Using Automatic Door Operators with Access

Author: Brian Rhodes, Published on Dec 12, 2014

Opening and closing doors might sound simple, but it takes a high-tech piece of door hardware to pull it off. Integrating automatic door operators with access control can be tricky if the basic fundamentals of these devices are not understood.

In this note, we look at the two types of automatic door operators, how they work, the two types of controlling them and how to integrate with access control systems.

******* *** ******* ***** ***** ***** ******, *** ** ***** * high-tech ***** ** **** ******** ** **** ** ***. *********** automatic **** ********* **** ****** ******* *** ** ****** ** the ***** ************ ** ***** ******* *** *** **********.

** **** ****, ** **** ** *** *** ***** ** ********* door *********, *** **** ****, *** *** ***** ** *********** them *** *** ** ********* **** ****** ******* *******.

[***************]

Complex *******

****** **** ******* ***** *** ** ****** ******* *****, **** ********* **** **** them ** ****. ******* ** ****** ***** ** *********** ** gain *****, ** ****** ** **** ** ****** *** ******** to ***** * ****** *****, ********* *** ******** ***** ******* the **** ****** ** ** ******** ** ******** **.

** ** **** *********, ********* *** **** **** ***** **** ******, but ********* **** ******* ****** ******* *** ********** ** ******* people **** ********** ****.

Two ***** - ******* & ***** ***

********* ********* *** **** *** ** *** ***** *****:

*******:***** ********* ******* ***** ******** ** ** ****** ** ******** to *** **** ** *****, *** *** ****** ** **** 'big ***' ****** ****** ** **** ********* ********* *****. *** door ***** ***** ********* ******* *** ********** **** ***** **** can ***** ******** ** ****** *** **** ******* **** ** four **** ** **** ** **** *******.

***** ***: ******** ** ******* **** *********** ****** *****, ***** ********* generally *** * ***** *** ** **** ** **** * door ** *** ****** **** ** ** ****** ******** ** it's ******. ***** ***** ********* *** ** ******** ** ****** openings, **** *** *** **** ****** *** *** **** ****** to ********* **** ****** *******.

Demo ******** *****

*** ***** **** ***** ***** * '***** ***' ******* ** use, *** ***** *** ****** ** *********** ** **** * card ******. ** ******** ***** ******* ** ***** ********: 

****** **** **** ********* ***** ** * ***** *****. *** entire ***** ** ***** **** *** ***** * **** *** last * ****** ** ******, *** ****** ** ********** ** safe ***** ****** *** ** *** ***** ****** ** ************ relatch door ********.

Low ******

* ****** ********* ** ********* ** *** **** ***** ** used ** **** *** ****. **** ****** ************** **** *** the *** ** '*** ******' *********, *** **** **** ******** defines ** ******** *************. ** **** *** ******** *** ********** of *** ******* **** *********, *** ****** *** *** (*** our: ********** ****, *** *** ****** ******* ****** *** ****) ******* **** *** ***** **** **** * reduced *****/******* ****** ***** **** ******* '**** ******' *****.

Access ***********

********* ****** ******* **** ********* ** * ****** ****, *** can ***** ** ** ****** ***********. **** ** *** ******* below * ****** ***** *** ******** ** ******** **** * maglock locked *** ** *****:

** **** *********** *****, **** *** ******** *** *** ****** system **** ** ** ********** ** ******* *** ******** *****, then ***** *** ******* ** ******* ***** ** **** ********* damage ** *** ********, ****, ** **** ******* *** **** place.

** **** ***, ****** *********** **** **** ***** ** **** the ******** *** *** ****** ****** ********, *** *** ** a ****** ************* ***** ** *** ********** **** *****, ****** system, *** ******** ****.

