Operational reliability
Means shall be provided to ensure that operator errors which might adversely influence the normal operation of an l&HAS are either prevented or indicated.
l&HAS components
Components of an l&HAS used during the operation of an l&HAS shall be clearly and unambiguously marked and logically arranged in such a manner as to minimise the possibility of incorrect operation. Only those functions accessible at the users access level shall be made available to the user.
Functional reliability
l&HAS components shall comply with relevant standards. The design and the configuration of an l&HAS shall ensure the operation of the l&HAS according to the requirements of this standard. This shall be achieved by
clear rules for design and installation,
clear rules for adjustment and maintenance,
correct manufacture,
regular maintenance,
designed to provide a high signal-to-noise ratio,
well designed software,
elements operating within design limits (voltage, temperature),
testability of functions (by user, installer),
function monitoring, e g. a watchdog circuit.
Environmental requirements
The environmental stability of l&HAS shall be of the same level in all grades. The operation of an l&HAS shall not be influenced when the l&HAS is subject to the environmental conditions specified in Clause 7 and when exposed to EMC conditions specified in 12.1. An l&HAS shall neither change state, suffer damage to components or substantially change in performance. EN 50130-5 describes environmental test methods which shall be applied to l&HAS components.
Electromagnetic compatibility
The electromagnetic compatibility performance requirements for l&HAS components are described in EN 61000-6-3 and EN 50130-4.
Electrical safety
An l&HAS component shall provide protection against electrical shock and consequential hazards by achieving compliance with the requirements of EN 60950-1 or EN 60065.
Documentation
Intruder and hold-up alarm system documentation
Documentation relating to an l&HAS shall be concise, complete and unambiguous. Information shall be provided sufficient to install, put into operation, operate and maintain an l&HAS.
Instructions relating to the operation of an l&HAS shall be designed to minimise the possibility of incorrect operation and be structured to reflect the access level of the user.
Intruder and hold-up alarm system component documentation
Documentation relating to l&HAS components shall be concise, complete and unambiguous. The documentation shall be sufficient to ensure the correct installation, putting into operation and maintenance of l&HAS components. Sufficient information shall be provided to ensure the integration of each component with other l&HAS components.
Component documentation shall include the following:
name of manufacturer or supplier;
description of equipment;
standard to which component claims compliance;
name 2> or mark of the certification body;
security grade;
environmental class.
Marking/ldentification
All l&HAS components shall be marked with the following:
name of manufacturer or supplier;
type;
date of manufacture or batch number or serial number;
security grade;
environmental class.
The marking shall be legible, durable and unambiguous. When space for marking of an l&HAS component is limited, codes may be used providing these are described in the associated component documentation. When insufficient space is available for codes the component shall include means of identification which allows cross reference to documentation providing the required information.
2) If certified.Annex A
(normative)
Special national conditions
Special national condition: National characteristic or practice that cannot be changed even over a long period, e g. climatic conditions, electrical earthing conditions.
NOTE If it affects harmonization, it forms part of the European Standard.
For the countries in which the relevant special national conditions apply these provisions are normative, for other countries they are informative.
Clause Special national condition
7.4 Denmark, Finland, Norway, Sweden
Environmental Class IV - Outdoor - General
Replacement:
l&HAS components shall operate correctly when exposed to environmental influences normally experienced out of doors when an l&HAS components are fully exposed to the weather.
Temperatures may be expected to vary between -40 °С and +60 °С with average relative humidity of approximately 75 % non-condensing. For 30 days per year relative humidity can be expected to vary between 85 % and 95 % non-condensing
.Annex В
(informative)
Alarm transmission system performance criteria
The security classification of an alarm transmission system is defined as the combination of 5 parameters:
D transmission time - classification
T reporting time
M transmission time - maximum values
S substitution security
I information security
The value of these parameters are defined in EN 50136-1-1 and the following tables and in the text "Signalling security".
Table B.1 - Transmission time classification
Class |
DO s |
D1 s |
D2 s |
D3 s |
D4 s |
Arithmetic mean of all transmissions |
- |
120 |
60 |
20 |
10 |
Upper 95 percentile for all transmissions |
240 |
240 |
80 |
30 |
15 |
Table B.2 - Transmission time - Maximum values
Class |
M0 s |
M1 s |
М2 s |
М3 s |
M4 s |
Maximum acceptable transmission time |
■ |
480 |
120 |
60 |
20 |
Table B.3 - Reporting time classification
Class/Period |
Reporting time |
|||||
Class |
T1 d |
T2 h |
T3 min |
T4 s |
T5 s |
T6 s |
Maximum period |
32 |
25 |
300 |
180 |
90 |
20 |
Signalling security
The alarm transmission system shall provide measures to prevent or detect deliberate attempts to interfere with the transmission of an alarm message or other information transmitted between an l&HAS and it’s associated alarm receiving centre by blocking or substitution in one of the following ways.
