2023-6-8 3.239.129.52
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB 50394-2007
GB 50394-2007   Code of Design for Intrusion Alarm Systems Engineering (English Version)
Standard No.: GB 50394-2007 Status:valid remind me the status change

Email:

Language:English File Format:PDF
Word Count: 22000 words Price(USD):110.0 remind me the price change

Email:

Implemented on:2007-8-1 Delivery: via email in 1 business day
,,
Standard No.: GB 50394-2007
English Name: Code of Design for Intrusion Alarm Systems Engineering
Chinese Name: 入侵报警系统工程设计规范
Chinese Classification: P33    Residential and public building engineering
Professional Classification: GB    National Standard
ICS Classification: 91.040.10 91.040.10    Public buildings 91.040.10
Issued by: AQSIQ, MOC
Issued on: 2007-03-21
Implemented on: 2007-8-1
Status: valid
Superseding:自《安全防范工程通用规范》GB 55029-2022实施之日起,该标准相关强制性条文第3.0.3、5.2.2、5.2.3、5.2.4、9.0.1(3)条(款)同时
Language: English
File Format: PDF
Word Count: 22000 words
Price(USD): 110.0
Delivery: via email in 1 business day
1 General Provisions 1.0.1 This code was formulated with a view to regulating the design of intrusion alarm system engineering, improving the quality of intrusion alarm system engineering and protecting the personal safety of citizens and safety of the national, collective and personal properties. 1.0.2 This code is applicable to the design of intrusion alarm system engineering of the new, rebuilt and extended various buildings (structures) and their groups for the purpose of safety precaution. 1.0.3 Construction of the intrusion alarm systems engineering shall be uniformly planned together with the design of the building and its strong/light current systems. It may be completed once or in steps according to the practical situation. 1.0.4 Intrusion alarm system engineering shall be provided with safety, reliability, openness, expandability and flexibility in application and shall live up to state-of-the-art technologies, economy and rationality, practicality and reliability. 1.0.5 Except for those requirements stipulated in this code, those in the current relevant technical standards of the nation also shall be complied with for the design of intrusion alarm system engineering. 2 Terms 2.0.1 Intruder alarm system (IAS) Electronic system or network is used to detect and display behaviors intruding or trying to intrude the set condition area (including triggering the emergency alarm switches on purpose when facing the conditions of being hijacked or robbed or other emergent conditions through subjective judgment) and give out alarm messages by sensor technology and electronic information technology. 2.0.2 Alarm condition State refers the system makes response and alarm when risks are detected. 2.0.3 Fault condition It refers to the state in which the system can not work normally in line with the design requirement. 2.0.4 Tamper alarm Alarm is caused by triggering tamper detectors. 2.0.5 Tamper device Parts, components or partial of them are used to detect dismantling or opening the alarm system. 2.0.6 Set condition Operation makes the entire or partial defence area of the system on alert. 2.0.7 Unset condition Operation makes the entire or partial defence area of the system off alert. 2.0.8 Defence area It refers to area where the protected objects are protected by the detector (including the emergency alarm switches) and the alarm positions can be definitely displayed on the controllers. 2.0.9 Perimeter It refers to the boundary of area requiring physical protection or/and electronic protection. 2.0.10 Surveillance area Area is between the boundary of protection area and the perimeter guide line composed by the physical perimeter protection system and/or electronic perimeter protection system. 2.0.11 Protection area Area or position is allowed to access by the public and is the location of the protected objects. 2.0.12 Restricted area Protection area or position is disallowed to access (or peek) by unauthorized personnel. 2.0.13 Blind zone Area is not covered by security and protection systems in the warning limit. 2.0.14 Leakage alarm The system fails to alarm or display when the intrusion behavior has already occurred. 2.0.15 False alarm Alarm signals are sent due to accidental touching the manual devices or automatic devices which respond to the un-designed alarm condition, malfunction or damage of parts and misoperation of the operators. 2.0.16 Check to alarm Method is used to check the authenticity of locale alarm by sound and/or image information. 2.0.17 Emergency alarm Alarm is triggered on purpose by uses when they are facing being hijacked or robbed or other critical conditions through subjective judgment.
1 General Provisions 2 Terms 3 Basic Provisions 4 System Constitutions 5 System Design 5.1 Design of Longitudinal-depth Protection Systems 5.2 Function and Performance Design of System 6 Equipment Selection and Installation 6.1 Detector 6.2 Controller 6.3 Wireless Devices 6.4 Management Software 7 Transmission Mode, Wire Cable Selection And Wiring 7.1 Transmission Mode 7.2 Wire Cable Selection 7.3 Wiring Design 8 Power Supply, Lightning Protection and Grounding 9 System Safety, Reliability, ELECTROMAGNETIC COMPATIBILITY and Environmental Compatibility 10 Monitoring Center Annex A Design Process and Depth Annex B Selection Requirements of Common Intrusion Detector Wording Explanation
GB 50394-2007 is referred in:
* GB 50606-2010 Code for installation of Intelligented building system
* GB 50606-2010 Code for installation of Intelligented building system
* GA 38-2015 Security requirements for bank commercial premises
* GB 50314-2015 Standard for design of intelligent building
* JGJ 66-2015
*YD/T 2057-2009 General requirements of Safety management for telecommunication room
*GA 1016-2012 Level of risk and security requirements for guns(ammunition) depot/ storage room
Code of China
Standard
GB 50394-2007  Code of Design for Intrusion Alarm Systems Engineering (English Version)
Standard No.GB 50394-2007
Statusvalid
LanguageEnglish
File FormatPDF
Word Count22000 words
Price(USD)110.0
Implemented on2007-8-1
Deliveryvia email in 1 business day
Detail of GB 50394-2007
Standard No.
GB 50394-2007
English Name
Code of Design for Intrusion Alarm Systems Engineering
Chinese Name
入侵报警系统工程设计规范
Chinese Classification
P33
Professional Classification
GB
ICS Classification
Issued by
AQSIQ, MOC
Issued on
2007-03-21
Implemented on
2007-8-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
自《安全防范工程通用规范》GB 55029-2022实施之日起,该标准相关强制性条文第3.0.3、5.2.2、5.2.3、5.2.4、9.0.1(3)条(款)同时
Language
English
File Format
PDF
Word Count
22000 words
Price(USD)
110.0
Keywords
GB 50394-2007, GB/T 50394-2007, GBT 50394-2007, GB50394-2007, GB 50394, GB50394, GB/T50394-2007, GB/T 50394, GB/T50394, GBT50394-2007, GBT 50394, GBT50394
Introduction of GB 50394-2007
1 General Provisions 1.0.1 This code was formulated with a view to regulating the design of intrusion alarm system engineering, improving the quality of intrusion alarm system engineering and protecting the personal safety of citizens and safety of the national, collective and personal properties. 1.0.2 This code is applicable to the design of intrusion alarm system engineering of the new, rebuilt and extended various buildings (structures) and their groups for the purpose of safety precaution. 1.0.3 Construction of the intrusion alarm systems engineering shall be uniformly planned together with the design of the building and its strong/light current systems. It may be completed once or in steps according to the practical situation. 1.0.4 Intrusion alarm system engineering shall be provided with safety, reliability, openness, expandability and flexibility in application and shall live up to state-of-the-art technologies, economy and rationality, practicality and reliability. 1.0.5 Except for those requirements stipulated in this code, those in the current relevant technical standards of the nation also shall be complied with for the design of intrusion alarm system engineering. 2 Terms 2.0.1 Intruder alarm system (IAS) Electronic system or network is used to detect and display behaviors intruding or trying to intrude the set condition area (including triggering the emergency alarm switches on purpose when facing the conditions of being hijacked or robbed or other emergent conditions through subjective judgment) and give out alarm messages by sensor technology and electronic information technology. 2.0.2 Alarm condition State refers the system makes response and alarm when risks are detected. 2.0.3 Fault condition It refers to the state in which the system can not work normally in line with the design requirement. 2.0.4 Tamper alarm Alarm is caused by triggering tamper detectors. 2.0.5 Tamper device Parts, components or partial of them are used to detect dismantling or opening the alarm system. 2.0.6 Set condition Operation makes the entire or partial defence area of the system on alert. 2.0.7 Unset condition Operation makes the entire or partial defence area of the system off alert. 2.0.8 Defence area It refers to area where the protected objects are protected by the detector (including the emergency alarm switches) and the alarm positions can be definitely displayed on the controllers. 2.0.9 Perimeter It refers to the boundary of area requiring physical protection or/and electronic protection. 2.0.10 Surveillance area Area is between the boundary of protection area and the perimeter guide line composed by the physical perimeter protection system and/or electronic perimeter protection system. 2.0.11 Protection area Area or position is allowed to access by the public and is the location of the protected objects. 2.0.12 Restricted area Protection area or position is disallowed to access (or peek) by unauthorized personnel. 2.0.13 Blind zone Area is not covered by security and protection systems in the warning limit. 2.0.14 Leakage alarm The system fails to alarm or display when the intrusion behavior has already occurred. 2.0.15 False alarm Alarm signals are sent due to accidental touching the manual devices or automatic devices which respond to the un-designed alarm condition, malfunction or damage of parts and misoperation of the operators. 2.0.16 Check to alarm Method is used to check the authenticity of locale alarm by sound and/or image information. 2.0.17 Emergency alarm Alarm is triggered on purpose by uses when they are facing being hijacked or robbed or other critical conditions through subjective judgment.
Contents of GB 50394-2007
1 General Provisions 2 Terms 3 Basic Provisions 4 System Constitutions 5 System Design 5.1 Design of Longitudinal-depth Protection Systems 5.2 Function and Performance Design of System 6 Equipment Selection and Installation 6.1 Detector 6.2 Controller 6.3 Wireless Devices 6.4 Management Software 7 Transmission Mode, Wire Cable Selection And Wiring 7.1 Transmission Mode 7.2 Wire Cable Selection 7.3 Wiring Design 8 Power Supply, Lightning Protection and Grounding 9 System Safety, Reliability, ELECTROMAGNETIC COMPATIBILITY and Environmental Compatibility 10 Monitoring Center Annex A Design Process and Depth Annex B Selection Requirements of Common Intrusion Detector Wording Explanation
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Foryou Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB 50394-2007, GB/T 50394-2007, GBT 50394-2007, GB50394-2007, GB 50394, GB50394, GB/T50394-2007, GB/T 50394, GB/T50394, GBT50394-2007, GBT 50394, GBT50394