Lock Status Monitoring Tutorial

Author: Brian Rhodes, Published on May 12, 2012

Just because your doors look secure does not mean they are. Unless access systems are using lock status monitoring, the doors and areas they protect may not have any certainty of being secured. Can you tell whether the door below is locked? How?

Lock status monitoring addresses a key vulnerability of many access control systems, but its value is commonly ignored or misunderstood. Inside this note, we explain:

  • How Lock Status Monitoring Prevents Security Risks
  • Why Shut Doors Do Not Mean Secure Doors
  • Tradeoffs Of Door Position vs.or Lock Monitoring
  • Typical Solution Cost
  • Examining Latchbolt Monitoring vs Latchbolt Strike Monitoring
  • Explaining Maglock Bond Sensors

[Note: This tutorial was originally published in 2012 and substantially revised in 2017]

**** ******* **** ***** **** ****** **** *** **** **** are. ****** ****** ******* *** ***** **** ****** **********, *** doors *** ***** **** ******* *** *** **** *** ********* of ***** *******. *** *** **** ******* *** **** ***** is ******? ***?

**** ****** ********** ********* * *** ************* ** **** ****** control *******, *** *** ***** ** ******** ******* ** *************. Inside **** ****, ** *******:

  • *** **** ****** ********** ******** ******** *****
  • *** **** ***** ** *** **** ****** *****
  • ********* ** **** ******** **.** **** **********
  • ******* ******** ****
  • ********* ********* ********** ** ********* ****** **********
  • ********** ******* **** *******

[****: **** ******** *** ********** ********* ** **** *** ************* revised ** ****]

[***************]

The ********** ** **** **********

****** ***, **** ********** ****** ** *** ******* ** *******'* lock ** ********* ****** ** '******'. ******* **** *********** ***** can **** **** ******** **** *** **** ** ****, **** Monitoring ***** ****** ****** *** **** ** **** ****** *** secured.

**** **** ************* ********** ****** *****, **** ******** ** ********** to *********. ****** *** **** ******** ****** ** ********* ** being ******, ********* *** ****** ***** ******** *** ** ********** by *** ******.

*** *******,******** ********** ** *********** ** ******* ******* ******* ** *** ****** so *** ********* ***** ***** *******, ** **** ** **** tape ** **** ***** ****** ** ***.

*** ********************* ***** ******* ** ******* *****, ** ***** **** **** the ****** *** *** ******** **** **** *******. *** ***** holding ***** ***** *********** ** ***** ***** *** *** ******* to ******* **** *****, **** **** ******* ******** *** ******* with **** ** *****, ******** *** **** **** ********* ** pounds ** **** * *** *******, ******** *** ***** ** be ****** ****** ****.

Shut ***** ** *** **** ******

*** ***** **** ** **** ***** ***** *** ********* ****** fully ****** ** ** ****** ******, *** ** ************* ******** and ******** ** ****** ****** ** *******. **** * **** equipped ******** ******** *********** **** **** ****** ********* ** * **** ** **** or ****, ******* *** ********** **** '******' **** ***** '******'.

*************, **** ******** ** ****** ****** ******** **** **** ********, often *** *********** *** *** ******, ** ***** ** ********** ***** ****** ******* ********. *******, **** ** **** ******* ******** **********, ********* **** the ****** **** *** ***** ****, ************ ***** ******* *** door ** ********* ** ********* *****.

Door ******** ** **** **********

** **** *****, ***** **** ********** ***** ********** **** **** door ******** ********. *** **** ********** ***********, ****** **** ******** ******** ** **** ******** *** ********* at *** '**** *******' *****, ******* * ****** ******-****** ******* on *** ********** *****. **** ** ** ******* *** ** HID ***** **********:

*** **** ** ****** * *******-***** **** ******* *** **** as ****** ** $* *** ***, *** **** * *** minutes ** ******* **** ** ********* ** ** ****** ******. However, ********** ********** **** ********** ** *** **** ****** *** add *% - **%, ***** $** ** $** ** *** item's ****. *** **** ********** *** ******* *** **** ********** is *** ** ******** **** ** **** ******** ********.

** *** ****** *****, *** ********** ***** ******* ** ********* to *********** ** *** ** *** ****** *** ***** *****:

*** ****** ******* *** ***** ********** ** *** ***** ** locks (**: *******, ********, ** ******** *******) ** ***** ******* separate **** ***** *****, *** ******* ***** ********** *********** ********* still ****** *** **** ******** ***********.

Three ****** *****

**** ********** ** ******* ******** ** ***** ****:

  • ********* ********** (***)
  • ********* ****** ********** (****)
  • ******* **** *******

***** *** ***** *** **** ** ** ******* ****** *** same, *** ********** ******* *** *********** *********. *** **** * lock **** ** ****** *****, **** * *******, *** ** monitored ** ******** *** **** ********. ** ******* *** ***** methods *****:

Latchbolt **********

*** *** ** ***** ** ***** *** ****** *** ***** latches ******* ** ** '********* **********'. ** **** ******, * mechanical ** ********* ****** ***** ****** *** ****** ****** ******* or *** *** ****'* ********* ** ******** ** ********. ** the ***** ** ******, *** *** ******* **. ** *** latch ** *** ******, *** **** ** ********, *** *** switch ******* ********* ** *********** ** *** *****.

****'* ** ***** ******* *** ******** ** *** ********** ****** inside * ****:

***** ****** ****** ************* **** ******* **** *% - **% per ****, ***** $** ** $**, *** ****** ** ******* requires ********* ******** *****.

