Lock Status Monitoring Tutorial

By: Brian Rhodes, Published on Dec 18, 2017

Just because your doors look secure does not mean they are. Unless access systems are using lock status monitoring, the doors and areas they protect may not be left insecure. Can you tell whether the door below is locked? How?

Lock status monitoring addresses a key vulnerability of many access control systems, but its value is commonly ignored or misunderstood. Inside this note, we explain:

  • How Lock Status Monitoring Prevents Security Risks
  • Why Shut Doors Do Not Mean Secure Doors
  • Tradeoffs Of Door Position vs.or Lock Monitoring
  • Typical Solution Cost
  • Examining Latchbolt Monitoring vs Latchbolt Strike Monitoring
  • Explaining Maglock Bond Sensors

The Importance Of Lock Monitoring

Simply put, lock monitoring checks to see whether an opening's lock is reporting itself as 'locked'. Because most electrified locks can only lock properly when the door is shut, Lock Monitoring tells access systems the door is both closed and secured.

Even with sophisticated electronic access locks, door hardware is vulnerable to tampering. Unless the lock hardware itself is monitored as being locked, tampering can defeat their strength and be undetected by the system.

For example, electric strikes can be neutralized by placing foreign objects in the strike so the latchbolt never fully engages, or held in with tape so they never extend at all. The image below shows how common trash can be used to prevent the latch from extending into the strike to keep a door locked:

And while maglocks generate large amounts of holding force, it works only when the magnet and the armature have full contact. The rated holding force drops drastically if their pieces are not allowed to contact each other, even just through covering the surface with tape or paper, dropping the bond from thousands of pounds to just a few hundred, allowing for doors to be easily kicked open. The image below shows a strap of tape used to interfere with a maglock's bond so the door can be opened even if it should be locked:

Shut Doors Do Not Mean Secure

**** ******* **** *************** **** *** **** they ***. ****** ****** systems *** ***** **** status **********, *** ***** and ***** **** ******* may *** ** **** insecure. *** *** **** whether *** **** ***** is ******? ***?

**** ****** ********** ********* a *** ************* ** many ****** ******* *******, but *** ***** ** commonly ******* ** *************. Inside **** ****, ** explain:

  • *** **** ****** ********** Prevents ******** *****
  • *** **** ***** ** Not **** ****** *****
  • ********* ** **** ******** vs.or **** **********
  • ******* ******** ****
  • ********* ********* ********** ** Latchbolt ****** **********
  • ********** ******* **** *******

The ********** ** **** **********

****** ***, **** ********** checks ** *** ******* an *******'* **** ** reporting ****** ** '******'. Because **** *********** ***** can **** **** ******** when *** **** ** shut, **** ********** ***** access ******* *** **** is **** ****** *** secured.

**** **** ************* ********** access *****, **** ******** is ********** ** *********. Unless *** **** ******** itself ** ********* ** being ******, ********* *** defeat ***** ******** *** be ********** ** *** system.

*** *******,******** ********** ** *********** ** placing ******* ******* ** the ****** ** *** latchbolt ***** ***** *******, or **** ** **** tape ** **** ***** extend ** ***. *** image ***** ***** *** common ***** *** ** used ** ******* *** latch **** ********* **** the ****** ** **** a **** ******:

*** ********************* ***** ******* ** holding *****, ** ***** only **** *** ****** and *** ******** **** full *******. *** ***** holding ***** ***** *********** if ***** ****** *** not ******* ** ******* each *****, **** **** through ******** *** ******* with **** ** *****, dropping *** **** **** thousands ** ****** ** just * *** *******, allowing *** ***** ** be ****** ****** ****. The ***** ***** ***** a ***** ** **** used ** ********* **** a *******'* **** ** the **** *** ** opened **** ** ** should ** ******:

Shut ***** ** *** **** ******

[***************]

*** ***** **** ** that ***** ***** *** otherwise ****** ***** ****** to ** ****** ******, but ** ************* ******** and ******** ** ****** locked ** *******. **** a **** ******** ******** ******** *********** **** **** ****** operators ** * **** is **** ** ****, leaving *** ********** **** 'closed' **** ***** '******'.

*************, **** ******** ** defeat ****** ******** **** from ********, ***** *** convenience *** *** ******, as ***** ** ********** ***** ****** ******* Tutorial. *******, **** ** done ******* ******** **********, tampering **** *** ****** lock *** ***** ****, uncontrolled ***** ******* *** door ** ********* ** outsiders *****.

Door ******** ** **** **********

** **** *****, ***** lock ********** ***** ********** more **** **** ******** switches. *** **** ********** ***********, ****** **** ******** Switches ** **** ******** are ********* ** *** 'Door *******' *****, ******* a ****** ******-****** ******* on *** ********** *****. Here ** ** ******* for ** *** ***** controller:

*** **** ** ****** a *******-***** **** ******* can **** ** ****** as $* *** ***, and **** * *** minutes ** ******* **** be ********* ** ** access ******. *******, ********** integrated **** ********** ** the **** ****** *** add *% - **%, often $** ** $** to *** ****'* ****. The **** ********** *** explain *** **** ********** is *** ** ******** used ** **** ******** Switches.

