Download PDF version Contact company

Among the complex audits of security systems, there is a champion, the Type 5 Certification Scheme. It has incorporated all the most stringent quality requirements and the most severe tests in the industry.

The Scheme allows users to get an uncompromising conclusion about the reliability of security devices and the stability of their production. It is feared and at the same time desired by all manufacturers of security systems in Europe, but not all of them pass it successfully. Here is how the Scheme’s audit is arranged, and what it takes to pass it.

Type 5 Certification Scheme

Type 5 Certification Scheme is a certification system regulated by the European standard ISO/IEC 17067:2013. The Scheme provides the testing of randomly selected samples, as well as manufacturing control and audit of the company’s management system.

«Scheme» is a set of rules, requirements, and procedures for certification. There are several types of schemes:

  • Type 1. Either one device or several devices from the same batch are tested. The quality statement applies only to this sample or batch, and manufacturing is not inspected.
  • Type 2. Test devices are periodically selected from the open market, but the factory is still out of control.
  • Type 3. Tests are carried out on several devices, all received from the manufacturer. The manufacturing is also evaluated.
  • Type 4. Devices are selected on the open market, manufacturing inspection is carried out, but without a management system audit.
  • Type 5. Devices for testing can be selected at the factory, taken from the warehouse, and requested from the open market trade network. It is also the strictest manufacturing control and management system.
  • Type 6. Certifies processes and services. Devices are never tested.

Type 5 Certification Scheme combines the complexities and challenges of each scheme and this is what makes it the most formidable test in the industry.

Who needs it and why

If the manufacturer was given «fit» according to the Scheme, it means that it is capable of producing batches

Type 5 Certification Scheme tells European distributors and security companies that a manufacturer is worth dealing with in the long run.

If the manufacturer was given «fit» according to the Scheme, it means that it is capable of producing batches of new devices day after day, stably and with high quality, and absolutely any of them will comply with the standard.

manufacturing control and procedure

In the early 2010s, after defective security devices from China appeared on the market, Europe began to pay more attention to manufacturing control and the procedure for selecting devices for testing in the laboratory.

In 2013, the current edition of ISO/IEC 17067:2013 appeared, which regulates the fifth scheme. 

stability and quality

European consumer gets reliable protection, the installer gets a system without defects

Auditors consistently inspect each process in the plant and randomly select devices for testing in the laboratory. This eliminates the possibility of fraud on the part of the manufacturer and convinces the market participants of the stability and quality of manufacturing.

Due to the Scheme, the European consumer gets reliable protection, the installer gets a system without defects, and the manager gets a good, right deal.

Who is responsible for auditing

ISO/IEC 17067:2013 certified by an independent product certification body. There are several bodies in Europe, but only two are recognised as the most authoritative the Czech Republic and Great Britain. Ajax security devices have a certificate of conformity issued by the accredited body Trezor Test (Czech Republic). 

Laboratories in which devices are tested, as well as audit companies that inspect the factory, must also be accredited. This is a limited number of European professional organisations, whose decisions and assessments are under intense scrutiny of all market players.

final certificate

If the claims are confirmed, the organisations involved in the verification may lose

Competitors are jealously monitoring certifications issued to rivals, and often initiating their device tests that can lead to complaints. If the claims are confirmed, the organisations involved in the verification may lose their accreditations.

The stakes are very high, so each stage of the Scheme is strictly regulated, and the final certificate is as justified as possible.

How the Type 5 Certification Scheme works

There are three main stops on the route of the Scheme, and it’s possible to say goodbye to the opportunity of getting a certificate at each of them.

  • Stop 1. Quality Management System Certification according to ISO 9001:2015. Before starting the process according to the Type 5 Certification Scheme, the manufacturer must take care of obtaining this certificate, having passed tests for compliance with this standard.
  • Stop 2. Test Centre, or Laboratory. Randomly selected samples are tested here. Ajax security devices are being tested in two Test Centers in the Czech Republic, TESTALARM and CMI.
  • Stop 3. Factory. Every year, the auditing company sends a team of auditors and technical specialists to the factory. It monitors the stability and continuous improvement of processes, as well as inspecting the company’s management system.

Test Centre

All Ajax security devices are tested for resistance to mechanical and climatic influences, as well as to external electromagnetic field disturbances. All functional characteristics, the quality of radio contact, and the possibility of affecting the operation of the device from the outside are checked. The lids are smashed with a hammer and opened with metal plates.

The lenses are exposed to hot air, and illuminated with halogen lamps, simulating sunlight. The tests are conducted over and over again to record the repeatability of the results. The device is placed in the humidity chamber for a whole month, and other tests can take six months. It is impossible to speed up the process, otherwise the laboratory risks its reputation and accreditation to conduct tests.

Download PDF version Download PDF version

In case you missed it

How can manufacturers and integrators mitigate the risks of port forwarding?
How can manufacturers and integrators mitigate the risks of port forwarding?

Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open por...

ASSA ABLOY's mobile unlocking innovation wins award
ASSA ABLOY's mobile unlocking innovation wins award

ASSA ABLOY’s innovative new mobile access solution has won yet another prestigious industry award. At October’s Detektor International Awards, ABLOY CUMULUS received t...

Milestone enhances Care Plus with XProtect remote manager
Milestone enhances Care Plus with XProtect remote manager

Milestone Systems, a global provider of open-platform video management software (VMS), announced the release of the R2 2024 update to its XProtect platform.  This release int...

Quick poll
What's the primary benefit of integrating access control with video surveillance?