Substitution security: Protection against unauthorised substitution of the alarm system transceiver with similar equipment along the Alarm transmission system transmission path shall be provided in one of the following ways:
SO No measures.
Measures to detect substitution of the supervised premises transceiver by addition of an identity or address in all messages transmitted on the alarm transmission path.
Measures to detect substitution of the supervised premises transceiver by
encryption of an identity or address in all messages transmitted on the alarm transmission path,
authentication of the supervised premises transceiver by the addition of a different and unrevealed code for each connected transceiver, or
another measure as specified by the manufacturer.
Authentication always requires a sufficient number of keys to provide each connected transceiver with a unique code. The identity range in S2 must not be less than 250 unique addresses.
Information security: Protection of the information transmitted by the alarm transmission system shall be provided in one of the following ways:
IO No measures.
Measures to prevent unauthorised reading of the information transmitted.
NOTE This may be accomplished by encryption.
Measures to prevent unauthorised modification of the information transmitted.
NOTE This may be accomplished by encryption or by a cryptographic authentication method.
Measures to prevent unauthorised reading and modification of the information transmitted.
Encryption algorithms shall be such that for synchronous alarm transmission systems the data pattern of any successive 100 bits shall not be repeated within 10 000 000 successive bits, or for asynchronous systems the data pattern of any successive 100 bytes shall not be repeated within 1 000 000 successive bytes.E
EN 50131-1/A1
UROPEAN STANDARDNORME EUROPEENNE
EUROPAISCHE NORM May 2009
ICS 13.310
English version
Alarm systems -
Intrusion and hold-up systems -
Part 1: System requirements
Systemes d'alarme - Alarmanlagen -
Systemes d'alarme Einbruch- und Uberfallmeldeanlagen -
contre I’intrusion et les hold-up - Teil1: Systemanforderungen
Partie 1: Exigences systeme
This amendment A1 modifies the European Standard EN 50131-1:2006; it was approved by CENELEC on 2009-05-01. CENELEC members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this amendment the status of a national standard without any alteration.
Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the Central Secretariat or to any CENELEC member
This amendment exists in three official versions (English, French, German). A version in any other language made by translation under the responsibility of a CENELEC member into its own language and notified to the Central Secretariat has the same status as the official versions.
CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Cyprus, the Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the Netherlands, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain, Sweden, Switzerland and the United Kingdom.
CENELEC
European Committee for Electrotechnical Standardization
Comite Europeen de Normalisation Electrotechnique
Europaisches Komitee fur Elektrotechnische Normung
Central Secretariat: Avenue Marnix 17, В -1000 Brussels
© 2009 CENELEC - All rights of exploitation in any form and by any means reserved worldwide for CENELEC members.
Ref. No. EN 50131-1:2006/A1:2009 EForeword
This amendment to EN 50131-1:2006 was prepared by the Technical Committee CENELEC TC 79, Alarm systems.
The text of the draft was submitted to the Unique Acceptance Procedure and was approved by CENELEC as amendment A1 to EN 50131-1:2006 on 2009-05-01.
The following dates were fixed:
l
(dop) 2010-05-01
(dow) 2012-05-01
atest date by which the amendment has to be implemented at national level by publication of an identical national standard or by endorsementlatest date by which the national standards conflicting with the amendment have to be withdrawnScope
In the 3rd paragraph, last sentence, replace ‘operation’ by ‘functioning’.
In the 4th paragraph, 2nd sentence, replace ‘operate’ by ‘function’.
Normative references
Replace the 5th reference by the following:
EN 50136-1-1 1998 Alarm systems - Alarm transmission systems and equipment -
Part 1-1: General requirements for alarm transmission systems
Replace the last reference by the following:
EN 61000-6-3 2007 Electromagnetic compatibility (EMC) - Part 6-3: Generic standards -
Emission standard for residential, commercial and light-industrial environments (IEC 61000-6-3:2006)
Definitions and abbreviations
Definitions
Replace definition 3.1.11 by the following:
.11
alarm transmission system
equipment and network used to transfer information from one or more l&HAS to one or more alarm receiving centres
NOTE Alarm transmission systems exclude local direct connections, i.e. interconnections between parts of an l&HAS which do not require an interface to transform the l&HAS information into a form suitable for transmission.
In definition 3.1.13, replace 'system' by'l&HAS'.
Replace definition 3.1.16 by the following:
3.1.16
authorisation
permission to gain access to the various control functions of an l&HAS
In definition 3.1.17, replace 'physical' by 'mechanical'.
In definition 3.1.19, replace 'operating' by'functioning'.