** *** ****** *****, the ********** ***** ******* is ********* ** *********** by *** ** *** yellow *** ***** *****:

*** ****** ******* *** these ********** ** *** types ** ***** (**: strikes, ********, ** ******** latches) ** ***** ******* separate **** ***** *****, and ******* ***** ********** unconnected ********* ***** ****** the **** ******** ***********.

Three ****** *****

**** ********** ** ******* deployed ** ***** ****:

  • ********* ********** (***)
  • ********* ****** ********** (****)
  • ******* **** *******

***** *** ***** *** seem ** ** ******* almost *** ****, *** monitoring ******* *** *********** different. *** **** * lock **** ** ****** parts, **** * *******, can ** ********* ** checking *** **** ********. We ******* *** ***** methods *****:

Latchbolt **********

*** *** ** ***** if ***** *** ****** and ***** ******* ******* is ** '********* **********'. In **** ******, * mechanical ** ********* ****** built ****** *** ****** checks ******* ** *** the ****'* ********* ** deadbolt ** ********. ** the ***** ** ******, the *** ******* **. If *** ***** ** not ******, *** **** is ********, *** *** switch ******* ********* ** uncontacted ** *** *****.

****'* ** ***** ******* the ******** ** *** monitoring ****** ****** * lock:

***** ****** ****** ************* this ******* **** *% - **% *** ****, often $** ** $**, and ****** ** ******* requires ********* ******** *****.

Latchbolt ****** **********

******* ****** ** ********** strikes ******** ******** *** internal ******** ********, ** that ** **** ********* whether ** ** *** strike ****** ** ***** or ******** ** ********* lock *******. *** ********* of **** ** **** they *** **** *******, and **** ***** ** malfunction *** ********, *** they *** *** ** common ** *** ******* on *******.

**** ******* ***** **** as ** ******, **** this*** **** ****** ******:

Bond *******

*** **** ****** ****** of ********** ******** ******** a ****** **** ****** the ***** ******** ** the *************** **** ****** the ****. **** *** field ** ********* ** within ****, ** ********** LED ** **** ****** loop ******* *** **** is ****** ******. *** image ***** ***** *** 'green ** ****' *** indicator ** *** *******:

** **** *****, **** sensors *** * ******* option, *** ***** **** adds ** **** ***** they *** ******* ********. However, ***** ******* *** go '***' **** ****, and *** ********* ******** fail **** ******* ***. Periodic *********** ********* * technician ****** *** * replacement ****** ******* * few ******* *** ** needed **** ** ***** in *** **** ** five ***** *** ***** maglocks.

Using **** *** *** **** ********** ********

*** ******* ********, **** installers *** **** **** position *** **** ********** at *** **** **** by ****** *** ******** in ****** **** *** door ******** ******. ******* of ****** ******* * door ** **** ** closed, *** ****** ***** see ** ** **** and *** ****** ** closed *** ******.

**********, **** ********** ******* may ** *** ** separate ******* ********** ******. If ***** **** ** display **** ****** **********, this ****** *** **** be ****** ** *** accurate ******. *** *******, if ***** ******** ****** the *** ****** ** kept ******, ******** ********** from **** *** *** lock ********** ** ********.

[****: **** ******** *** originally ********* ** **** and ************* ******* ** 2017]

Comments (6)

** *** *** ******** **** ******, ******’* * ******** ***** of *****, *** ********* ** ******** *** *** ******, **** the ******?

***** * *** ***** **** *** **** *** ***** *******?

***, *** ***** ** **** ********* ** '****' **** **** for ****. ****** *** ***** ***** ***** **** **** * *CRASH* *** **** **** *** ******* ********, ** *** ***** itself ***** ******** ********** *** ***** *** **** '******' *** an ******* *******.

**** *******.

** ****** **** *********** *** *** *** ******* **** **** monitoring. ****** ** *** *** *********** ******* **** *** ******* security ***********'* *** ** *** *** ***** **** ******* *** the ******* ** **** ****** *** **** *** ***** **** the ***** **** ******* *** ***** ****** ******* ** ****** for *** **** *******. ***** ***** ****.

***** *** ***** **** ******* ****** *** * *** -- wouldn't **** ****** * *** ***** ***** **** *** **** opens, **** **** *** ******* **** ******* ******** * ****? So, ** **** ****** *** ** *** ********, ***'* *** on * ***** **** ************:

*. ***** ***** - ***** **** (****** **** ***** *** door **** * **** ** **** ********* ** *** ***** of *** ****)

*. *** ***** (**** ***** **** *******)

*. **** **** ***** (**** ******** ***** **** ******* *** latch ****** *******)

*. **** ****** ***** (** **** ****** *** ******** *** latch **** ******* ** ******** *** ****** ******* **** *** already ****** ****** *******)

** **** **** *** *** **** *** *** *** **** option **** ***? ******* ****** #* *** #* ***** **** in *** ******* ***** **** ***** ** * *** *** being **** ** ** ******** ******-********** **** *** ******* ** orderly ******** ** **** ****** ******** ** *** ****, *.*. 1) ******* ****, *) **** ****, *) ******* *** ****** while ******* ******* *** *******, *) **** ******.

** *** ******* *** ****** ** ***** *** *** *** not ****** *** ****** **********.

**** ***** *** **** **** *** ****** **** ********* ** shunt ** ************ **** *****?

**, ** *** ******** ** ** ***** **** *** *** and **** ******* * ******* ** **** ******* ** *** registered ***** **** *** **** * ****. ** **** *******/*** a ******* ** **** **** *** **** ** ****** **** the ****** **** (** **** ********* *** ****** ** *** unlock *** ****** *************) *** **** *** **** * **** at *** ****** *** *** ******* ****** ** **** *** register/log * ******* ** **** **** *** **** ** ******** opened. * ***** **** *** ******** *** ********* ******** **** a ****** ***** ** ******** ** *** **********. ****** **** triggers ** ********, * ******* ** ** ************* ******** **** a **** ***** ** ****** **** *** ******* ******* ******** the ***** ****** ******* ***** ***** *** ******* * ****** entry. ** ********** ***** ** **** ** ******* ****** ***** we *** * ******** **** *******.

****, *** ******* ** **** ********* ** ************ ** *** lock **********. * **** ***** **** ******** *** **** ***** regarding **** **********. *********, * *** ***** ********** **** ****** also ***** ****** ***** *** **** * *** *** *** but, ***** *** ***** ******* * *** **** *** **********.

**** ** ** *** ******!

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Genetec Synergis Cloud Link - Complex, Costly and Confusing on Jun 18, 2019
Genetec's Synergis Cloud Link is complex, costly and confusing compared to competitor access control architectures. Inside this note, we examine...
Biometrics Usage Statistics 2019 on Jun 17, 2019
While face and fingerprint recognition are used regularly for smartphones, it is not as common in physical security. In this note, we examine...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Manufacturer Favorability Guide 2019 on Jun 12, 2019
The 259 page PDF guide may be downloaded inside by all IPVM members. It includes our manufacturer favorability rankings and individual...
Dumber Techs, Bad Box Movers, Says Australian Distributor on Jun 10, 2019
Techs today are "dumber" than they used to be, despite better education and training and that makes a typical day "frustrating" for one...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...
Vidsys New President Interviewed on May 31, 2019
A decade ago, PSIM was hot with projections then of a billion dollar market by now. This has not come close to happening. However, Vidsys, one of...
IndigoVision Control Center VMS Tested on May 30, 2019
IPVM's last test of IndigoVision's VMS was in 2010, which found enterprise VMS features and a simple client interface. but no 3rd party camera...
China Jaywalking Facial Recognition Guide on May 27, 2019
News reports touting the PRC's AI prowess often showcase facial recognition cameras being used to automatically catch and fine jaywalkers.  In...
NJ Law Requires Apprenticeship For Public Works Integrators on May 24, 2019
Few integrators do a formal apprenticeship program. However, now a NJ law is requiring any integrator on public works projects (such as state...

Most Recent Industry Reports

Repositionable Multi-Imager Camera Shootout - Avigilon, Axis, Dahua, Hanwha, Hikvision, Panasonic, Vivotek on Jun 19, 2019
Repositionable multi-imager cameras are one of the fastest growing segments in video surveillance, with a slew of new offerings being recently...
Genetec Synergis Cloud Link - Complex, Costly and Confusing on Jun 18, 2019
Genetec's Synergis Cloud Link is complex, costly and confusing compared to competitor access control architectures. Inside this note, we examine...
Startup Vaion Launching End-to-End AI Solution Backed with $20 Million Funding on Jun 17, 2019
An EU / USA video surveillance startup, Vaion, founded by ex-Cisco Senior Directors is launching an end-to-end VSaaS platform with $20 million in...
Biometrics Usage Statistics 2019 on Jun 17, 2019
While face and fingerprint recognition are used regularly for smartphones, it is not as common in physical security. In this note, we examine...
The Scheme Hikvision and China Importers Use To Avoid Tariffs on Jun 17, 2019
Hikvision and numerous China importers are avoiding 25% tariffs by including an SD card slot in their IP cameras to claim they are 'digital still...
Sighthound Transforms Into Enterprise AI Provider Profile on Jun 14, 2019
Sighthound is now rapidly expanding its R&D team, building an enterprise AI service. This may come as a surprise given their origins 6 years...
ADT Eliminating Acquired Brands, Unifying Under 'Commercial' Brand on Jun 14, 2019
ADT is eliminating the brands of the many integrators it has acquired over the past few years, including Red Hawk, Aronson Security Group (ASG),...
NSA Director Keynoting Dahua and Hikvision Sponsored Cybersecurity Conference [Canceled] on Jun 13, 2019
The technical director for the NSA’s Cybersecurity Threat Operations Center will be keynoting a physical security cybersecurity conference that is...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Embattled $400 Million China Funded Philippines Surveillance System Proceeds on Jun 13, 2019
An embattled 12,000 camera surveillance system project that will cost ~$400 million will proceed.  The project contract was awarded, had its...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact