $** ** $**, *** ****** ** ******* requires ********* ******** *****.

Latchbolt ****** **********

******* ****** ** ********** ******* ******** ******** *** ******** ******** position, ** **** ** **** ********* ******* ** ** *** strike ****** ** ***** ** ******** ** ********* **** *******. The ********* ** **** ** **** **** *** **** *******, and **** ***** ** *********** *** ********, *** **** *** not ** ****** ** *** ******* ** *******.

**** ******* ***** **** ** ** ******, **** ******* **** ****** ******:

Bond *******

*** **** ****** ****** ** ********** ******** ******** * ****** that ****** *** ***** ******** ** *** *************** **** ****** the ****. **** *** ***** ** ********* ** ****** ****, an ********** *** ** **** ****** **** ******* *** **** is ****** ******. *** ***** ***** ***** *** '***** ** good' *** ********* ** *** *******:

** **** *****, **** ******* *** * ******* ******, *** using **** **** ** **** ***** **** *** ******* ********. However, ***** ******* *** ** '***' **** ****, *** *** sensitive ******** **** **** ******* ***. ******** *********** ********* * technician ****** *** * *********** ****** ******* * *** ******* may ** ****** **** ** ***** ** *** **** ** five ***** *** ***** ********.

Using **** *** *** **** ********** ********

*** ******* ********, **** ********** *** **** **** ******** *** lock ********** ** *** **** **** ** ****** *** ******** in ****** **** *** **** ******** ******. ******* ** ****** knowing * **** ** **** ** ******, *** ****** ***** see ** ** **** *** *** ****** ** ****** *** secure.

**********, **** ********** ******* *** ** *** ** ******** ******* controller ******. ** ***** **** ** ******* **** ****** **********, this ****** *** **** ** ****** ** *** ******** ******. For *******, ** ***** ******** ****** *** *** ****** ** kept ******, ******** ********** **** **** *** *** **** ********** is ********.

[****: **** ******** *** ********** ********* ** **** *** ************* revised ** ****]

Comments (6)

** *** *** ******** **** ******, ******’* * ******** ***** of *****, *** ********* ** ******** *** *** ******, **** the ******?

***** * *** ***** **** *** **** *** ***** *******?

***, *** ***** ** **** ********* ** '****' **** **** for ****. ****** *** ***** ***** ***** **** **** * *CRASH* *** **** **** *** ******* ********, ** *** ***** itself ***** ******** ********** *** ***** *** **** '******' *** an ******* *******.

**** *******.

** ****** **** *********** *** *** *** ******* **** **** monitoring. ****** ** *** *** *********** ******* **** *** ******* security ***********'* *** ** *** *** ***** **** ******* *** the ******* ** **** ****** *** **** *** ***** **** the ***** **** ******* *** ***** ****** ******* ** ****** for *** **** *******. ***** ***** ****.

***** *** ***** **** ******* ****** *** * *** -- wouldn't **** ****** * *** ***** ***** **** *** **** opens, **** **** *** ******* **** ******* ******** * ****? So, ** **** ****** *** ** *** ********, ***'* *** on * ***** **** ************:

*. ***** ***** - ***** **** (****** **** ***** *** door **** * **** ** **** ********* ** *** ***** of *** ****)

*. *** ***** (**** ***** **** *******)

*. **** **** ***** (**** ******** ***** **** ******* *** latch ****** *******)

*. **** ****** ***** (** **** ****** *** ******** *** latch **** ******* ** ******** *** ****** ******* **** *** already ****** ****** *******)

** **** **** *** *** **** *** *** *** **** option **** ***? ******* ****** #* *** #* ***** **** in *** ******* ***** **** ***** ** * *** *** being **** ** ** ******** ******-********** **** *** ******* ** orderly ******** ** **** ****** ******** ** *** ****, *.*. 1) ******* ****, *) **** ****, *) ******* *** ****** while ******* ******* *** *******, *) **** ******.

** *** ******* *** ****** ** ***** *** *** *** not ****** *** ****** **********.

**** ***** *** **** **** *** ****** **** ********* ** shunt ** ************ **** *****?

**, ** *** ******** ** ** ***** **** *** *** and **** ******* * ******* ** **** ******* ** *** registered ***** **** *** **** * ****. ** **** *******/*** a ******* ** **** **** *** **** ** ****** **** the ****** **** (** **** ********* *** ****** ** *** unlock *** ****** *************) *** **** *** **** * **** at *** ****** *** *** ******* ****** ** **** *** register/log * ******* ** **** **** *** **** ** ******** opened. * ***** **** *** ******** *** ********* ******** **** a ****** ***** ** ******** ** *** **********. ****** **** triggers ** ********, * ******* ** ** ************* ******** **** a **** ***** ** ****** **** *** ******* ******* ******** the ***** ****** ******* ***** ***** *** ******* * ****** entry. ** ********** ***** ** **** ** ******* ****** ***** we *** * ******** **** *******.

****, *** ******* ** **** ********* ** ************ ** *** lock **********. * **** ***** **** ******** *** **** ***** regarding **** **********. *********, * *** ***** ********** **** ****** also ***** ****** ***** *** **** * *** *** *** but, ***** *** ***** ******* * *** **** *** **********.

**** ** ** *** ******!

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

July 2018 IP Networking Course on Jun 16, 2018
The last chance to save $50 on registration is this Thursday, June 21st. Register now and save. This is the only networking course designed...
Amazon Ring Launches $10 Monthly Professional Alarm Monitoring on Jun 15, 2018
Amazon's Ring has announced an alarm system with 24/7 professional alarm monitoring for $10 per month, a fraction of the $30+ per month traditional...
Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...
Four Major Outdoor Camera Install Problems on Jun 14, 2018
Over 140 integrators told us the top four camera installation mistakes that lead to unexpected problems and failures. Their comments often...
China Public Video Surveillance Guide: From Skynet to Sharp Eyes on Jun 14, 2018
China is expanding its video surveillance network to achieve “100%” nationwide coverage by 2020, including facial recognition capabilities and a...
Access Control - Time & Attendance, Mustering and Mantraps Guide on Jun 13, 2018
Electronic access offers features that traditional mechanical locks cannot. While these features may not be as fundamental as keeping doors secure,...
ReconaSense - The AI / Access Control / Analytics / IoT / Video Company Profile on Jun 12, 2018
One company's ISC West booth stood out for displaying a light-up tower of buzzwords. The company, ReconaSense, pledged to be 'making sense of it...
Introducing Effective PPF (ePPF) - Improving Video Surveillance Designs on Jun 11, 2018
Pixel density (PPF / PPM) is the best metric the industry has to define and project video quality. It allows simple communication of estimated...
Powerline Networking For Video Surveillance Advocated By Comtrend on Jun 08, 2018
Powerline networking, using existing electrical wiring, has been around for many years. Indeed, over the years, some video surveillance providers...
The Benefits of An Access Control Test Door on Jun 08, 2018
Security system dealers can benefit from having their own access control test door both for demonstrations and training. Inside, we explain the...

Most Recent Industry Reports

IPVM Vulnerability Scanner Released on Jun 18, 2018
IPVM is proud to announce video surveillance's first and only cybersecurity vulnerability scanner. This tool allows quickly and simply...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
July 2018 IP Networking Course on Jun 16, 2018
The last chance to save $50 on registration is this Thursday, June 21st. Register now and save. This is the only networking course designed...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring Dahua as a 'cyber responsible partner',...
Amazon Ring Launches $10 Monthly Professional Alarm Monitoring on Jun 15, 2018
Amazon's Ring has announced an alarm system with 24/7 professional alarm monitoring for $10 per month, a fraction of the $30+ per month traditional...
Axis Releases First New Access Controller In 5 Years (A1601) on Jun 15, 2018
It has been 5 years since Axis 2013 entry in the physical access control market, with the A1001 (IPVM test). Now, Axis has released its second...
Hikvision 12MP Fisheye Camera Tested (DS-2CD63C2F-IV) on Jun 14, 2018
Hikvision's DS-2CD63C2F-IV is their flagship panoramic camera, with a 12MP imager, 15m integrated IR, smart codec, and more. We tested the 63C2 in...
Four Major Outdoor Camera Install Problems on Jun 14, 2018
Over 140 integrators told us the top four camera installation mistakes that lead to unexpected problems and failures. Their comments often...
Security Sales Course Summer 2018 on Jun 14, 2018
Based on member's interest, IPVM is offering a security sales course this summer. Register Now - IPVM Security Sales Course Summer...
China Public Video Surveillance Guide: From Skynet to Sharp Eyes on Jun 14, 2018
China is expanding its video surveillance network to achieve “100%” nationwide coverage by 2020, including facial recognition capabilities and a...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact