Standard for Access Control (UL 294)

By: Brian Rhodes, Published on Sep 03, 2013

Few specifications are seen more commonly in access control than UL 294. However, aside from seeing it in print, very few understand what it means. In this note, we break apart and define this spec, describing why it is a vital part of many Access RFPs.

A Standard Defined

*** ***** **** *** ****** ***** ******* ** Access ******* *******: 

  • ************ (************)
  • ***********
  • *********

***********, *** ***** ** UL *** ** * safety ********, ***** ******* proves **** ****** ********** can ** ********* *** operate ******** ******* ******. In *** **** ** access *******, **** ** a **** ****** **** validating ******* **** *** catch **** ** ***** - ** ******* **** the ****** **** *** harm *** ****** ** impede ****** ** ***** using *** ******.

** ********* *****, **** means ***** **** *** accidentally **** ****** *** keep ****** ** ****'* way **** ****** * malfunction. *** ** ******** subjects **** ******* ****** to * ***** ** testing ******** ** **** the ********* **** ******** code ************ ****:

  • *** (**** **): ************ **** **** component **** *** ****** a ****** ****** ****** (recommended) ******* ** *** (Sparking, *********)
  • **** **: **** **** **********, assures **** *********** ******* interfaces **** **** *****/*********** systems 
  • **** ***: ****** ******* 

* ** *** **** is * '***** ****' the ****** *** ***** to '*****' ***** ********* is ****, *** ** stands ** * '**** of *********' **** ******** in ****** ************** *********** ********* **** *** be *********.

The ****

***** ***********'* ***************** * ***** ** 'UL *******'**** *** ** *********** to ******* ********* *********. In *** **** ** UL ***, *** **** looks **** ****:

*** ** '******** ****' applies **** ** ******** such ** ********* *********, burglar ******, ****** *******, safes, *** ******.

Performance *****

** *** ******** ******* tests **** ******** *** well ******* ********* ******** environments. ******* *** ********* to ******** **********, *************, and ***** ***** **********, including:

  • ******** *******
  • ******** ******** (***********)
  • ********
  • ********* (**********)
  • **********
  • *********
  • ******* ***** (******* ******)
  • ******** ****** *********

***** *** ********* ************ and *** *** '*******' or '*******' ************** ** might ***** ** *** field. The ***** *********** *** each **** ******* ** the ****** ***** ******, but *** ********* ***** is ***** ** **** ****** of ******** *********** **** Level * (****** ***** security *********) ** ***** IV (******* ***** ******** equipment). 

**********

*******, *** *** ***** and ******** ** ** Access ******** **** ***** the ***** ** ** 294. *** ***** ******** from *** ***** *******:

  • ******* ******/********: *** ***** ***** "The ******** ** ****** data ** *** ********* by **** ********", *** also "**** ******** **** not ***** ** ************* computer ********* **** ** not ********* *** ********* of *** ****** ******* system..."
  • ********* *********: *****, *** ***** details "***** ** ****** control ********* ***/** ****** incorporates *** ******** *** functions ** * ******* alarm ******* ****, *** requirements ** *** ******** for *********** ******* ***** Units *** *******, ** 1076, ***** **** *****"

**** ** ********* ** note **** ******** ***** are ******* **** "*** Access ********* ***** ** UL *** *********", ******* this ** ********** *** possible. ***** **** ** major ********** ******* ******* the ***** ** *** standard.

Large ****** ********

********** *** ****** *******, UL *** ** ******, including ******* ****: ******* ******************************, ***.

*******, ************* ** **** on * ********* *****, and ***** *** ** gaps ** * *****'* portfolio. ** ** *** compliance ** ******** ** a ******, ***** ******** component **** ** ******* for **********, ** ***** is ** '******' *************.

******* *** ******** ******** for ******* *********** (doors) ********* ****** *** certification, ******* ** ****** is *** * ********** driver *** *******-*******************.

Prime ***

********** ** *** '******' overtures, ****** ************* *** ************ *********, *** ** ********* used ** **********-**************** **** **************. ** 294 ********** ** *** mandatory *** ****** *********, and **** ******* ****** the **** ** ************* especially **** ***** ********* are *** **** ****** for ****** **********, *************, and ******** ********* ***** 294 ** ******** *****. 

********, ***** *** ****'* testing '******' **** ******* are ****, *** **** remains ** *** ***** technician ** ******* **** in *** ******* ******* to ****** **** ** to *** *************.

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Access Control

Genetec Synergis Cloud Link - Complex, Costly and Confusing on Jun 18, 2019
Genetec's Synergis Cloud Link is complex, costly and confusing compared to competitor access control architectures. Inside this note, we examine...
Biometrics Usage Statistics 2019 on Jun 17, 2019
While face and fingerprint recognition are used regularly for smartphones, it is not as common in physical security. In this note, we examine...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Dumber Techs, Bad Box Movers, Says Australian Distributor on Jun 10, 2019
Techs today are "dumber" than they used to be, despite better education and training and that makes a typical day "frustrating" for one...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...
Vidsys New President Interviewed on May 31, 2019
A decade ago, PSIM was hot with projections then of a billion dollar market by now. This has not come close to happening. However, Vidsys, one of...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Facial Recognition Systems Fail Simple Liveness Detection Test on May 17, 2019
Facial recognition is being widely promoted as a solution to physical access control but we were able to simply spoof 3 systems because they had no...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Milestone XProtect 2019 R1 Tested on May 15, 2019
For the past few years, Milestone has released quarterly software updates XProtect VMS platform. What is new and how much impact do the updates...

Most Recent Industry Reports

Repositionable Multi-Imager Camera Shootout - Avigilon, Axis, Dahua, Hanwha, Hikvision, Panasonic, Vivotek on Jun 19, 2019
Repositionable multi-imager cameras are one of the fastest growing segments in video surveillance, with a slew of new offerings being recently...
Genetec Synergis Cloud Link - Complex, Costly and Confusing on Jun 18, 2019
Genetec's Synergis Cloud Link is complex, costly and confusing compared to competitor access control architectures. Inside this note, we examine...
Startup Vaion Launching End-to-End AI Solution Backed with $20 Million Funding on Jun 17, 2019
An EU / USA video surveillance startup, Vaion, founded by ex-Cisco Senior Directors is launching an end-to-end VSaaS platform with $20 million in...
Biometrics Usage Statistics 2019 on Jun 17, 2019
While face and fingerprint recognition are used regularly for smartphones, it is not as common in physical security. In this note, we examine...
The Scheme Hikvision and China Importers Use To Avoid Tariffs on Jun 17, 2019
Hikvision and numerous China importers are avoiding 25% tariffs by including an SD card slot in their IP cameras to claim they are 'digital still...
Sighthound Transforms Into Enterprise AI Provider Profile on Jun 14, 2019
Sighthound is now rapidly expanding its R&D team, building an enterprise AI service. This may come as a surprise given their origins 6 years...
ADT Eliminating Acquired Brands, Unifying Under 'Commercial' Brand on Jun 14, 2019
ADT is eliminating the brands of the many integrators it has acquired over the past few years, including Red Hawk, Aronson Security Group (ASG),...
NSA Director Keynoting Dahua and Hikvision Sponsored Cybersecurity Conference [Canceled] on Jun 13, 2019
The technical director for the NSA’s Cybersecurity Threat Operations Center will be keynoting a physical security cybersecurity conference that is...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Embattled $400 Million China Funded Philippines Surveillance System Proceeds on Jun 13, 2019
An embattled 12,000 camera surveillance system project that will cost ~$400 million will proceed.  The project contract was awarded, had its...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact