Skip to main content
BluINFO

Access Control Remote Devices A&E Spec

Overview 

This article contains two different views. Use the button below to toggle between the two views. If you are looking to save this information, right click and print or save as a pdf. 

 

 

Architecture and Engineering Specifications

Access Control Remote Devices

 

 

BluBØX, Inc.
9 Bartlett Street, Suite 334
Andover, MA 0181
Phone:  (844) 425-8209
www.BluBØX.com

© 2017 BluBØX, Inc.  All rights reserved

 

Product Support

The first lines of support for BluBØX products are the third-party installing/servicing dealer and the online BluBØX Knowledge Base.  Please check the Knowledge Base and/or contact the dealer with any questions or support requests, prior to contacting BluBØX.

Specifications

This Architectural and Engineering Specifications document utilizes MasterFormat™ April 2016 Edition and SectionFormat™ / PageFormat™ December 2009 Edition standards by the Construction Specifications Institute (CSI). 

This document specifies the architectural/engineering and bid criteria for a Physical Access Control System (PACS) with a cloud-based Hosted Security Management System (HSMS) software that controls and monitors networked intelligent system controllers, card readers and personal identification devices, portal control devices, input/output interface hardware and power supplies.

Notes to Specifier

1.  Where several alternative parameters or specifications exist, or where the Specifier has the option of inserting text, such choices are presented in <bold red text> .

2.  Explanatory notes and comments are presented in red hidden text .  To display the hidden text, see the Instructions at the end of this document.

3.  Delete any item or paragraph that is not applicable to this project, renumber the paragraphs.  Insert additional provisions as required for this project.

4.  Delete the hidden text specifier instructions prior to releasing or publishing this document.

Document Disclaimer and Restrictions

Information in this document was current as of the time of publication, and subject to change without notice, Inc.  For the most up-to-date information, visit www.BluBØX.com.

 

 

 

 

Section  28 15 19

ACCESS CONTROL REMOTE DEVICES

Copyright 2017 BluBØX, Inc– All rights reserved

 

PART 1 GENERAL 

  1. 1.01.     SUMMARY
    1. Section Includes
      1. This section specifies access control devices, intrusion detection devices, security access devices that are controlled and monitored by a Hosted Security Management System (HSMS) as part of Physical Access Control System (PACS).
    2. Products Furnished [or] Supplied But Not Installed Under This Section
      [SPECIFIER NOTE: Briefly list products that are only furnished/supplied by this section, but whose installation is specified in other sections.  For example, these may be new products “installed by owner”.  Delete if not used.]
    3. Products Installed But Not Furnished [or] Supplied Under This Section
      [SPECIFIER NOTE: Briefly list products that are only installed by this section, but furnished/installed under other sections.  For example, these may be new products “furnished by owner”. Delete if not used.]
    4. Related Requirements
      [SPECIFIER NOTE: Delete any item or paragraph not applicable in the section and renumber the paragraphs.]
      1. Section 07 00 00 – Thermal and Moisture Protection (Division 07)
        1. Section 07 84 00 – Firestopping. 
      2. Section 08 00 00 – Openings (Division 08)
        1. Section 08 10 10 – Doors and Frames.
        2. Section 08 11 73 – Sliding Metal Fire Doors.
        3. Section 08 30 00 – Specialty Doors and Frames.
        4. Section 08 31 13.53 – Security Access Doors and Frames.
        5. Section 08 34 59 – Vault Doors and Day Gates.
        6. Section 08 35 13.13 – Accordion Folding Doors.
        7. Section 08 42 00 – Entrances.
        8. Section 08 71 00 – Door Hardware. 
        9. Section 08 74 00 – Access Control Door Hardware.
      3. Section 26 00 00 – Electrical (Division 26)
        [SPECIFIER NOTE: Common Work Results for Electrical, for interface and coordination with building electrical systems and distribution]
        1. Section 26 05 11 – Requirements for Electrical Installations.
        2. Section 26 05 21 – Low Voltage Electrical Power Conductors and Cables (600 Volts and Below.
        3. Section 26 05 33 – Raceways and Boxes for Electrical Systems.
        4. Section 26 05 41 – Underground Electrical Construction.   
      4. Section 27 00 00 – Communications (Division 27)
        1. Section 27 05 33 – Pathways for Communications.
        2. Section 27 10 00 – Structured Cabling.
        3. Section 27 15 00 – Communications Horizontal Cabling.
        4. Section 27 15 01.11 – Conductors and Cables for Electronic Safety and Security.
          [SPECIFIER NOTE: For cabling between system computers, panels and remote devices]
        5. Section 27 20 00 – Data Communications.
        6. Section 27 24 00 – Peripheral Data Communications Equipment.
      5. Section 28 00 00  Electronic Safety and Security (Division 28)
        1. Section 28 05 00 – Common Work Results for Electronic Safety and   Security.
          [SPECIFIER NOTE: For general requirements that are common to more than one section in Division 28.]
        2. Section 28 05 26 – Grounding and Bonding for Electronic Safety and Security.
        3. Section 28 05 28 – Pathways for Electronic Safety and Security, for conduit and raceway requirements.
          1. Section 28 05 28.33 – Conduits and Boxes for Electronic Safety and Security. 
        4. Section 28 08 00 – Commissioning of Electronic Safety and Security.
          [SPECIFIER NOTE: For requirements for commissioning, systems readiness checklists, and training.] 
        5. Section 28 10 00 Access Control.
        6. Section 28 14 00 Access Control Hardware.
  2. 1.02.      REFERENCES
    1. Abbreviations And Acronyms
      1. ADA: Americans with Disabilities Act.
      2. AES: Advanced Encryption Standard.
      3. APB: Anti Passback.
      4. DHCP: Dynamic Host Configuration Protocol.
      5. EOL: End of Line (resistance).
      6. FIPS:  Federal Information Processing Standard.
      7. HSMS: Hosted Security Management System.
      8. IP: Internet Protocol.
      9. ISO: International Standards Organization.
      10. ITU: International Telecommunication Union.
      11. LAN: Local Area Network.
      12. LED:  Light Emitting Diode.
      13. LCD:  Liquid Crystal Display.
      14. NIST: National Institute for Standards and Technology.
      15. OPC: Open Platform Communication.
      16. PACS: Physical Access Control System.
      17. PIN: Personal Identification Number.
      18. PoE: Power over Ethernet.
      19. REX: Request to Exit.
      20. SIA: Security Industry Association.
      21. SIP: Session Initiation Protocol.
      22. SSH: Secure Shell.
      23. SSL: Secure Socket Layer.
      24. TCP: Transmission Control Protocol.
      25. WAN: Wide Area Network.
    2. Definitions
      1. ABA Track:  Magnetic stripe that is encoded on track 2, at 75-bpi density in binary-coded decimal format; for example, 5-bit, 16-character set.
      2. Authentication: A process that establishes the origin of information, or determines an entity’s identity.
      3. Authenticator: A memory, possession, or quality of a person that can serve as proof of identity, when presented to a verifier of the appropriate kind. For example, passwords, cryptographic keys, and fingerprints are authenticators.
      4. Authorization: A process that associates permission to access a resource or asset with a person and the person’s identifier(s).
      5. Auto-relock:  Door control feature that automatically relocks the door after access has been granted and the door has opened and closed, regardless of the time allowed for the door to momentarily remain unlocked to allow entry.
      6. Controller:  A purpose-built microcomputer that receives from the HSMS the door and cardholder data including access privileges and device configurations; communicates with reader and keypad access control devices and performs real-time access decisions; executes processes and procedures based upon user-selectable/user-defined triggers; and performs I/O operations with monitoring inputs and control relay outputs.
      7. CPU:  Central processing unit, the electronic circuitry within a computer that executes the computer’s firmware and the software running on the computer, processing data the computer receives from connected devices and systems.
      8. Credential:  Data assigned to a person or non-person entity (such as security system equipment) and used to identify that person or entity. For a person, the data may be printed on an access/ID card, such as a photograph, name, and other printed data, or stored electronically in the computer chip on a smart card, an RFID chip, or in the memory of a biometric reader. For electronic equipment, the data is securely stored in a digital certificate file, which contains equipment identification information as well as the allowed purposes for which the certificate may be used.
      9. HSMS: Hosted Security Management System, a cloud-based service provided (SaaS PACS Application).
      10. Identifier:  A credential card, keypad personal identification number or code, biometric characteristic, or other unique identification entered as data into the entry-control database for the purpose of identifying an individual. 
      11. Location:  A Location on the network having PACS equipment installed.  Where this term is presented with an initial capital letter, this definition applies.
      12. PACS: Physical Access Control System.
      13. ROM:  Read-only memory.  ROM data are maintained through losses of power.
      14. RS-232:  ANSI/TIA standard for asynchronous serial data communications between terminal devices.  This standard defines a 25-pin connector and certain signal characteristics for interfacing computer equipment.
      15. RS-485:  ANSI/TIA standard for multipoint communications.
      16. TCP/IP:  Transport control protocol/Internet protocol incorporated into Microsoft Windows.
      17. UPS:  Uninterruptible power supply.
      18. Wiegand:  Patented magnetic principle that uses specially treated wires embedded in the credential card.
      19. Windows:  Microsoft® Windows®, a computer operating system by Microsoft Corporation.
        Workstation:  A network-connected personal computer intended to be used by a specific person or people for the performance of specific tasks, such as an alarm and video monitoring workstation; a tablet computer used for a similar function.
    3. Reference Standards
      1. The latest published edition of a reference shall be applicable to this Project unless identified by a specific edition date.
      2. All reference amendments adopted prior to the effective date of this Contract shall be applicable to this Project.
      3. The publications listed below (including amendments, addenda, revisions, supplement, and errata) form a part of this specification to the extent referenced. The publications are referenced in the text by the basic designation only.
      4. American National Standards Institute (ANSI)/ International Code Council (ICC):
        1. NASI/ICC A117.1 – Standard on Accessible and Usable Buildings and Facilities
      5. American National Standards Institute (ANSI)/ Security Industry Association (SIA):
        1. ANSI/SIA AC-03 – Access Control: Access Control Guideline Dye Sublimation Printing Practices for PVC Access Control Cards.
      6. Department of Justice American Disability Act (ADA)
        1. 28 CFR Part 36 – ADA Standards for Accessible Design 2010.
      7. Electronic Industries Alliance (EIA):
        1. EIA-568-A – Commercial Building Telecommunications Wiring Standard.
        2. EIA-569 – Commercial Building Standard for Telecommunications Pathways and Spaces.
        3. EIA-606 – The Administration Standard for the Telecommunications Infrastructure of Commercial Buildings.
        4. EIA-607 – Commercial Building Grounding and Bonding Requirements for Telecommunications.
        5. EIA TSB 67 – Transmission Performance Specification for Field Testing of Unshielded Twisted-Pair Cabling Systems.
        6. RS232C – Interface between Data Terminal Equipment and Data Communications Equipment Employing Serial Binary Data Interchange.
        7. RS485 – Electrical Characteristics of Generators and Receivers for use in Balanced Digital Multi-Point Systems.
        8. European Union:
          1. Restriction of the Use of Certain Hazardous Substances in Electrical and Electronic Equipment (RoHS).
        9. Federal Communications Commission (FCC):
          1. FCC Part 15 – Radio Frequency Device.
          2. FCC Part 68 – Connection of Terminal Equipment to the Telephone Network.
        10. Government Accountability Office (GAO):
          1. GAO-03-8-02 – Security Responsibilities for Federally Owned and Leased Facilities
        11. Institute of Electrical and Electronics Engineers (IEEE):
          1. IEEE 802.3 – Ethernet Standards
        12. International Organization for Standards/International Electrotechnical Commission (ISO/IEC):
          1. ISO/IEC 7810 – Identification cards — Physical characteristics.
          2. ISO/IEC 11801:2010 (Ed. 2.2) – Information technology – Generic cabling for customer premises.
          3. ISO/IEC 14443 – Identification cards – Contactless integrated circuit cards – Proximity cards
          4. ISO/IEC 15693-1:2000 – Identification cards – Contactless integrated circuit(s) cards – Vicinity cards.
        13. National Fire Protection Association (NFPA):
          1. NFPA 70-11 – National Electrical Code
        14. National Institute of Standards and Technology (NIST):
          1. FIPS PUB 140-2 – Security requirements for cryptographic modules protecting sensitive information.
          2. FIPS 197 – Advanced Encryption Standard (AES).
          3. FIPS-201-1 – Personal Identity Verification (PIV) of Federal Employees and Contractors.
  3. 1.03.      SUBMITTALS
    1. Refer to 28 10 00 PHYSICAL ACCESS CONTROL SYSTEM, Part 1.
    2. Provide certificates of compliance with Article 1.05, Quality Assurance.
  4. ​​​​​​1.04.      MAINTENANCE MATERIAL SUBMITTALS
    1. Spare Parts
      1. Submit to Owner’s Representative a complete list of the manufacturer's recommended spare parts and components required to satisfactorily maintain and service the systems, as well as unit pricing for those parts and components.
    2. Extra Stock Materials
      1. ​​​​​​​Furnish extra materials described below as [Part of the Base Bid][Bid Alternate] before installation begins, that match products installed and that are packaged with protective covering for storage and identified with labels describing contents.  Provide not less than one of each item listed below.  Deliver extra materials to Owner marked on the outside of each original manufacturer’s packaging with “SPARE EQUIPMENT FOR PHYSICAL ACCCESS CONTROL SYSTEM”.
        1. Fuses:  One for every 10; each type and rating.
        2. Card Readers: One spare for each type installed.
        3. Cameras:  One spare for each type installed.
        4. Lenses: One spare for each focal length installed.
  5. 1.05.      QUALITY ASSURANCE
    1. ​​​​​​​Furnish and install the PACS as specified. Provide certification as required.
    2. ​​​​​​​Install and test the PACS to ensure all components are fully compatible as a system and can be integrated with all associated security subsystems and HSMS, whether the security system is stand-alone or a part of a complete Information Technology (IT) computer network.
    3. ​​​​​​​Qualifications
      1. ​​​​​​​Manufacturers
        1. ​​​​​​​The manufacturer shall regularly and presently produce, as one of the manufacturer's principal products, the equipment and material specified for this project, and shall have manufactured the item for at least three years.
      2. ​​​​​​​Product
        1. ​​​​​​​Manufacturer's product shall have been in satisfactory operation, on three installations of similar size and type as this project, for approximately three years.
      3. ​​​​​​​Contractors/Installers
        1. ​​​​​​​The Contractor or security sub-contractor shall:
          1. ​​​​​​​Be licensed to perform security installations in the state the work is to be performed.
          2. ​​​​​​​Have a minimum of five years’ experience installing and servicing systems of similar scope and complexity.
          3. ​​​​​​​Provide four current references from clients with systems of similar scope and complexity which became operational within the past three years. 
            1. ​​​​​​​At least three of the references shall utilize the same system components, and in a similar configuration, as the proposed system. 
            2. ​​​​​​​The references must include a current point of contact, company or agency name, address, telephone number, complete system description, date of completion, and approximate cost of the project. 
            3. ​​​​​​​The Owner reserves the option to visit the reference sites, with the site owner’s permission and representative, to verify the quality of installation and the references’ level of satisfaction with the system. 
        2. ​​​​​​​Utilize factory-trained technicians to install, program, and service PACS equipment and services. 
          1. Utilize factory-trained technicians to install, terminate and service controller/field panels and reader modules. 
          2. Provide copies of system manufacturer certification for all technicians. 
          3. Require technicians to have a minimum of five (5) continuous years of technical experience in electronic security systems. 
        3. ​​​​​​​Provide a local service facility. 
          1. Located within 60 miles of the project site. 
          2. Ensure service facility stocks a spare parts inventory sufficient to support the service requirements of this contract. 
          3. Ensure service facility is equipped with diagnostic equipment to perform diagnostic procedures for the installed equipment. 
          4. Owner’s Representative reserves the option of surveying the company’s facility to verify the service inventory and presence of a local service organization.
        4. ​​​​​​​Provide evidence that the installer is an authorized dealer in good standing for the manufacturer of the HSMS described in Section 28 10 00, and that installer’s personnel meet the manufacturer’s technical certification requirements.
      4. ​​​​​​​Service Qualifications
        [SPECIFIER NOTE: In the following paragraph use 4 hours for metropolitan areas and 8 hours for rural areas.]
        1. ​​​​​​​There shall be a permanent service organization maintained or trained by the manufacturer which will render satisfactory service to this installation within [four] [OR] [eight] hours of receipt of notification that service is needed. Submit name and address of service organizations.
    4. ​​​​​​​Certifications
      1. ​​​​​​​FIPS 201 Compliance Certificates
        [SPECIFIER NOTE: Delete and add components to the list as required by the project. Check http://www.fips201.com/ website for list of the approved products.]
        1. ​​​​​​​Provide Certificates for all software components and device types utilizing credential verification. Provide certificates for:
          1. Card Readers.
          2. Facial Image Capturing Camera.
          3. Certificate Validator.
          4. <list devices and software>
  6. 1.06.      DELIVERY, STORAGE, AND HANDLING
    1. Deliver materials in manufacturer’s labeled packages.  Store and handle in accordance with manufacturer’s requirements.
    2. ​​​​​​​Storage And Handling Requirements
      1. All equipment shall be stored in an environment compliant with the equipment manufacturers’ recommendations.
  7. 1.07.   SITE CONDITIONS
    1. ​​​​​​​Ambient Conditions
      [SPECIFIER NOTE: Identify site specific ambient conditions under which work must be performed such as bad lighting, obstacles, or extreme cold/heat that installers or equipment may have to deal with. Delete if not needed.]
    2. ​​​​​​​Existing Conditions
      [SPECIFIER NOTE: Identify site specific existing conditions. Such as the condition of existing work subject to rework or modification.]
  8. 1.08.   WARRANTY
    1. ​​​​​​​Manufacturer Warranty
      1. ​​​​​​​Provide manufacturer one-year warranty that the software and hardware product(s) are free from defect in materials and/or workmanship as of the date of installation.
      2. ​​​​​​​Provide manufacturer periodic updates to software and hardware during the warranty period.
      3. ​​​​​​​Provide manufacturer limited "no questions asked" replacement warranty against hardware product defects in material and workmanship, as follows:
        1. One Year – Integrated credential readers.
        2. One Year – Photo imageable cards.
        3. Lifetime – Clam shell card; key ring tag; mullion, Euro, and wall switch readers.
    2. ​​​​​​​Special Warranty
      1. ​​​​​​​Refer to 28 10 00 PHYSICAL ACCESS CONTROL SYSTEM, Part 1.

PART 2 PRODUCTS

  1. 2.01.     OWNER-FURNISHED PRODUCTS
    [SPECIFIER NOTE: Use the next section to describe owner-furnished products to enable the Contractor to install them correctly, or to ensure compatibility or proper system operation.]
    1. New Products
      1. <list new products furnished by owner>.
    2. Existing Products
      1. <list existing products/systems furnished by owner>.

[SPECIFIER NOTE: The following articles describe equipment and services that may be used in a PACS project.  Add, modify or delete as required.]

  1. 2.02.      INTEGRATED CREDENTIAL READERS
    1. Manufacturers
      1. BluBØX, Inc., 9 Bartlett Street, Suite 334, Andover, MA 0181. Phone: (844) 425-8209, www.BluBØX.com
      2. Substitution Limitations: No Substitutions.
      3. Product Options:
        1. Person Reader.
        2. Person Reader with anti-glare screen.
        3. Person Reader with restricted view screen.
    2. Description
      1. Integrated credential readers authenticate a person using one or more recognition methods including biometric, keypad PIN, Bluetooth, and NFC.
      2. Authentication
        1. Integrated credential readers shall support:
          1. User authentication via Bluetooth 4.0, NFC, RFID, Facial Recognition, and keypad PIN methods.
          2. Single authentication method or a combination of multiple methods.
          3. Authentication at a distance using Bluetooth.
          4. Facial recognition requirements:
            1. Facial recognition shall be based on LFAR Facial Recognition Technology. READERS USING EIGENFACES-BASED FACIAL RECOGNITION WILL NOT BE ACCEPTED.
            2. Utilize Adaptive Learning System and a combination of 2D and 3D technology to maximize recognition capabilities and minimize dependence on pose in varying lighting conditions.
            3. Provide facial recognition time of less than 1 second.
        2. Integrated credential readers shall include a built-in megapixel surveillance camera to document access attempts and incidents of tampering.
        3. Visitor Management with Video Intercom
          1. Integrated credential readers shall:
            1. Provide visitor management features such as video intercom, remote door release, and visitor check-in / enrollment / logging.
            2. Recognize and provide notice when unauthorized or blacklisted individuals attempt access.
            3. Prompt visitors to use the touchscreen video intercom. [under what conditions?]
            4. Send email and text notification of guest arrivals to a predetermined distribution list.
            5. Provide user response via mobile device or computer to video intercom callers.
            6. Provide authorized users with remote door release capability.
            7. Log remote door release events.
            8. Provide audio only or audio plus video modes for intercom dialog.
            9. Log all guest access activity.
            10. Function in an offline mode, and transmit access event data to the access control system upon resumption of online mode.
            11. Enable authorized users to preauthorize visitors for entry using:
              1. Pre-enrolled visitor face.
              2. Temporary visitor PIN code.
            12. Notify the associated user of pre-authorized visitor access via email or SMS text message.
            13. Automatically connect non-recognized visitors to a pre-designated recipient by video intercom, or prompt non-recognized visitors to select a recipient from a directory listing.
            14. Provide enrollment of visitors and assignment of user rights directly at the reader.
            15. Transmit reader-enrolled visitor information to other integrated credential readers and/or the access control system.
        4. Multi-Purpose Touch Screen
          1. Integrated credential readers with multi-touch capacitive screen shall provide the following additional reader functionality:
            1. Touchscreen PIN Scramble Keypad
              1. Keypad PIN may be used for authentication or as one factor of a multifactor authentication.
              2. Keypad may arm and disarm alarm system.
            2. Message Board Display
              1. Screen shall support programmable text message and graphics including:  
                1. Graphics, company name, suite number, room number, room name, portal name.
                2. Owner defined information / graphics / images.
        5. Black List Recognition and Unauthorized Access Attempts
          1. Integrated credential readers shall:
            1. Recognize blacklisted visitors, vendors and employees, and deny them entry.
            2. Monitor repeated attempts by unauthorized people to gain entry.
            3. Automatically add repeat unauthorized people to the blacklist.
            4. Notify an administrator by email or SMS text when a blacklisted person attempts access.
        6. Analysis and Reporting Functions
          1. Integrated credential readers shall collect information regarding access attempts, analyze collected information, and report exceptions including:
            1. Attempts to defeat the system.
            2. Attempts by blacklisted persons to gain access.
            3. Repeated attempts by unauthorized visitors to gain access.
        7. Resident Data Protection
          1. Integrated credential readers shall:
            1. Encrypt locally stored user and system data using AES 256-bit encryption.
            2. Provide remote erase functionality controllable from HSMS.
        8. Health and Status Monitoring Functions
          1. Integrated Credential Readers shall:
            1. Monitor hardware and software health.
            2. Monitor biometric health and performance.
            3. Notify administrator and access control system when tampering is detected.
              1. Notification shall include captured pictures, video, and GPS location.
        9. Performance / Design Criteria
        10. Technical Details
          1. Communications:
            1. Wired
              1. Ethernet TCP/IP.
              2. Wiegand – In, to support additional card reader technologies.
              3. Wiegand – Out, to interface with access control systems and communicate authentication events.
            2. Wireless
              1. WI-FI 802.11 a/b/g/n/ac, dual-band.
              2. Bluetooth 4.0.
            3. Protocols
              1. OPC.
              2. SIP.
            4. Security: The integrated credential readers shall allow only outbound communication initiation only.
          2. Power
            1. 5–16 VDC, DC Current 30 mA average, 75 mA peak.
            2. PoE.
            3. Battery: 12 Hour.
          3. Screen: 8.4 inch OLED, FHD (2560x1600) resolution 10 point multi-touch capacitive
            1. Optional anti-glare screen.
            2. Optional restricted view screen.
          4. Operating System: Windows 8.1 O/S.
          5. Audio:
            1. Microphone with active Background Noise Cancellation.
            2. Stereo Speakers.
          6. Imaging: 2 Megapixel Camera.
          7. Sensors:
            1. GPS.
            2. Gyroscope.
            3. Accelerometer.
            4. Proximity Sensor.
            5. Compass.
            6. Enclosure Tamper.
          8. Mechanical
            1. Dimensions: 9 x 5 x 0.5 inch.
            2. Mounting: single gang junction box.
            3. Weight: 12 ounces.
          9. Environmental
          10. 32–120 F (0 – 55 C)
          11. 0 – 95 percent Relative Humidity
        11. Capacities
          1. Memory:
            1. 2 GB DDR3 SDRAM @ 1MHz.
            2. 16 GB Solid State Storage.
            3. 32/64/128/256/512 GB Micro SD card.
  2. 2.03     MULTI-TECHNOLOGY CONTACTLESS SMART CARD READER – READ ONLY
    1. Manufacturers
      1. HID Global; 15370 Barranca Pkwy, Irvine, CA 92618, USA; telephone: 949-732-2000, fax: 949-732-2360; Web site: www.hidglobal.com.
      2. Substitution Limitations: No Substitutions.
      3. Product Options: Multi-technology contactless smart card reader shall be HID Global multiclass SE Transit Card Reader Model:
        1. Without Keypad, RP40-T.
        2. With Keypad, RPK40-T.
    2. Description
      1. The multi-technology contactless smart card reader(s) shall be designed to securely read, interpret, and authenticate access control data from 13.56 MHz contactless smart card credentials and 125 kHz proximity cards. 
      2. The multi-technology contactless smart card reader shall be optimally designed for use in access control applications.
      3. Multi-technology contactless smart card readers shall provide the following enhanced performance features:
        1. The multi-technology contactless smart card reader shall provide simultaneous support for 125 kHz proximity FSK (HID Proximity, AWID). PSK (Indala), and ASK (EM4102) 125 kHz technology to increase credential technology migration options.
        2. The multi-technology contactless smart card reader shall enable user prioritization of High-frequency/High-frequency and High-frequency/Low-frequency credential reads.  Technology prioritization shall synchronize a site’s credential technology read priority to the access panel configuration while reducing unintended credential reads.
        3. The multi-technology contactless smart card reader shall have the ability to provide consistent optimal read range by implementing an auto-tune function that adjusts for manufacturing tolerances to enhance consistency of performance from reader to reader. 
        4. The multi-technology contactless smart card reader shall be field programmable to provide secure upgrades for migration and extended lifecycle.
        5. The multi-technology contactless smart card reader shall be designed as a system to provide optimal read range and read speed for increased access control throughput.
      4. Multi-technology contactless smart card reader shall provide enhanced environmental and sustainability features.
        1. The multi-technology contactless smart card reader shall reduce power consumption by as much as 75 percent through the use of Intelligent Power Management (IPM) technology.
        2. The multi-technology contactless smart card reader shall be manufactured with 10 percent recycled material to provide the potential of LEEDS building credits in new construction projects.
        3. Multi-technology contactless smart card reader shall be fully compliant with Restriction of Hazardous Substances directive (RoHS) restricting the use of specific hazardous materials found in electrical and electronic products.  The substances banned under RoHS are lead (Pb), mercury (Hg), cadmium (Cd), hexavalent chromium (CrVI), polybrominated biphenyls (PBB) and polybrominated diphenyl ethers (PBDE).
        4. Multi-technology contactless smart card reader shall be manufactured with 11 percent (Pigtail) and 10 percent (Terminal Strip).
      5. Multi-technology contactless smart card reader shall comply with the following 13.56MHz-related standards to ensure product compatibility and predictability of performance:
        1. ISO/IEC 15693.
        2. ISO/IEC 14443 – Type A.
        3. ISO/IEC 14443 – Type B.
      6. Multi-technology contactless smart card reader shall implement the following high security 13.56 MHz applications out-of-box.
        1. Secure Identity Object on iCLASS SE.
        2. Secure Identity Object on MIFARE Classic SE.
        3. Secure Identity Object on MIFARE DESFire EV1 SE.
      7. Multi-technology contactless smart card reader shall be suitable for global deployment by meeting worldwide radio and safety regulatory compliance including:
        1. UL294 (US).
        2. cUL (Canada).
        3. FCC Certification (US).
        4. IC (Canada).
        5. CE (EU).
        6. C-tick (Australia, New Zealand).
        7. SRRC (China).
        8. MIC (Korea).
        9. NCC (Taiwan).
        10. iDA (Singapore).
      8. Multi-technology contactless smart card reader shall be provided with a full potted assembly.
      9. Multi-technology contactless smart card reader shall provide the following typical contactless read ranges: 
        1. 3.0 inches (7.6 cm) reading SIO on iCLASS SE Card.
        2. 1.5 inches (3.8 cm) reading SIO on MIFARE DESFire EV1 SE Card.
        3. 2.3 inches (5.9 cm) reading SIO on MIFARE Classic SE Card.
        4. 1.4 inches (3.6 cm) reading SIO on iCLASS SE Tag or Fob.
        5. 0.9 inches (2.3 cm) reading SIO on MIFARE Classic SE Tag or Fob.
        6. 2.7 inches (6.9 cm) reading 125 kHz HID Prox or AWID Card.
        7. 1.0 inches (2.5 cm) reading 125 kHz Indala Card.
        8. 2.0 inches (5.1 cm) reading 125 kHz EM4102 Card.
        9. 0.8 inches (2.0 cm) reading 125 kHz HID Prox or AWID Tag or Fob.
        10. 0.8 inches (2.0 cm) reading 125 kHz Indala Tag or Fob.
        11. 0.8 inches (2.0 cm) reading 125 kHz EM4102 Tag or Fob.
      10. Multi-technology contactless smart card reader shall be designed for low current operation to enable contactless smart card migration from most legacy proximity applications without the need to replace existing access control panels and/or power supplies.  Contactless smart card power requirements shall be:
        1. Operating voltage: 5 – 16 VDC, reverse voltage protected.  Linear power supply recommended.
        2. Current requirements and power consumption:
          1. 75 mA (Standard Power Mode).
          2. 35 mA (Intelligent Power Management Mode).
          3. 110 mA (Peak Current Draw).
          4. 1.2 W (Standard Power Mode @ 16VDC).
          5. 0.6 W (Intelligent Power Management Mode @ 16VDC).
      11. Multi-technology contactless smart card reader shall meet the following physical specifications:
        1. Dimensions: 3.3 inches x 3.3 inches x 0.9 inches (8.4cm x 8.4cm x 2.3cm).
        2. Weight:  7.8 (222g) Pigtail and 7.6oz (216g) Terminal Strip.
        3. Material:  UL94 Polycarbonate.
        4. Plastics: Consist of two-piece design with mounting plate and either separate front bezel and reader body (totaling three-pieces) or combined front bezel/reader body (totaling two-pieces).
        5. Color: Black or Charcoal Gray as approved by the project architect.
      12. Multi-technology contactless smart card reader shall meet the following environmental specifications:
        1. Operating temperature: -31 to 150 degrees F (-35 to 65 degrees C).
        2. Operating humidity: 5 percent to 95 percent relative humidity non-condensing.
        3. Weatherized design suitable to withstand harsh environments with a certified rating of IP55.
      13. Multi-technology contactless smart card reader cabling requirements shall be:
        1. Cable distance: (Wiegand or Clock & Data): 500 feet (150m).
        2. Cable type:  5-conductor #22 AWG (Shielded cable not required).
        3. Standard reader termination:  18 inches (0.5m) cable pigtail.
        4. Optional reader termination: terminal strip.
      14. The multi-technology smart card reader shall be provisioned through secure connections utilizing Trusted Identity Platform’s™ Secure Delivery Infrastructure (SDI) where all cryptographic keys governing system security are delivered with end-to-end privacy and integrity.
  3. 2.04.    DIRECT-TO-CLOUD™ INTEGRATED LOCK READER SUPPORT
    1. Manufacturers
      1. BluBØX, Inc., 9 Bartlett Street, Suite 334, Andover, MA 0181. Phone: (844) 425-8209, www.BluBØX.com
      2. Substitution Limitations: No Substitutions.
    2. Description
      1. Integration capability of web-based cloud-hosted security management system application to manage physical access requests from networked integrated lock reader systems without site-installed access controllers.
    3. Architecture
      1. The architecture of the integrated lock reader support shall consist of:
        1. Cloud-hosted security management system integration to integrated lock reader systems.
        2. Site-based Internet-connected wireless integrated lock reader system.
        3. Encrypted communications between the cloud-hosted security management system and the integrated lock reader system Router.
        4. Real-time management of access decisions performed by the cloud-hosted security management system.
        5. Offline mode of integrated lock reader operations with one or more methods for reader-based access decisions.
  4. 2.05.    INTEGRATED LOCK READER SYSTEMS
    1. ​​​​​​​Manufacturers
      1. Allegion Plc. Block D, Iveagh Court, Harcourt Road, Dublin 2, Co. Dublin, Ireland
      2. ASSA ABLOY, Inc., 110 Sargent Drive, New Haven, CT 06511 , Phone: (800) 377-3948. Web: www.intelligentopenings.com.
      3. Kaba Access Control, 2941 Indiana Avenue, Winston Salem 27105. Web: www.kaba.com
      4. Salto Systems, Inc., 1780 Corporate Drive, Suite 400, Norcross GA 30093. Phone: 770-452-6091, Web: www.salto.us.  
    2. Description
      1. Integrated lock reader system with wireless door locks, wireless hubs, and router for secure Internet connection to cloud-hosted security management system.
      2. Architecture
        1. The architecture of the integrated lock reader support shall consist of:
          1. Site-based Internet-connected wireless integrated lock reader system. 
            1. Router for secure Internet connection.
            2. Wireless hubs/access points to connect wireless integrated lock readers to Router via WiFi 802.11 or 802.15.4.
            3. Bluetooth Low Energy wireless gateways  to connect to wireless integrated lock readers via BLE (Allegion only).
            4. Wireless integrated door lock readers.
          2. End-to-end minimum 128-bit AES encrypted communications
        2. System Functionality
          1. Real-time access control integration with cloud-hosted security management system.
          2. Offline access decision by integrated lock reader (Salto Systems only)
        3. Supported Wireless Integrated Lock Readers
          1. Assa-Abloy 485/POE/Wireless Integrated Lock Readers 
          2. Allegion 485/POE/Wireless Integrated Lock Readers 
          3. Kaba 485/POE/Wireless Integrated Lock Readers
          4. Salto 485/POE/Wireless Integrated Lock Readers 
          5. Simmons Voss 485/POE/Wireless Integrated Lock Readers 
          6. Salto XS4 Series locks (Salto)
          7. Schlage® AD-Series (Allegion)
          8. Schlage NDE Series wireless locks (Allegion)
          9. Aperio-enabled wireless locks: (ASSA ABLOY)
            1. Adams Rite A100 Keyless Entry Control
            2. Corbin Russwin IN100 Lock
            3. HES K100 Cabinet Lock
            4. HES KS100 Server Cabinet Lock
            5. Medeco M100 eCylinder
            6. SARGENT IN100 Lock
            7. SARGENT PR100 Lock
            8. Securitron AS100 Sensor
            9. Securitron R100 Reader
  5. 2.05.    ACCESS CARD
    1. Manufacturers
      1. HID Global; 15370 Barranca Pkwy, Irvine, CA 92618, USA; telephone: 949-732-2000, fax: 949-732-2360; Web site: www.hidglobal.com.
      2. Substitution Limitations: No Substitutions.
      3. Product Options:
        1. Multi-technology contactless smart cards shall be HID Global iClass Prox cards.
        2. Contractor shall provide [insert quantity] access cards.
    2. Description
      1. Shall provide a graphics quality surface that supports directtocard printing. 
      2. Shall be capable of being produced with holograms, ultraviolet fluorescent inks, or other anticounterfeiting features. 

PART 3 EXECUTION

  1. 3.01.      EXAMINATION
    1. ​​​​​​​Verification Of Conditions
      1. ​​​​​​​The Contractor shall visit the site and verify that site conditions are in agreement with the design package.  The Contractor shall report all changes to the site or conditions which will affect performance of the system to the Owner.  The Contractor shall not take any corrective action without written permission from the Owner.
      2. ​​​​​​​General
        1. Verify that substrate conditions, which have either been previously installed under other sections, or that existing site conditions, are acceptable for product installation in accordance with manufacturer’s instructions.
        2. Verify that building doors, frames, walls, wire runs, related items, and conditions are ready to receive work of this Section.
      3. ​​​​​​​Cable & Wiring
        1. ​​​​​​​Examine pathway elements intended for cables.  Check raceways, cable trays, and other elements for compliance with space allocations, installation tolerances, hazards to cable installation, and other conditions affecting installation.
        2. ​​​​​​​Examine roughing-in for LAN and control cable conduit systems to PCs, Controllers, card readers, and other cable-connected devices to verify actual locations of conduit and back boxes before device installation.
      4. ​​​​​​​LAN/WAN
        1. ​​​​​​​Verify LAN connections for Ethernet capable PACS controllers and devices provide access to the internet and the HSMS host.
      5. Power Connections
        1. ​​​​​​​Verify power circuits which are existing or have been previously installed under other sections are acceptable for product installation in accordance with manufacturer’s instructions.
    2. ​​​​​​​Preinstalling Testing
      1. Perform the following field tests and inspections and prepare test reports:
        1. LAN Cable Procedures:  Inspect for physical damage and test each conductor signal path for continuity and shorts.  Use Class 2, bidirectional, Category 5 tester.  Test for faulty connectors, splices, and terminations.  Test according to TIA/EIA-568-1, "Commercial Building Telecommunications Cabling Standards – Part 1 General Requirements."  Link performance for UTP cables must comply with minimum criteria in TIA/EIA-568-B.
        2. ​​​​​​​Test each circuit and component of each system.  Tests shall include, but are not limited to, measurements of power supply output under maximum load, signal loop resistance, and leakage to ground where applicable.  System components with battery backup shall be operated on battery power for a period of not less than 10 percent of the calculated battery operating time.  Provide special equipment and software if testing requires special or dedicated equipment.
        3. ​​​​​​​Operational Test:  After installation of cables and connectors, demonstrate product capability and compliance with requirements.  Test each signal path for end-to-end performance from each end of all pairs installed.  Remove temporary connections when tests have been satisfactorily completed.
  2. 3.02.      PREPARATION
    1. ​​​​​​​Refer to 28 10 00 PHYSICAL ACCESS CONTROL SYSTEM, Part 3, PREPARATION.
    2. ​​​​​​​Determine Owner’s priority of importance to alternate high priority devices and normal priority devices on different multi-tap power supplies or PoE switches to reduce failure points where a large number of devices are unavailable to a critical area.
    3. ​​​​​​​Coordinate arrangement, mounting, and support of electronic safety and security equipment:
      1. ​​​​​​​To allow maximum possible headroom unless specific mounting heights that reduce headroom are indicated.
      2. ​​​​​​​To provide for ease of disconnecting the equipment with minimum interference to other installations.

        To allow right of way for piping and conduit installed at required slope, so connecting raceways, cables, wireways, cable trays, and busways will be clear of obstructions and of the working and access space of other equipment.
    4. ​​​​​​​Coordinate installation of required supporting devices and set sleeves in cast-in-place concrete, masonry walls, and other structural components as they are constructed.
    5. ​​​​​​​Coordinate location of access panels and doors for electronic safety and security items that are behind finished surfaces or otherwise concealed.
    6. ​​​​​​​Prior to Installation
      1. ​​​​​​​All equipment shall be tested and configured in accordance with instructions provided by the manufacturer.
  3. 3.03.      INSTALLATION
    1. ​​​​​​​General
      1. ​​​​​​​Install all system components and appurtenances in accordance with the manufacturer’s specifications, referenced practices, guidelines and applicable codes.
      2. ​​​​​​​Comply with manufacturer’s written data, including product technical bulletins, product catalog installation instructions and product carton installation instructions.
      3. ​​​​​​​Furnish all necessary interconnections, services, and adjustments required for a complete and operable system as specified.
      4. ​​​​​​​Control signal, communications, and data transmission line grounding shall be installed as necessary to preclude ground loops, noise and surges from adversely affecting system operation.
      5. ​​​​​​​All equipment shall be attached to walls and ceiling/floor assemblies and shall be held firmly in place (e.g., sensors shall not be supported solely by suspended ceilings).  Fasteners and supports shall be adequate to support the required load.
      6. ​​​​​​​Use weatherproof equipment or covers where installed in areas exposed to weather.
    2. ​​​​​​​Wiring
      [SPECIFIER NOTE: Modify or delete the following subparagraphs to fit the Project.]
      1. ​​​​​​​General
        1. ​​​​​​​All wiring is to be installed in dedicated conduit throughout. Cable shall not be pulled into conduits or placed in raceways, compartments, outlet boxes, junction boxes or similar fittings with other building wiring.
        2. ​​​​​​​All low voltage wiring outside the control console, cabinets, boxes and similar enclosures, shall be plenum rated where required by code.
        3. ​​​​​​​All wiring conductors connected to terminal strips shall be individually numbered and each cable or wiring group being extended from a panel or cabinet to a building mounted device shall be identified with the name and number of the particular device as identified and shown on building drawings.
        4. ​​​​​​​All exposed wiring inside and outside the control console, cabinets, boxes and similar enclosures, shall be dressed down neatly and secured with wiring cleats or wire ties.
        5. ​​​​​​​All exposed metallic flexible conduit and armored cable shall be dressed down neatly and secured with low profile, metal fasteners.
      2. ​​​​​​​Fire Wall Penetrations
        1. ​​​​​​​The Contractor shall avoid penetration of fire rated walls and floors wherever possible. Contractor shall also seal all floor, ceiling and wall penetrations in fire or smoke barriers and in the wiring closet.
      3. ​​​​​​​Wall Penetrations
        1. ​​​​​​​Where penetrations are necessary, they shall be sleeved with metallic conduit and resealed with an Underwriter Laboratories (UL) approved sealant.
        2. ​​​​​​​Provide three sided pre-finished metal hood and seal to wall where conduit penetrates exterior wall.
        3. ​​​​​​​Install new conduit on portable pipe supports – (low profile type), as manufactured by Portable Pipe Hangers or Advanced Support Products.  Provide roof protection pads under each support.  Coordinate location and routing with design engineer prior to rough-in or installation of system.
    3. ​​​​​​​Containers
      [SPECIFIER NOTE: Modify or delete the following subparagraphs to fit the Project.]
      1. ​​​​​​​All cabinets, boxes, and similar enclosures containing security system components and/or cabling, which may easily be accessible to employees or to the public, shall be provided with a lock. Boxes above ceiling level in occupied areas of the building shall not be considered to be accessible.
      2. ​​​​​​​All junction boxes and small device enclosures below ceiling level, and easily accessible to employees or the public, shall be covered with a suitable cover plate and secured with tamper proof screws.
    4. ​​​​​​​Card Readers 
      1. ​​​​​​​Wire the card reader’s multi‐color LED to indicate the following status of the door.
        1. Red status indicates the door is secure (locked).
        2. Green status indicates the door is unsecured (unlocked).
        3. Yellow status indicates the card reader is not functioning (off‐line/trouble), is processing a read request, or has denied access.
      2. ​​​​​​​Wire the card reader’s tamper to spare input on the Controller and jumper ground wire from door contact to provide normally closed circuit.
      3. ​​​​​​​The card reader to produce an audible beep tone to indicate to the user:
        1. The card was read and/or access was denied.
        2. Door is being held open and needs to be closed.
    5. ​​​​​​​Door Hardware
      1. Setup and conduct a door hardware coordination meeting.
      2. Coordinate the installation and termination of the security cable with the installation of the electric door hardware.
      3. Terminate wires to delayed egress devices for monitoring activation of delayed egress by the HSMS.
      4. ​​​​​​​Configure electrically controlled locks and strikes to automatically unlock the door upon activation of Fire/Life‐Safety system. 
        1. Connect Lock Power Supply fire alarm output relay to Access Control Alarm Input. 
        2. Program HSMS to generate alarm when the FACP has triggered causing the doors to become unlocked.
      5. Connect Lock Power Supply AC and Battery supervisory outputs to PACS Alarm Inputs. 
        1. Program HSMS to generate separate alerts conditions for:
          1. AC Power to Lock Power Supply has failed.
          2. Battery backup indicates a fault.
      6. ​​​​​​​Provide and install a tamper switch on door hardware power supply enclosure and connect to PACS Alarm Input. 
        1. ​​​​​​​Program HSMS to report a trouble condition when the enclosure door is open.
      7. ​​​​​​​Door Contacts
        1. ​​​​​​​Wire door contacts to PACS Alarm Input.
          1. ​​​​​​​Program HSMS to monitor door input.
  4. 3.04.      REPAIR/RESTORATION
    1. [Describe how existing work is to be repaired, restored and cleaned.]
  5. 3.05.      RE-INSTALLATION
    1. ​​​​​​​[Describe the building-in, installation or re-installation of existing elements.]
  6. 3.06.      SITE QUALITY CONTROL
    1. ​​​​​​​Site Tests and Inspections
      1. ​​​​​​​Coordinate with Site Tests and Inspections defined in 28 10 00 PHYSICAL ACCESS CONTROL SYSTEM, Part 3, SITE QUALITY CONTROL.
    2. ​​​​​​​Non-Conforming Work
      1. Contractor must note any variants at the site and notify owner’s representative within three business days of anything that might affect the delivery date of the system or any trades associated with the functioning of the system.
        [SPECIFIER NOTE: Retain paragraphs below to require a factory-authorized service representative to perform, or assist Contractor. Delete in its entirety to require only an inspection before field testing.]
    3. ​​​​​​​Manufacturer Services
      1. ​​​​​​​Engage a member of the manufacturer’s engineering support team to inspect[, test, and adjust] field-assembled components and equipment installation, including connections[, and to assist in field testing, final testing].  Report results in writing.
      2. ​​​​​​​Engage a member of the manufacturer’s engineering support team for training.
  7. 3.7.      ADJUSTING
    1. Perform field software changes after the initial programming session to “fine tune inches operating parameters and sequence of operations based on any revisions to the Owner’s operating requirements.
    2. Security Hardening Procedures
      1. ​​​​​​​Installer/Factory User Accounts
        1. ​​​​​​​Remove all (default, installer, or temporary) user accounts and passwords used during installation that are not part of the End-user’s final operational requirements.
      2. User accounts that match factory defaults user accounts shall have new passwords assigned that are substantially different from factory default passwords.
  8. 3.08.      CLEANING
    1. ​​​​​​​Upon completion and verification of performance of installation, remove surplus materials, excess materials, rubbish, tools and equipment.
  9. 3.09.      CLOSEOUT ACTIVITIES
    1. ​​​​​​​Demonstration
      1. ​​​​​​​Refer to 28 10 00 PHYSICAL ACCESS CONTROL SYSTEM, Part 3, CLOSEOUT ACTIVITIES.
      2. ​​​​​​​Demonstrate operation of PACS secured doors.
      3. ​​​​​​​Demonstrate operation of PACS secured / controlled elevators.
    2. ​​​​​​​Training
      1. ​​​​​​​Refer to 28 10 00 PHYSICAL ACCESS CONTROL SYSTEM, Part 3, CLOSEOUT ACTIVITIES.
      2. ​​​​​​​License Assignment
        1. ​​​​​​​Software, hardware, firmware, operational or administrative licenses necessary for to operate or administer the devices shall be registered to the Owner.
        2. ​​​​​​​Deliver to the Owner’s Representative proof of license registration from the product manufacturer.
  10. 3.10.   PROTECTION
    1. ​​​​​​​Maintain strict security during the installation of equipment and software.  Rooms housing accessible equipment and workstations that have been powered up shall be locked and secured during periods when a qualified operator in the employ of Contractor is not present.
    2. ​​​​​​​Protect installed work of other trades when working in the same location.
    3. ​​​​​​​Contractor is responsible for protecting all completed work prior to acceptance by owner.
      [SPECIFIER NOTE: Owner may, at Owner's discretion, relieve the contractor from this burden. For example, if the site already has on-site officer guarding service.]
  11. 3.11.   MAINTENANCE
    1. ​​​​​​​Software and Firmware updates shall be delivered as part of the Warranty and Service Agreements.

 

  1.  

 

​​​​​​​​​​​​​​​​​​​​​END OF SECTION

Specifier Notes

#

 

 

 

  • Was this article helpful?