Latchbolt ****** **********

******* ****** ** ********** ******* ******** ******** *** ******** ******** position, ** **** ** **** ********* ******* ** ** *** strike ****** ** ***** ** ******** ** ********* **** *******. The ********* ** **** ** **** **** *** **** *******, and **** ***** ** *********** *** ********, *** **** *** not ** ****** ** *** ******* ** *******.

**** ******* ***** **** ** ** ******, **** ******* **** ****** ******:

Bond *******

*** **** ****** ****** ** ********** ******** ******** * ****** that ****** *** ***** ******** ** *** *************** **** ****** the ****. **** *** ***** ** ********* ** ****** ****, an ********** *** ** **** ****** **** ******* *** **** is ****** ******. *** ***** ***** ***** *** '***** ** good' *** ********* ** *** *******:

** **** *****, **** ******* *** * ******* ******, *** using **** **** ** **** ***** **** *** ******* ********. However, ***** ******* *** ** '***' **** ****, *** *** sensitive ******** **** **** ******* ***. ******** *********** ********* * technician ****** *** * *********** ****** ******* * *** ******* may ** ****** **** ** ***** ** *** **** ** five ***** *** ***** ********.

Using **** *** *** **** ********** ********

*** ******* ********, **** ********** *** **** **** ******** *** lock ********** ** *** **** **** ** ****** *** ******** in ****** **** *** **** ******** ******. ******* ** ****** knowing * **** ** **** ** ******, *** ****** ***** see ** ** **** *** *** ****** ** ****** *** secure.

**********, **** ********** ******* *** ** *** ** ******** ******* controller ******. ** ***** **** ** ******* **** ****** **********, this ****** *** **** ** ****** ** *** ******** ******. For *******, ** ***** ******** ****** *** *** ****** ** kept ******, ******** ********** **** **** *** *** **** ********** is ********.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Favorite Biometrics 2018 on Apr 23, 2018
Biometrics are on the rise, or at least integrator opposition to them is declining, according to new IPVM integrator statistics.   Almost half of...
Global Real-Time Video Surveillance - EarthNow on Apr 20, 2018
A new company, EarthNow, with backing from Bill Gates, Airbus and more, is claiming that: Users will be able to see places on Earth with a delay...
Dedicated Vs Converged Access Control Networks (Statistics) on Apr 20, 2018
Running one's access control system on a converged network, with one's computers and phones, can save money. On the other hand, hand, doing so can...
April 2018 IP Networking Course on Apr 19, 2018
This is the last chance to register for our IP Networking course. Register now. NEW - 2 sessions per class, 'day' and 'night' to give you double...
Worst Access Control 2018 on Apr 18, 2018
Three access control providers stood out as providing the most problems for integrators. In this report, we analyze the answers to: "In the...
Key Control For Access Control Tutorial on Apr 16, 2018
End users spend thousands on advanced systems to keep themselves secure, but regularly neglect one of the lest expensive yet most important aspects...
Alarm.com Business Market Expansion on Apr 13, 2018
Alarm.com has millions of subscribers, but the company has traditionally been mostly a residential/home focused offering.  ADC's new Smart Business...
GDPR For Video Surveillance Guide on Apr 12, 2018
The European Union’s General Data Protection Regulation (GDPR) comes into force on May 25, but there is much confusion and no clear guidelines on...
Average Access Control Project Size 2018 on Apr 10, 2018
  The most common access control project size is 5 - 16 doors per project. This 2018 result mirrors previous statistics, most recently in 2016...
Eocortex / Macroscop VMS Company Profile on Apr 09, 2018
Eocortex is the international brand of Russian VMS manufacturer Macroscop. Macroscop was founded in 2008, and the Eocortex name created in 2013. We...

Most Recent Industry Reports

Chinese Manufacturer Kickstarter Campaign Huge Success (EverCam) on Apr 23, 2018
In a week, a Chinese manufacturer's expertly done Kickstarter campaign has received $1.4 million in pledges, an incredible amount for a video...
Favorite Biometrics 2018 on Apr 23, 2018
Biometrics are on the rise, or at least integrator opposition to them is declining, according to new IPVM integrator statistics.   Almost half of...
Dahua and Hikvision Win Over $1 Billion In Government-Backed Projects In Xinjiang on Apr 23, 2018
Dahua and Hikvision have won well over $1 billion worth of government-backed surveillance projects in China’s restive Xinjiang province since 2016,...
May 2018 Camera Course on Apr 20, 2018
Save $50 on early registration until this Thursday, the 26th. Register now (save $50) for the Spring 2018 Camera Course This is the only...
Global Real-Time Video Surveillance - EarthNow on Apr 20, 2018
A new company, EarthNow, with backing from Bill Gates, Airbus and more, is claiming that: Users will be able to see places on Earth with a delay...
Dedicated Vs Converged Access Control Networks (Statistics) on Apr 20, 2018
Running one's access control system on a converged network, with one's computers and phones, can save money. On the other hand, hand, doing so can...
April 2018 IP Networking Course on Apr 19, 2018
This is the last chance to register for our IP Networking course. Register now. NEW - 2 sessions per class, 'day' and 'night' to give you double...
Rare Video Surveillance Fundraising - Verkada $15 Million on Apr 19, 2018
Fundraising in video surveillance (and the broader physical security market) has been poor recently. Highlights are few and far in between...
'Best In Show' Fails on Apr 19, 2018
ISC West's "Best In Show" has failed. For more than a decade, it has become increasingly irrelevant as the selections exhibit a cartoon level...
Security Camera Cleaning Frequency Statistics on Apr 18, 2018
150+ integrators told IPVM how often they clean cameras on customer's sites and why.  Inside we examine their answers and break down feedback...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact