{"id":440008,"date":"2024-10-20T08:12:25","date_gmt":"2024-10-20T08:12:25","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-13002023\/"},"modified":"2024-10-26T15:21:08","modified_gmt":"2024-10-26T15:21:08","slug":"bs-en-13002023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-13002023\/","title":{"rendered":"BS EN 1300:2023"},"content":{"rendered":"
This document specifies requirements for high security locks (HSL) for reliability, resistance to burglary and manipulation with methods of testing. It also provides a scheme for classifying HSL in accordance with their assessed resistance to burglary and unauthorized opening. It is applicable to mechanical and electronic HSL. For electronic locks used in a distributed system, see EN 17646 for further information. The following features can be included as optional subjects but they are not mandatory: a) recognized code for preventing code altering and\/or enabling\/disabling parallel codes; b) recognized code for disabling time set up; c) integration of alarm components or functions; d) resistance to attacks with acids; e) resistance to X-rays; f) resistance to explosives; g) time functions.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 4 Classification 5 Requirements 5.1 General requirements 5.1.1 General 5.1.2 Requirements for all classes 5.1.3 Class D HSL <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 5.1.4 Mechanical key operated HSL 5.1.5 Lift heights for mechanical key locks 5.1.6 Electronic HSL <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.1.7 Electronic tokens 5.1.7.1 General 5.1.7.2 Contactless electronic tokens 5.1.7.3 Contacted electronic tokens 5.1.7.4 Multi-use <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.1.8 Firmware updates 5.2 Security requirements 5.2.1 Usable codes 5.2.2 HSL having over ride feature 5.2.3 Manipulation resistance 5.2.3.1 Limit of trials <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.2.3.2 Manipulation 5.2.4 Destructive burglary resistance 5.2.5 Spying resistance 5.2.6 Electrical and electromagnetic resistance <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.2.7 Physical environmental resistance 5.2.8 Temperature resistance 5.2.8.1 Cold 5.2.8.2 Heat <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.3 Reliability requirements <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 6 Technical documentation 7 Test specimens <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 8 Test methods 8.1 General 8.1.1 General 8.1.2 Evaluation by inspection 8.1.3 Test procedure <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 8.2 Security tests 8.2.1 Usable codes 8.2.2 Manipulation resistance 8.2.2.1 Principle <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 8.2.2.2 Equipment 8.2.2.3 Procedure <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 8.2.3 Destructive burglary resistance 8.2.3.1 Principle 8.2.3.2 Equipment 8.2.3.3 Procedure 8.2.3.4 Expression of results 8.2.4 Spying resistance 8.2.4.1 Principle <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 8.2.4.2 Equipment 8.2.4.3 Procedure 8.2.5 Electrical and electromagnetic resistance 8.2.5.1 Principle 8.2.5.2 Procedure <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 8.2.5.3 Power loss and power supply influence test 8.2.5.4 Resecuring during power failure 8.2.5.5 Electrostatic discharge 8.2.5.6 Surge immunity 8.2.5.7 Radiated electromagnetic fields 8.2.5.8 Expression of results 8.2.6 Physical environmental resistance 8.2.6.1 Vibration 8.2.6.2 Shock test <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 8.2.6.3 Immersion test <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 8.2.6.4 Corrosion test 8.2.7 Temperature resistance 8.2.7.1 Cold 8.2.7.2 Heat 8.3 Reliability testing 8.3.1 Cycling 8.3.1.1 Principle <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 8.3.1.2 Cycling equipment 8.3.1.3 Procedure 8.3.1.4 Expression of results 8.3.2 Code changes 8.3.2.1 Principle 8.3.2.2 Procedure 8.3.2.3 Expression of results 8.3.3 Dynamic code input of mechanical combination HSL 8.3.3.1 Principle 8.3.3.2 Equipment 8.3.3.3 Procedure <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 8.3.3.4 Expression of results 9 Test report 10 Marking <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | Annex A (normative)Parameters for installation and operation instructions A.1 Installation instructions <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | A.2 Operating instructions <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | Annex B (normative)Determination of manipulation resistance due to the design requirement B.1 General B.2 Key locks B.2.1 General B.2.2 Gate clearance <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | B.2.3 Bolt stomp B.2.4 False notches <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | B.2.5 Additional design requirements B.3 Mechanical combination locks B.3.1 General <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | B.3.2 Fence <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | B.3.3 Wear test B.4 Electronic locks and mechanical locks with electronic components B.4.1 General B.4.1.1 Introduction B.4.1.2 Manipulation attack (if solutions are not implemented) <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | B.4.1.3 Requirements per class B.4.1.4 Destructive burglary attack B.4.2 Sniffing the code via the data cable connection <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | B.4.3 Sniffing the code via key logger <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | B.4.4 Replay attack via the cable connection <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | B.4.5 Brute force attack <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | B.4.6 Side channel attacks <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | B.4.7 Lock spiking B.4.8 Mechanical bypassing B.4.9 Optical code spying <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | Annex C (informative)Example of manufacturer’s declaration <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | Annex D (informative)Typical locking device dimensions <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | Annex E (normative)Determination of burglary resistance due to the design requirement E.1 General E.2 Electronic HSL with separate processing unit not included in the locking device E.2.1 General design requirement E.2.2 Design requirement <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | Annex F (informative)Example of firmware declaration <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | Annex G (informative)A-deviations <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Secure storage units. Classification for high security locks according to their resistance to unauthorized opening<\/b><\/p>\n |