Replace definition 3.1.24 by the following:
3.1.24
event
condition arising from the operation of an l&HAS e g. setting/unsetting or the functioning of an l&HAS, e.g. alarm signal or message
Replace definition 3.1.25 by the following:
3.1.25
event recording
storage of events arising from the operation e g. setting or unsetting of an l&HAS or the functioning of an l&HAS for future analysis
Replace definition 3.1.32 by the following:
3.1.32
inhibit
status of a part of an l&HAS in which an alarm condition cannot be notified, such status remaining until the l&HAS or part thereof passes from the set to the unset status
In definition 3.1.33, replace 'transmitted' by 'communicated'.
In definition 3.1.41, replace ‘manually cancelled’ by 'cancelled by a user'.
In definition 3.1.44, replace 'operation' by 'functioning'.
Replace definition 3.1.50 by the following.
3.1.50
override
intervention, by a user, to permit setting when an l&HAS is not in a normal condition
In definition 3.1.51, delete 'a zone of.
In definition 3.1.54, add 'or any part thereof to end of the definition.
In definition 3.1.55, replace 'operating' by 'working'.
Replace definition 3.1.65 by the following:
3.1.65
subsystem
part of an l&HAS located in a clearly defined area of the supervised premises capable of functioning independently of other parts of the l&HAS
Replace definitions 3.1.68 and 3.1.69 by the following:
3.1.68
system components
individual items of equipment which constitute an l&HAS when configured together
3.1.69
supervised premises transceiver
equipment at the supervised premises, including the interface to the l&HAS and the interface to the alarm transmission network
Replace definition 3.1.79 by the following:
3.1.79
unset
status of an l&HAS or part thereof in which an intruder and/or hold-up alarm condition cannot be notified
Replace definition 3.1.82 by the following:
3.1.82
warning device
device that gives an audible alarm in response to a notification
NOTE 1 A warning device may also provide alert indications.
NOTE 2 Such indications should be easily distinguishable from those related to the notification of an alarm condition.
Replace definition 3.1.84 by the following.
3.1.84
zone
area of the supervised premises where an intrusion, attempted intrusion, or the triggering of a hold-up device may be detected by an l&HAS
NOTE Although a zone could contain just one detector, the term "zone” is not synonymous with one detector input A zone may include any number of detectors. Examples of zones include: a storey of a building, the perimeter of a building, an outbuilding.
3.2 Abbreviations
Add the following after the last abbreviation:
SPT - supervised premises transceiver
6 Security grading
Add the following paragraph before NOTE 1:
If a function is provided that is optional for a particular grade and a claim of compliance is made, it shall meet the applicable requirements for the grade for which compliance is claimed (if any are given). If there are no specifications for the grade in question, the requirements for any higher grade (as identified by the manufacturer) shall apply.
8 Functional requirements
Table 1 - Faults
Replace ‘Other faults’ by ‘Other faults b’.
Add the following after table footnote a:
b Other faults as specified in components standards.Access levels
Replace the paragraph after the note by the following:
Access at level 3 shall be prevented unless either
access has been permitted by a user with level 2 access, or
in grades 1, 2 and 3 l&HAS, access at level 3 may be provided without authorisation by a level 2 user providing
the user to be given access at level 3 is at the supervised premises and accesses the CIE locally, and
the l&HAS is unset, and
in grade 1 l&HAS notification is given by a warning device when the access at level 3 is granted,
in grades 2 and 3 notification is given by a warning device and remotely, i.e. by an ATS, when the access at level 3 is granted.
Access at level 4 shall be prevented until access has been authorized by a user with level 2 access and by a user with level 3 access.
- Levels of access
Replace by the following table:
Functions |
Access levels |
|||
|
1 |
2 |
3 a |
4b |
Setting |
NPe |
P |
P |
NP |
Unsetting |
NP |
P |
P |
NP |
Restore l&HAS |
NP |
P |
P |
NP |
Verify l&HAS functions |
NP |
P |
P |
NP |
Interrogate event log |
NP |
P |
P |
NP |
Inhibit/isolate/override c |
NP |
P |
P |
NP |
Add/change individual authorisation codes |
NP |
Pd |
Pd |
Pd |
Add/delete level 2 users & codes |
NP |
P |
P |
NP |
Add/change site specific data |
NP |
NP |
P |
NP |
Change/replace basic programme |
NP |
NP |
NP |
P |
Key: P = Permitted NP = Not permitted. NOTE 1 The inclusion of the functions shown in this table does not imply that provision of such functions in l&HAS is mandatory. NOTE 2 This table specifies access levels for each function; further conditions, applicable to each function, are specified elsewhere in this standard. NOTE 3 Requirements relating to user access are not intended to restrict methods of initialisation of user access at the time that the CIE is first powered-up (e.g. the existence of default or single use access codes). |
||||
a Only when authorised at level 2. b Only when authorised at level 2 and level 3. c Depending on the grade. d An individual is only permitted to change his/her own user code. e Permitted only in grade 1, see 8.3.4. |
- Authorisation code requirements