Request to Enter – Accessing Your Gate Interlock

 


 

Product Configurator   |   Contact Us   |   Back to Heavy Duty Solutions

 


 

 

 

To Access a Safeguarded Space, how are operators requesting to enter?

 

 

 

When an operator wishes to access a safeguarded space which is locked, they need to do ‘something‘ to signal a request to enter to the logic controller in the system. There are a number of ways this can be achieved. The most common of which is with push button I/O.

 

 

 

 

 

 


 

 

 

 

 

 

Push Button Control Entry Request

 

 

 

Request to Enter

 

 

IEC 60204-1:2016 and NFPA 79 2018 recommend ‘white’ as a the button colour for Request to Enter. Buttons can be engraved with text or symbols on request for no additional charge.  In hardwired systems, buttons can be easily integrated into interlocks with two additional I/O for actuation (to make a request to enter) and illumination.

 

In the networked range of solutions with EtherNet/IP or PROFINET, pushbuttons can be integrated with no additional wiring required.

 

 

 

 

📙    Guidance on Button Colour Selection with IEC   📙

 

📙    Guidance on Button Colour Selection with NFPA   📙

 

 

 

 

 

 


 

 

 

 

 

 

Request to Enter With Trapped Key

 

 

 

 

Mechanical trapped key is typically used where it is not possible to wire directly to the point of access. In trapped key interlocks, there are two types of locks, safety and access.

 

Safety locks require a key to be removed to open a gate interlock. This provides a mechanical measure for personnel protection entering into a safeguarded space (you can read more about personnel protection here!).

 

 

Access locks must receive a key to open a gate interlock, or to enable a key to be removed from a safety lock. But where does this key come from?

 

 

Typically, access locks are used to enforce a sequence of keys, ensuring a process has been completed before access to a gate is possible. In the example below, a switch in one location acts as the point of electrical isolation. The key in this switch is rotated and removed to isolate power (with the key removed, power remains isolated). In the image the arrow signifies the transfer of the key from the point of isolation to the ‘Access Lock‘. Removal of the key from the point of isolation can be considered as the ‘request to enter’.

 

 

The key is inserted into the access lock and turned to ‘trap’ it. only when this key is trapped can the key in the safety lock (positioned above) be removed to allow the gate to be opened. Whilst the gate is open or the safety key is removed, the access key remains trapped in the gate interlock, thus electrical power to this system cannot be returned.

 

 

The Access Lock for Sequenced Entry

C6SKL11ST401   |   CLK-SUSS   |   EN4T6SKL11AKL11FT0

 

 

 

 

Whilst this is the most common use of the access key for entry requests, it is not only for mechanical interlocking at the entry location. In some cases, the access lock is used to enforce a sequence in addition to a wired gate interlock. In the example pictured below, the interlock is wired directly to the gate, and can be unlocked through button control. However, an access key must also be inserted to grant access.

 

 

 

 

Access with Networked Interlocks

C6SKL11ST401   |   CLK-SUSS   |   EN4T6SKL21AKL21SLP11NDETP6P7P2NPF10

 

 

 

 

 

 

 


 

 

 

 

 

 

 

Preventing Untrained Personnel from Accessing a Safeguarded Space

 

 

It is only possible to keep personnel safe when entering a safeguarded space if they have been given the necessary training.

 

 

 

“What stops untrained personnel from pressing a request to enter button or entering the access key into an interlock?”

 

RFID Access Request

 

This challenge has driven the development of integrated RFID technology which requires users to have permission for entry before it is possible. The RFID access control feature can be added as an element into any heavy duty networked interlock and utilises RFID badges. To operate an interlock, a user must first scan their RFID badge against the RF tag on the interlock.

 

 

 

 

 

How does RFID Access Work?

 

 

 

In this example, two employees of Fortress will attempt to access an interlock testing machine on our product production line. Akhila Hassan (a controls engineer) has the correct training to access this particular location and has permission to enter. Michael Fischer, who has just started with the business as a maintenance engineer, does not have the training necessary to safely enter the safeguarded space surrounding the testing machine. His permission will be denied.

 

 

Access Granted and Denied

 

 

 

 

 

Akhila’s Access Request

 

 

To have permission at this location, Akhila’s unique RFID badge has been assigned ‘granted’ in the Fortress Local Master Controller (FLMC).

 

When Akhila scans her RFID badge at the reader on the interlock (1.), an access request is sent to the FLMC to check the users permission (2.). As Akhila has the correct permissions for this location, the FLMC sends a confirmation back to the interlock (3.). The interlock communicates a control input for ‘access granted’ as ‘high‘ to confirm to the PLC, that the interlock can be unlocked (4.).

 

 

 

Akhilas Access Request

 

 

 

 

 

 

 

 

 

 

 

Michael’s Access Request

 

 

 

Michael does not have permission to access this location. When he scans his unique RFID badge against the reader (1.), the FLMC checks his permissions and identifies it is not granted (2.) it then returns this information to the interlock (3.). A control input on the interlock is communicated as ‘low‘ under access granted and ‘high‘ under access denied to the PLC (4.) ensuring the interlock is not unlocked for this user.

 

 

 

Michaels Access Request

 

 

 

 

 

 

 

 

 

 

❓   Want to know more about Access Control or Request to Enter? Contact our Team here   ❓

 

 

 

 

 

 


 

Product Configurator   |   Contact Us   |   Back to Heavy Duty Solutions