Doors - SmartRelay 3 system
The SREL3 ADV system can be used to secure doors.
Door with a reader and a button
In this use case, the controller is installed in a protected area, such as the building interior. An external reader is mounted on the unprotected side of the door and can read identification media.
No-one can manipulate the data since communication is secured from the reader to the controller and to LSM. When the data reach the controller, the controller evaluates them. If there is a virtual network and connection to LSM (Ethernet), the latest information is retrieved using the identification medium; if not, the system used the last status saved internally. Depending on the result of the evaluation, the controller triggers the required action, such as actuate a relay.
The controller also features a pre-configured, non-reprogrammable push-to-open function. The relay actuates if the relevant contacts (see Controller) are interconnected with one another. The relay integrated into the controller can be operated with an authorised identification medium or by connecting the relevant contacts. One or more buttons can be installed on the contacts. Users can press these buttons instead of using an identification medium in a secured area. This improves user convenience without losing control over the door status.
If the reader needs to be protected against vandalism, sabotage or the effects of the weather, a protective housing can be fitted to the reader (SREL2.COVER1).
Building entrance doors are a special case:
- All users need to pass through one of the building entrance doors on a daily basis.
- Building entrance doors are exposed to the weather on one side.
- Building entrance doors are in an unsecured area on one side.
- It must also be possible to open building entrance doors without an identification medium in an emergency at times.
If a virtual network is used, building entrance doors are ideal for use as a gateway. The building entrance is a door which many users pass through on a daily basis. This means that each identification medium used here is verified on the reader and, consequently, in the LSM database via the controller. Authorisation changes, IDs to be blocked and time budgets are thus efficiently managed.
Access events can be forwarded to a third-party system via the serial interface.
The controller can be powered either via an external power supply unit or via the network line. The controller, in turn, can power the reader. If the voltage drop is too great, the reader can also be supplied by an external power supply unit (see External power supply).
See Connecting one or more readers and Connecting one or more buttons on wiring.
Use with two buttons
IMPORTANT
No check on authorisation
Any person who has physical access can operate the relay by using the two buttons.
- Ensure that no unauthorised persons can access this locking device.
There is no longer a need to use an identification medium. Users only need to press a button to operate the relay (and open the sliding door in this example). Compared to a purely electrical connection, this approach brings the advantage of providing an overview when the relay was actuated and what its current status is (see SmartSurveil).
The relay is not protected against unauthorised operation. This type of connection is thus only suitable for installing in areas which are already secured.
See Connecting one or more buttons on wiring.