Methods ** *******

*******, ******* ** ******** *************, *********** **** ********* **** ****** control ******* ** ******** ******* *** ** *** *******:

  • ****** - *********** *** ********
  • ******** - *********** *** ******

(******) *********** *** ********

** **** *****, *** *** ***, *** ******** ****** **** be ********* **** ********* ***** ******** **** ** ********* ************* ***** the ****** ***** ********* *** ***** ******** ** *** ****. The ********'* ********* ****** ********* ******** ******** ********** ** *** this *********** ****** ***** *****:

(********) *********** *** ******

**** ****** **** * ****** ****** ******* ******** ** *** push ****** *******. * **** ******** *** ** *** ********** to **** ** *** ******, ********* ** * ***** ******* in *** **** **********.  ** **** *********, *** ********** *** not ********* **** *** **** ** ***** ** ***, *** only ****** *** ****** *** *** ** ***** **** ****. This ** * ******* ****** ** *********** ******, *** **** is *** **** ***** *** ****** ******** ** *** ******** mechanical **** ***** *** ********:

Tailgating ****

******* ******* *** ******* * **** ** *********** ********* ** users, *** *** ***** ** ***** ******* ****** ** *** requirements, ***** *** ****** **** *** **** *******.

**** ****** ******** ********** ******** ********** ** *** ****** ******* ******: ********** ****, ***** ************ ***** *** ***** ** ******* ******** *****.  This ***** ******** ******** ****** ******* ******** **** *** ********* ***** detectors ** ************ *******.

Common *******

********* *** ******* ********* **** ********* ******* *** ***** ** **** from $*** ** $**** ** ****. **** *******, ** **** certain ****** *** ******* ********* ************ ******** ****** ****** ** field ************* ** **** **** ****** ******* *** *********.  **** of *** **** ********** ****** ***:

Comments (6)

******: "********** ************ *** ** ****** ******* *****". ***** *** ********* ** related/involved *** ** ***** ****?

****'* **** ******** ******* '*******' *** '*********' **** ***** ****:

*** ********* *** *******, *** ******* *** *** *********. ******* cannot **** **** *****.

******* *** ****** ******. ********* *** ***.

******* *** *** *** *******, **** **** ******* **"**"**". ********* are **** *****, **** **** ******** *** ****** ***** ** a **** (**"+) *** ********** *" ** **** *** *** wall. **** *** ***** *****, ******** ** ****** ** **** - ***** ******* ***** **** **** * ******.

******* *** ********* ********** (*********) ******** *******. ********* *** *******-********** (circuit ****** *** ****** *********) *******.

******* ********* **** **** **** $***. ********* ********* **** **** than $***. ($**** ** **** ** ******.)

******* **** ********* *** ********* ******. ********* **** *** ********, onboard ***********, ** **** ****** ********* ******** ******* *** **********. (They *** **********.)

**** **** ****?

****** ***** *** *** *** *******. ** *********. * *** not **** * ****** ******* ** * *** ** **** my ******** ** *** *******.

*** ********* **** ********:

"**** **********: **** ** **** ******** ** '******** ********' ** locks ** **** ********* ******, ******* *** **** **** ***** is * **** ****** ** ******** *** ******** ** ** it's ***. *** ******** **** **** ******* *** **** **** automatically **** **** **** ***** ****** ** *********."

**** ******* ** ********** *******/***********(?) ********** ** **** ***** ********** so **** ***** ** *** ****** ****. **** *** ******** in ** ****; "***** *** ********* (** *** *********) ** related/involved *** ** ***** **** (**** ***** *****/****** * **** code ***********)?"

*** ***** ** ** *** ***** *** **** ***** **** to **** **** **** *** **** ***** ** *********. ** any/all ********* ** ****** **** **** ****** *******/**** **. **** avoiding *** ********* ********.

** *******, ********* *** ******* *** **** ** ******* **** code, *** ** ** * *******.

**** ******* **** ***** ****** ** *******:

******* *** *** ********* ** **** ***** ***** (************ **** ************ **.)

************** ********* ** **** ******, *** ******* ** *** **** is ******** ** **** ******* ** ***** ******** ********* **** the ******** ** **** ** *** *** **** *** **** is ********** ** **** **** ****** * ****** *****. *** AHJ ** *** **** **** ****.

**** **** **** *****?

********* *** ******* *******, **** ********* ******* ***** **** ******** with
* ******* **** ****** *** ******* **** ** ***** **** pushed *** ** ***********. **** ** ********* ***** ** *** "breakout" *******. ** ***** ****, **** ***** *** ********* ***** in ****** ************ -- ********* ** * **** ********/****.

******* ******** ****** ** ***** ** ****, ***** **** *** have ** ** ******* *** ** ********* **** *** "********" operation ** **** ***** ****** *** ********** ******** ***** ** added ** *** ****** ** ********** ****** *******. ***** ** could ******* ***** *****.

**** *********** ** ********* **** ****** ** ** ****** ******* system, *** *** **** **** ** **** * ********** ** the ****** ******'* "*******-**-****" *****. *********, *** *** *** ***** alarms **** *** **** ****** *** ****** ** ***** *** motion ******** ** ****.

* ******* **** ***** ** ** ************** *** ***** ****-******-**** ***** *******

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

ConvergenceTP (CTP) Claims VMS Integrations Simplified on Mar 30, 2017
Developing integrations with 3rd party systems can be expensive and time consuming, especially in the physical security market with hundreds of...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...
Lock Keyways For Access Control Guide on Mar 23, 2017
Lock keyways can be the difference between a lock working or not. Understanding keyways is important for access control. Indeed, a member recently...
Glass Break Sensor Tutorial on Mar 21, 2017
Burglars often break glass windows to get into a house. Using glass break detectors in conjunction with alarm contacts is a good way to protect the...
Unikey Smart Phone Access Control Platform on Mar 21, 2017
More and more people carry smart phones. Many think this could replace the conventional key or card for access control. However, using a phone...
Alarm Panic Switches Tutorial on Mar 16, 2017
Panic switches allow silently triggering an alarm system when it is otherwise disarmed. In this tutorial we explain and contrast the 7 most common...
Brivo Opens Up, Adds Mercury Support on Mar 16, 2017
Brivo's cloud-based access control was built around the companies proprietary hardware controllers, and was often seen as a limitation by...
Access Control Course Spring 2017 on Mar 16, 2017
IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the...
Environmental Sensors For Burglar Alarm Tutorials on Mar 15, 2017
Intrusion detection systems can be used to alert users to environmental issues. By connecting sensors that monitor the heat, humidity, and...

Most Recent Industry Reports

Last Day Save $50 - IP Networking Course on Mar 30, 2017
Last Day to Save $50 on the May IP Networking Course. This is the only networking course designed specifically for video surveillance...
Dahua Manager: Lots of Backdoors Beyond Dahua or Hikvision on Mar 29, 2017
A Dahua technical manager has fired back at criticisms of Dahua's backdoor, posting publicly what many at Dahua have privately been saying for the...
$10,000 Free VMS Licenses For New Dealers IPConfigure on Mar 29, 2017
Another gimmick or a real deal? The company that brought 'Unlimited' Enterprise VMS License for Just $32,000 and a cannon to ISC West are back with...
Genetec and Axis Power Comcast's SmartOffice on Mar 29, 2017
Comcast has more than 20 million subscribers and $80 billion in revenue. Now Comcast is partnering with Genetec and Axis to deliver a...
IP Cameras Lose Buy America Protection on Mar 28, 2017
IP Cameras have lost the US government's 'Buy America' protection as the Security Industry Association (SIA) successfully lobbied the government to...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Anixter Favorability Results on Mar 28, 2017
Anixter's direct sales and integrator anger about it has been in the news recently: Anixter / Bosch Sells Direct to Amazon Anixter Touts...
Chinese Government Spies on Churches With Video Surveillance on Mar 27, 2017
The Chinese government is using video surveillance to spy on churches in China, reports UCANews, explaining: The [Chinese government]...
Hanwha Wisenet X Tested on Mar 27, 2017
Hanwha has released their latest generation, the Wisenet X series, powered by their new Wisenet 5 processor. This new series claims improvements...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact