logo

 

Select:

 

1   A   B   C   D   E   F   G   H   I   J   K   L   M
N   O   P   Q   R   S   T   U   V   W   X   Y   Z

 

1

 

1:1 Matching Termine generalmente utilizzato in riferimento al controllo biometrico degli accessi come metodo per abbinare la persona presentata al lettore al database. Nella corrispondenza 1:1, l’utente scansiona prima le credenziali della propria carta fisica, in modo che il lettore sappia già quali informazioni biometriche sta cercando. Ciò rende più veloce il processo di identificazione biometrica e di autenticazione.
1:N Matching Termine generalmente utilizzato in riferimento al controllo biometrico degli accessi come metodo per abbinare la persona presentata al lettore al database. Nella corrispondenza 1:N, il lettore non sa chi dovrebbe identificare e autenticare. Quando la persona si presenta al lettore, le sue informazioni biometriche devono essere scansionate e confrontate con tutto il database esistente per trovare e verificare una corrispondenza.
125kHz Prossimità La prossimità a 125kHz è una tecnologia precedente utilizzata per la comunicazione tra le credenziali di controllo degli accessi e i lettori. È popolare nel settore della sicurezza dal 1990 e consiste in un chip RFID fisico incorporato nelle credenziali di accesso. Quando una tessera di prossimità a 125 kHz viene presentata a un lettore, il chip RFID entra nel campo elettromagnetico emesso dal lettore. Quando l’antenna del chip è eccitata da questo campo elettromagnetico, risponde inviando un segnale al lettore per identificare la credenziale.
26-Bit Si tratta della variante più comune del protocollo Wiegand, oggi molto diffuso nei sistemi di controllo degli accessi. I 26 bit descrivono il modo in cui è organizzato il codice binario che viene trasferito dal lettore al sistema.

 

A

 

AC AC stà per Corrente Alternata. Si riferisce a un tipo di corrente elettrica che inverte la sua direzione periodicamente su base continua. AC è comunemente usato per gli alimentatori. L’altro tipo di corrente è la corrente continua (DC).
Access Control Il controllo degli accessi è una misura di sicurezza che limita chi può accedere a determinate aree. Il controllo degli accessi può essere fisico (regolamentare l’ingresso nell’ambiente costruito con porte controllate, serrature, cancelli e altre barriere) o logico (regolamentare l’accesso a reti, file o dati in un sistema informatico).
Access Event Un evento di accesso si riferisce al verificarsi di una particolare azione all’interno di un sistema di controllo degli accessi. All’interno dei sistemi possono esserci dozzine di diversi tipi di eventi definiti. Esempi di eventi di accesso includono Accesso concesso, Accesso negato, Porta aperta troppo a lungo e Porta forzata.
Access Levels I livelli di accesso sono insiemi di autorizzazioni utente che determinano a quali aree all’interno di un edificio possono accedere gli utenti. Generalmente si riferiscono ad aree più grandi di una singola porta o stanza e le autorizzazioni vengono concesse in base a gruppi più ampi di utenti con requisiti di accesso simili.
Activation Distance La distanza di attivazione di un lettore di controllo accessi si riferisce alla distanza massima dal lettore alla quale una credenziale può essere rilevata e scansionata. Se una credenziale viene presentata entro tale distanza, verrà rilevata. Se una credenziale viene presentata più lontano, non verrà rilevata.
Active Proximity La prossimità attiva è un tipo di tecnologia di comunicazione wireless utilizzata nel controllo degli accessi per l’interazione tra le credenziali card/fob e i lettori. Le credenziali attive sono alimentate da una batteria al litio interna a bordo della carta/fob. Ciò generalmente conferisce alle carte attive un raggio di lettura maggiore rispetto alle credenziali di prossimità passive alternative. La batteria integrata nelle schede attive si esaurisce nel tempo e dovrà essere sostituita.
AES AES è l’acronimo di Advanced Encryption Standard. Questo è un tipo di cifratura (un metodo per trasformare un messaggio per nasconderne il significato) che protegge il trasferimento di dati attraverso Internet. Da quando è stato selezionato dal governo degli Stati Uniti come metodo preferito, AES è diventato lo standard del settore per la crittografia.
Algorithm Un algoritmo è un insieme fisso di regole o processi che viene utilizzato per risolvere un problema matematico o un calcolo. Nel controllo degli accessi, viene utilizzato un algoritmo per crittografare i dati trasmessi tra i componenti nei sistemi che utilizzano la crittografia AES.
ANPR ANPR è l’acronimo di Riconoscimento automatico della targa. Si riferisce a sistemi che utilizzano telecamere per identificare e leggere le targhe automobilistiche a scopo di controllo degli accessi, pagamento o identificazione.
ANSI Strike ANSI sta per American National Standards Institute. Gli scontri conformi a questi standard sono leggermente diversi da quelli conformi agli standard EURO.
Anti-Passback L’ anti-passback è una funzione di sicurezza integrata in alcuni sistemi di controllo degli accessi che consente di impedire agli utenti di condividere le proprie credenziali con altri. Può anche impedire alle persone di seguire e seguire un altro utente in un’area sicura.
Area Nel controllo degli accessi, un’area è una zona definita a cui agli utenti viene concesso o negato l’accesso. Alcuni sistemi di controllo degli accessi determinano i diritti di accesso in base alle singole porte. Nel frattempo, ATRIUM determina i diritti di accesso in base alle aree delimitate da porte. Un’area (stanza) può avere più punti di accesso (porte). In ATRIUM, a tutte quelle porte vengono assegnate automaticamente le stesse impostazioni e autorizzazioni perché danno accesso alla stessa area.
Armature Plate Una contropiastra, nota anche come contropiastra, è un componente di una serratura elettromagnetica. Generalmente il magnete stesso viene fissato al telaio della porta, mentre la contropiastra viene fissata alla porta. Quando viene applicata potenza al magnete, si genera una forte attrazione tra il magnete e la piastra dell’armatura e la porta viene tenuta chiusa.
Authentication Key Nella crittografia dei dati, viene utilizzata una chiave di autenticazione per autenticare i dati in base allo standard di crittografia utilizzato per nasconderli. La chiave di autenticazione consente al componente che riceve i dati di verificare che il componente che invia i dati sia valido, sicuro e autorizzato a farlo.

 

B

 

Back-EMF La forza elettromotrice posteriore, nota anche come forza controelettromotrice, si riferisce alla tensione generata quando un motore elettrico gira. Questa forza spinge contro la corrente che fa girare il motore e riduce la tensione della corrente che scorre attraverso le bobine del motore.
Balanced Door Una porta bilanciata è un tipo di porta a battente tenuta aperta o chiusa da pesi. Sono particolarmente utili quando l’anta della porta è particolarmente alta o pesante, in quanto un sistema bilanciato rende più facile per le persone spingere o tirare una porta pesante.
Binary Code Il codice binario è un sistema di codifica che utilizza solo le cifre 1 e 0 per rappresentare i dati.
Bit-Rate Il bit-rate di una rete o di un sistema si riferisce al numero di bit (elementi di dati) che possono essere trasmessi o codificati in un certo periodo di tempo.
Breakglass Rottura vetro è un tipo di dispositivo di attivazione dell’uscita di emergenza. È costituito da una piccola lastra di vetro che, se rotta, fa scattare l’uscita di emergenza. Una volta rotto, il vetro deve essere sostituito prima di poter essere riutilizzato.

 

C

 

Capacitive Sensor Spesso presenti nei lettori di impronte digitali, i sensori capacitivi impiegano una serie di pixel per scansionare le impronte digitali e identificare minuscole variazioni nelle cariche elettriche presenti nelle creste dell’impronta digitale.
Capacity Management La gestione della capacità, nota anche come gestione dell’occupazione, è una misura di sicurezza che controlla il numero di persone ammesse all’interno di un’area definita in un dato momento. I sistemi di controllo degli accessi contano le persone in entrata e in uscita da un’area e bloccano automaticamente le porte quando viene raggiunta la capacità preimpostata, impedendo ad altre persone di entrare nell’area.
Card Cloning Nel controllo degli accessi, la clonazione delle carte si riferisce al processo in cui gli individui intercettano i segnali dalle carte di accesso RFID e li copiano, solitamente per scopi dannosi. Le carte di accesso a bassa frequenza e quelle senza sicurezza o crittografia integrate sono maggiormente a rischio di clonazione.
CC Nelle serrature e apparecchiature elettriche ed elettroniche, CC sta per corrente continua o corrente costante. Questo è un tipo di corrente continua (DC) che non cambia intensità nel tempo. Consente ai sistemi di mantenere lo stesso livello di tensione indipendentemente dalle variazioni di corrente.
Centralised Nel controllo degli accessi, un sistema centralizzato memorizza tutti i dati dell’utente e le impostazioni dei parametri in una posizione centrale, piuttosto che in ogni singolo punto di accesso. I sistemi centralizzati sono generalmente installati su siti più grandi con un numero maggiore di porte e utenti da gestire.
Changeover Contact Un contatto di commutazione è la parte di un relè in cui i contatti normalmente aperti (NA) si toccano per stabilire o interrompere il contatto. I relè possono contenere più contatti di scambio.
Check Bit Un bit di controllo o bit di parità è un bit aggiunto a una stringa di codice binario allo scopo di rilevare errori e convalidare l’integrità dei dati. Al valore del bit di controllo viene assegnato 0 o 1 a seconda del numero di 1 nella stringa. Il tipo più comune di controllo richiede che il numero di 1 nella stringa sia un numero pari: se il numero è già pari, il bit di controllo è impostato su 0; se è dispari, il bit di controllo viene impostato a 1 per rendere il totale pari. C’è un altro tipo di controllo che richiede che il numero di 1 sia dispari, ma questo è molto meno comune.
Contactless Il controllo degli accessi senza contatto, noto anche come touchless, touch-free e contact-free, è progettato per ridurre o eliminare il contatto fisico tra gli utenti umani e i prodotti o i componenti che compongono il sistema.
Counter-Electro-Motive Force La forza elettromotrice, comunemente nota come EMF, si riferisce alla tensione generata quando un motore elettrico gira. Questa forza spinge contro la corrente che fa girare il motore e riduce la tensione della corrente che scorre attraverso le bobine del motore.
Credentials In un sistema di controllo degli accessi, una credenziale è l’elemento utilizzato per autenticare la persona che desidera accedere a una porta o barriera. Esistono molti tipi diversi di credenziali, che vanno dalle carte di accesso in plastica ai dati delle impronte digitali, un codice PIN o segnali di telefonia mobile. Generalmente una credenziale è qualcosa che conosci (password o codice), qualcosa che possiedi (carta o tag) o qualcosa che sei (impronta digitale o pattern dell’iride).
Cypher Un cypher (o cifrario) è un metodo per trasformare un messaggio al fine di nascondere il messaggio e nasconderne il significato. Nel controllo degli accessi, la crittografia AES è un tipo di cifratura comunemente utilizzata per proteggere il trasferimento di dati tramite Internet.

 

D

 

DAC Controllo di accesso discrezionale. Uno dei tre metodi principali di controllo degli accessi, DAC è un sistema basato sull’utente che si adatta meglio ai piccoli locali. L’utente finale determina le autorizzazioni utente concedendo manualmente e direttamente l’accesso alle persone. Ciò potrebbe avvenire rilasciando loro una carta di accesso o comunicando loro un codice PIN.
Daisy-Chain Nell’ingegneria elettrica, un collegamento a margherita è un metodo per collegare insieme i dispositivi in cui i componenti sono collegati in un anello o in sequenza. Il nome si riferisce al paragone con una serie di fiori di margherita legati insieme in una catena.
DC DC sta per Corrente Continua. Si riferisce alla corrente elettrica che scorre in una sola direzione. La corrente continua è comunemente usata negli articoli elettrici a bassa tensione. L’altro tipo di corrente è la corrente alternata (AC).
Dead-Bolt Un catenaccio fa parte delle famiglie di alcuni sistemi di bloccaggio. È costituito da un chiavistello (solitamente metallico) che viene spostato manualmente con una chiave o una maniglia per bloccare o sbloccare la porta.
Decrypt La decrittografia è il processo di conversione di un messaggio che è stato nascosto tramite crittografia nella sua forma originale e leggibile.
Demodulation Nella trasmissione radio, la demodulazione è il processo di riconversione delle onde radio che sono state inviate dal trasmettitore in una forma utilizzabile.
Diax® Diax® è un marchio registrato CDVI e comprende viti di sicurezza progettate per aumentare la resistenza al vandalismo e alla sicurezza.
DIN Una guida DIN è un tipo standardizzato di guida metallica generalmente fissata a una parete su cui è possibile montare apparecchiature elettriche. DIN sta per Deutsches Institut für Normung, l’ente tedesco che originariamente pubblicò le specifiche per questo tipo di binario. Le guide DIN sono state ampiamente standardizzate dagli anni ’50.
Door Station   Negli impianti videocitofonici o citofonici, il posto esterno è il componente installato nel punto di ingresso dal       lato non blindato della porta. È qui che i visitatori si avvicinano e inizia una chiamata.
Double Action Lock Una serratura a doppia azione è quella che può essere utilizzata con porte che oscillano in entrambe le direzioni. Queste serrature possono sia chiudersi che essere bloccate come di consueto.
Double Pole In un interruttore elettrico, un polo si riferisce a un circuito che l’interruttore può controllare. Un interruttore bipolare può controllare due circuiti separati, utilizzando lo stesso interruttore.

 

E

 

Egress Egress is the action of exiting or leaving a place or area.
Electric Lock An electric lock consists of a small motor which is activated by an electrical impulse. The electrical impulse powers moving parts such as a bolt to secure the door.
Electric Strike An electric strike is a type of lock. They consist of a powered latch and a faceplate. When the strike is activated, either by the application or removal of power, the latch is released and the door can be opened. Strikes are cost-effective and durable locks.
Electric Magnetic Lock An electro-magnetic lock (also known as a maglock) consists of an electro-magnet and an armature plate. When power is applied to the electro-magnet, a magnetic field is created and a powerful attraction is generated between the magnet and the armature plate. When power is removed, the magnetic field drops and the door can be opened. Maglocks are designed to be easy to install and offer both durability and longevity.
Encryption Encryption is the process of converting a message or other information into a code for the purposes of concealing it. The message is passed through a cypher in order to encrypt it. The code can only be decrypted when passed through the correct corresponding cypher.
End-to-End Encryption End-to-end encryption refers to systems which encrypt the transmission of data between all the components of the system. This level of encryption means that all points of data transfer in the system are strong and cannot be easily intercepted and deciphered.
Enrolment Enrolment is the process of registering new users into an access control system. There are many different methods of enrolment, including manual card registration at a reader, software-based enrolment in a centralised system, or remote enrolment using mobile access technology.
EURO Strike EURO strikes adhere to the international European standards for locking. Standards vary around the world, but in the UK, EURO strikes are the most common type. The other type that is common in the UK is ANSI strikes, which meet the American standard.

 

F

 

Faceplate When referring to locks, a faceplate is the part of a lock that is visible on the surface of the door edge. Typically, the lock mechanism is installed set back into the body of the door. When the lock is activated, the bolt or latch protrudes from the mechanism and through the faceplate into the lock keep in the door frame.
Faceprint A faceprint is a digital representation of the features of a person’s face, used for the purposes of facial recognition technology. A specialist camera scans the face and identifies its features, mapping them onto a digital template that can later be used to compare and match faces.
Facility Code A facility code appears in a string of binary code used to identify access credentials according to the Wiegand protocol. The binary codes which are transferred between components are split into different sections, one of which is common to all the credentials on the same site or system. This is the facility code.
Fail Safe Fail safe locks are unlocked when power is removed. Power must be applied to the lock in order to secure the door and prevent access.
Fail Secure Fail secure locks are locked when power is removed. When power is applied, the lock is released and the door is free to open.
Failover Failover is a reliability procedure built into systems to maintain normal operation when a fault or failure occurs. Failover usually consists of a duplicate system that can be activated when a problem is detected.
FAR FAR stands for False Acceptance Rate. This refers to unauthorised individuals gaining entry via an access control system by being wrongly accepted as authorised.
Fire Rated Fire ratings are standardised regulations that certify how well a product can withstand the effects of being exposed to fire. Also known as fire resistance, there are a huge number of different regulations in use, which apply to specific categories of product types. Some of the common fire regulations in access control and door automation include EN1634-1, EN1634-2, and EN14846.
Fixed Code Fixed code is a term used in relation to radio frequency transmission. In fixed code systems, the code that is transferred from the transmitter to the receiver never changes. Fixed code is less secure than rolling code because if an attacker intercepted a fixed code signal, they could find the code and use it to gain entry to a premises.
Flashover In a fire, flashover refers to an advanced stage of the fire at which point everything in the room has ignited. Flashover is caused by the ignition of smoke or fumes from objects in the room, resulting in very sudden and rapid spread of fire through the air.
Flush Mount Flush mounting (also known as mortice mounting in reference to locks) is the installation of a product set back into the surface of a wall, so that the surface of the product is aligned with the wall. The opposite of flush mounting is surface mounting.
Folding Door A folding door is comprised of multiple sections or panels which fold together to open the door. They are also known as bifold doors (despite most having more than two panels) or concertina doors.
Frequency In radio transmission, frequency refers to how quickly or slowly a sine wave oscillates from top to bottom in one complete cycle. Frequency is measured in cycles per second, also known as Hertz. Frequency bands are used to pair transmitting and receiving devices to ensure that data is being sent from and to the right places.
FRR FRR stands for False Rejection Rate. This refers to authorised individuals being wrongly rejected by an access control system despite the fact that they are properly registered.

 

H

 

Hardware Hardware refers to the physical components of a system, as opposed to software which is a virtual computer programme. In access control, hardware includes the controllers, readers, receivers, wiring, and other physical products that comprise a system.
Hertz Hertz is another term for the measure of radio wave cycles per second. The time it takes for a radio wave to oscillate from the highest point of its peak to the lowest point of its trough defines its frequency. The number of complete cycles from top to bottom that are completed in one second gives the Hertz value.
Holding Force Holding force is a measure of the strength of a lock. Measured in kilograms or pounds, holding force indicates the amount of weight that would be required to break the lock.
Hopping Code Hopping code, also known as rolling code, is a security technology used with radio frequency transmission. Every time a signal is passed between a transmitter and the receiver, the code used to grant access changes. This is a more secure technology than a fixed code system, because a code cannot be used more than once, and if intercepted, can no longer be used to gain access.

 

I

 

IK Rating IP ratings measure ingress protection; resistance to liquid and solid particles getting into the product. An IP rating is made up of two digits. The first digit is measured from 0-6 and measures protection against solids. The second digit is measured from 0-8 and measures protection against water.
Infrared Infrared waves are a type of electro-magnetic radio waves. The wavelength of infrared waves is just beyond the visible red light spectrum, but smaller than microwaves. In access control, infrared technology is often used for automatic sensors and touch-free trigger buttons.
Ingress Ingress is the action of entering or going into a place or area.
Intercom An intercom is an electronic system that allows one or two-way communication utilising usually audio, but sometimes also video channels. They are commonly found in apartment buildings for residents to communicate with visitors.
Interlock In access control, an interlock is a system that makes the status of one door dependent on another. For example, in a clean room environment, a user would not be able to unlock and open a door to the inner area until the door to the external area was closed and locked.
IP IP stands for Internet Protocol. It refers to the rules and regulations that standardise the format of data that is sent or received over the internet.
IP Rating An IP rating is a measure of how well a product can resist liquid and solid particles entering the body of the product. It stands for ingress protection. The rating is a two-digit number. The first digit is measured from 0 to 6 and signifies the level of protection against solids. The second digit measures protection against liquids and ranges from 0 to 8.

 

K

 

KeeLoq® KeeLoq® is a proprietary block cypher that is one of the most commonly used encruption methods for radio frequency transmission.
Keeper Plate A keeper plate, also known as an armature plate, is a component of an electro-magnetic lock. Generally, the magnet itself is fitted to the door frame, while the keeper plate is fitted to the door. When power is applied to the magnet, a strong attraction is generated between the magnet and the keeper plate, and the door is held locked.

 

L

 

LAN LAN stands for Local Area Network. It refers to a network of computers, cables, and other related devices set up within a limited environment.
LCD LCD stands for Liquid Crystal Display. An LCD screen is a type of digital display that utilises liquid crystals to make up the elements of the display.
LED An LED is a Light Emitting Diode. It refers to a semiconductor device through which an electric current is passed in order to produce light. Light emitted by LEDs can be controlled in order to appear in different colours.
Logical Access Control Logical access control is a type of access control that restricts the computer files, data, and systems that individuals can see and use. This type of access control consists of identification (knowing which user is attempting to gain access), authentication (ensuring they are who they say they are), and authorisation (checking they have permission).

 

M

 

MAC MAC stands for Mandatory Access Control. This is one of the three core types of access control. User settings, rights, and permissions can only be defined or changed by the system administrator. MAC is generally the highest security type of access control and is commonly used in military or government facilities where security clearance and classification are essential.
Master In access control, master refers to a lead or primary component of the system that defines certain parameters or characteristics for the subordinate slave components. The actions of the master component control and initiate commands for the slave components to follow.
Microwaves Microwaves are a type of invisible electro-magnetic wave which is shorter than a standard radio waves but longer than an infrared wave.
MIFARE® MIFARE® is a trademarked brand name referring to integrated circuit chips which are commonly used inside access credentials such as cards and tags. There are different variants of MIFARE® technology, generally differentiated based on the security level of the chips.
MIFARE® DESFire® MIFARE® is a trademarked brand name referring to integrated circuit chips which are commonly used inside access credentials such as cards and tags. There are different variants of MIFARE® technology, generally differentiated based on the security level of the chips. MIFARE® DESFire® is a higher security variant than MIFARE® Classic. There have been three evolutions of MIFARE® DESFire® so far: EV1, EV2, and EV3.
Minutiae In biometrics, specifically fingerprint recognition, minutiae are the tiny features of a fingerprint that are used by the system to identify an individual.
Modulation In radio transmission communication, modulation is the process of converting the raw data being transmitted, such as a string of text or a voice recording, into radio waves.
Monitor In video intercom or door entry systems, the monitor is the internal component on the secure side of the system. Calls come into the monitor, where the person inside can answer them and choose to grant or deny access.
Monitored Monitoring refers to technology which allows certain products such as electro-magnetic locks to record and report their status to a central system. This allows security officers to see the live status of a lock and record the history of access events.
Mortice Mount Mortice (or mortise) refers to one of the two methods for mounting a lock onto a door. Mortice locks are mounted into the body of the door itself, meaning a pocket must be cut into the door in order to install the lock. The opposite is a surface mount lock.
MOV MOV stands for Metal Oxide Varistor. An MOV is a component that is included in some electronic devices in order to maintain a safe and consistent voltage level, even in an unusual power surge. By absorbing energy and dissipating it as heat, an MOV prevents damage to vulnerable system components.
MSI MSI stands for Multi Spectral Imaging. It refers to an advanced method of capturing images that ensures a very high level of detail. Multi-spectral imaging penetrates deeper into the surface of its subject than standard optical sensors, and creates clearer, cleaner, more accurate images.
Multi-Factor Authentication Multi-factor authentication or MFA is a method of validating identity in an access control system by requiring the user to submit more than one credential. For example, to gain access to a secure area, the user may have to enter the correct keypad code as well as present their fingerprint to a scanner. The more rounds of authentication in a system, generally the more secure it is.

 

N

 

N/C N/C stands for Normally Closed. It refers to one of the two states of switches, sensors, or relays contacts in an electronic system. The other is Normally Open (N/O). An N/C contact remains closed until a certain condition is filled, at which point it is triggered to open.
NIR NIR stands for Near-Infrared Radiation. It refers to radiation bands in the infrared spectrum that are at the closest part of that spectrum to red visible light. In access control, NIR is used in facial recognition technology to improve the scanning and analysis of faces in low light conditions.
N/O N/O stands for Normally Open. It refers to one of the two states of switches, sensors, or relays contacts in an electronic system. The other is Normally Closed (N/C). An N/O contact remains open until a certain condition is filled, at which point it is triggered to close.
Networked Access Control Networked access control (also known as online access control) is a method of access control where the database of users is stored in a central location, either in a LAN or in the cloud via internet connection. It is generally suited to larger sites with more doors, more areas, and more users to control.

 

O

 

Occupancy Management Occupancy management, also known as capacity management, is a security measure which controls the number of people allowed within a defined area at any given time. Access control systems count people into and out of an area, and automatically lock the doors when the pre-set capacity has been reached, preventing any more people from entering the area.
Offline Access Control Offline access control (also known as standalone access control) is a basic system generally designed for smaller premises with fewer users. Doors cannot be centrally controlled and user databases are stored at each door individually. This method does not require a connection to a central network or the internet.
Online Access Control Online access control (also known as networked access control) is a method of access control where the database of users is stored in a central location, either in a LAN or in the cloud via internet connection. It is generally suited to larger sites with more doors, more areas, and more users to control.
Open Cycle In door automation, one open cycle refers to the entire process of the door being triggered to open, opening to full extension, and then closing and returning to its dormant position.
Open Format Open format refers to files which have a specification that is openly published for anyone to use. A file in an open format can be opened by multiple applications, unlike proprietary formats which must be opened by the specific application it is designed for.
Optical Sensor Often found in fingerprint readers, optical sensors use light sources and an image sensor to analyse fingerprints.
OSDP OSDP stands for Open Supervised Device Protocol. It refers to an access control communications standard that is designed to improve intercompatibility in security electronics.

 

P

 

Parameter A parameter is an adjustable factor that is set within a system to define certain conditions of its operation.
Parity Bit A parity bit or check bit is a bit added to a string of binary code for the purposes of detecting errors and validating data integrity. The value of the parity bit is assigned 0 or 1 depending on the number of 1s in the string. The most common type of parity requires the number of 1s in the string to be an even number – if the number is already even, the parity bit is set to 0; if it is odd, the parity bit is set to 1 to make the total even. There is another type of parity which requires the number of 1s to be odd, but this is much less common.
Passive Proximity Passive proximity is a type of wireless communication technology commonly used in access control. This is the most widely used method for interaction between card/fob credentials and readers, in contrast to active proximity. In passive proximity, communication is powered by radio frequency signals from the reader. When the credential is held within the range of those signals, it transmits its unique identifying number to the reader for verification. Passive proximity generally has a shorter read range than active proximity.
Physical Access Control Physical access control limits and/or regulates the entry and exit of individuals into and out of a physical building or area. This is in opposition to virtual or logical access control which restricts access to data, files, and computer systems.
PIN PIN stands for Personal Identification Number. It is most frequently used to refer to the 4-digit code that validates credit or debit card payments, but can also refer to any other numerical code, such as for an access control keypad.
PoE PoE stands for Power over Ethernet. It refers to a method of carrying and moving electrical power through ethernet cables. PoE reduces the cabling requirements for an installation, as only one cable is required for carrying both power and data.
PRNG PRNG stands for Pseudo-Random Number Generator. PRNG is an algorithm which generates a sequence of numbers which simulate random number generation. It is not a truly random sequence because a PRNG starts with a seed value, from which the rest of the sequence is generated. In access control, PRNGs are used in KeeLoq® rolling code.
Protocol A protocol is an official procedure or system that defines rules and regulations for how something is done. In technology and networks, a protocol defines how data is formatted and transmitted between different components to ensure compatibility.
Proximity In access control, proximity refers to a wireless technology that allows devices to communicate and interact with one another simply by being close to one another. When cards or fob credentials are held close to a reader, proximity technology allows the credential to be identified and verified. There are two main types of proximity credentials: active and passive.
PSU PSU stands for Power Supply Unit. It refers to a component of electronic systems which convert power from alternating current into direct current. They also regulate the DC output voltage in order to ensure it matches the tolerance of the other components in the system.
PVC PVC stands for polyvinyl chloride. It is the third-most widely produced synthetic plastic polymer in the world and is used in a huge range of manufacturing processes for different products.

 

R

 

RAL RAL refers to an international colour matching standard. It originated in Germany in the 1920s and is now commonly used for varnish and powder coating colour matching. RAL stands for Reichs-Ausschuß für Lieferbedingungen (National Committee for Delivery and Quality Assurance).
RBAC RBAC stands for Role-Based Access Control. It refers to a system of access control which is based on a person’s job role within a company. User rights and permissions are assigned to roles rather than individuals. The sets of user rights that are created for different roles are commonly known as access levels.
Read Range Read range is the minimum and maximum distance from a reader that a credential will be detected and identified. Outside of the read range, the credential will not be picked up. Many access control products have customisable read ranges that can be manually adjusted to meet the needs of the system or site.
Receiver In radio transmission communications, the receiver is the component which receives radio waves and converts them to a format that can be utilised by the system.
Relay In electronics, a relay refers to a switch operated by electrical current. They open and close circuits based on electrical signals sent from other sources.
Remote Access Remote access refers to a system that can be entered and managed without the user having to be physically located in the same place as the system. For example, a security administrator could log into an access control system at a second site while being sat at their desk at their usual site.
Remote Electronics Remote electronics refers to devices which have their internal electronics housed separately to the external casing of the device. The electronics are generally housed on the secure side of the door and cannot be accessed from the unsecure side. The main benefit of remote electronics is that intruders who vandalise or tamper with the external product cannot then gain entry.
Retrofit Retrofitting refers to the process of adding a component or accessory to something that didn’t have it when it was originally built or manufactured.
Revolving Door A revolving door is a type of entrance secured by multiple partitions attached to a central axis, which turn in a circular motion to allow users access.
RF RF stands for Radio Frequency. It refers to the rate of oscillation of electro-magnetic radio waves between 3kHz and 300GHz. This band of frequency is used for transmitting communications signals and broadcasting radio channels. In access control, radio frequency is often used for wireless communication to unlock and open doors and gates.
RFID RFID stands for Radio Frequency Identification. This is a wireless communication technology that uses radio waves and electro-magnetic fields to identify objects with embedded RFID chips. In access control, this is the main technology that allows readers to identify credentials.
Rolling Code Rolling code, also known as hopping code, is a security technology used with radio frequency transmission. Every time a signal is passed between a transmitter and the receiver, the code used to grant access changes. This is a more secure technology than a fixed code system, because a code cannot be used more than once, and if intercepted, can no longer be used to gain access.
RS485 RS485 is an industrial standard for serial communication. It sets out the physical electrical interface which facilitates communication between devices. As an advancement from its predecessor (RS232), RS485 supports multiple devices on the same bus instead of just device-to-device, and allows for long wiring distances.

 

S

 

SAA SAA stands for Satin Anodised Aluminium. SAA is a finish style on some aluminium products. It is created by applying an anodic treatment to the surface of the metal. The coating increases the product’s resistance to abrasion and corrosion.
SDK SDK stands for Software Development Kit. An SDK consists of a set of tools created and provided by the manufacturer of a platform or system in order for third parties to use in developing applications or integrations for use with that platform or system.
Seed Code In a pseudo-random number generator (PRNG), the seed code or seed value is the starting value from which the rest of the sequence is generated according to the algorithm in use.
Self-Contained Electronic devices which are described as self-contained house all the electronics and components of the device within the body of the product. The alternative is remote electronics.
Shadow Card A shadow card is a method of twinning physical access credential cards to make administration of the system simpler. If a user’s usual card is lost, stolen, or not returned, the credential can be easily removed from the system using the corresponding shadow card.
Shearlock A shearlock or shear lock is a type of electric lock which adds to the security of a standard magnetic lock with pins or bolts which protrude into the armature plate. The pins add a physical locking method to the electro-magnet, so that if power to the magnet fails for whatever reason, the pins remain in place and keep the door secure.
Slave In access control, a slave refers to a subsidiary or subordinate component of the system that has its parameters or characteristics defined by the master component. The actions of the master component control and initiate commands for the slave components to follow.
Sliding Door Sliding doors are those that open and close by sliding laterally along a track or groove to block or free the door opening.
Software Software refers to the programs, apps, and systems used by a computer.
Solenoid Bolt A solenoid bolt is a type of electric lock. The locking mechanism is activated by an electro-mechanically operated bolt that is thrown into the armature plate to hold the door securely shut. Solenoid bolts can be either fail safe or fail secure.
Spoof Detection Spoof detection is a security measure designed to identify and reject attacks from intruders attempting to simulate legitimate entry. In access control, this can refer to, amongst other things, biometric fingerprint readers which reject ‘fake fingers’ presented to the readers.
Standalone Access Control Standalone access control (also known as offline access control) is a basic system generally designed for smaller premises with fewer users. Doors cannot be centrally controlled and user databases are stored at each door individually. This method does not require a connection to a central network or the internet.
Star Configuration In electronics and wiring, a star configuration or star network refers to a network where all communication between two components must pass through a central point, hub, or controller.
Surface Mount A surface mounted device is one which is installed and fixed on top of the wall or surface, so that the body of the device protrudes. The alternative is flush mounting, where products are set back into the wall, leaving a continuous flat surface at the installation site.
Swing Door A swing door is a type of door fixed to the door frame with hinges alone one side.
Swiching Power Switching power is also known as a switched-mode power supply. It refers to an electronic power supply (PSU) which utilises a switching regulator to maximise the efficiency with which electrical power is converted. Switched-mode power supplies benefit from low heat generation and wide output range, while delivering typically 60-70% better efficiency.

 

T

 

Tailgating Tailgating in access control refers to the process of an authorised person gaining access to a restricted area, and then another person following them into the restricted area while the door remains unlocked following the validation of the first person’s credentials. Tailgating is problematic for security systems for two reasons: firstly it allows potentially unauthorised individuals to gain access to restricted areas, and secondly it undercuts the accuracy of reporting and visibility within the system.
Torx® Torx® is a trademarked type of screw developed in the 1960s by Camcar Textron. Its characteristic feature is a six-point pattern in the drive, shaped like a star. Because of the unusual nature of the drive shape, Torx® screws are often used for tamper- or vandal-resistant installations.
Touchless / Touch-Free Touchless access control, also known as contactless or contact-free, is designed to reduce or eliminate physical contact between human users and the products or components making up the system.
Trailing Parity Bit A parity bit or check bit is a bit added to a string of binary code for the purposes of detecting errors and validating data integrity. The value of the parity bit is assigned 0 or 1 depending on the number of 1s in the string. The most common type of parity requires the number of 1s in the string to be an even number – if the number is already even, the parity bit is set to 0; if it is odd, the parity bit is set to 1 to make the total even. There is another type of parity which requires the number of 1s to be odd, but this is much less common. The trailing parity bit appears at the end of the binary string.
Transmitter In radio transmission communications, the transmitter is the component that converts the message being sent into radio waves and then emits them, to be picked up by the corresponding receiver.
Triple Pole In an electrical switch, a pole refers to a circuit that the switch can control. A triple-pole switch can control three separate circuits, using the same switch.

 

W

 

Wiegand Wiegand is a wiring standard that is commonly used in access control systems to facilitate communication between the reader and the controller. There are many variations of the Wiegand protocol, the most common being the 26-bit format. The 26 bits refer to the way the binary code chunks are organised as they are transmitted through the system.

 

Z

 

Zamak® Zamak is a trademarked family of alloy metals. The base metal is zinc, with aluminium, magnesium, and copper alloys. Zamak alloys were developed in the 1920s and are known for their resistance to wear and corrosion, the ability to cast to high-precision specifications, and a lower overall cost than many other alloys. Zamak can also be recycled and is made in a production cycle with a relatively low environmental impact.
Man using a laptop zoomed in on his hands on the keyboard

Non riesci a trovare quello che stai cercando?

Non hai trovato quello che ti serve? Puoi contattarci telefonicamente, via email o lasciando un messaggio sul sito. Restiamo in attesa della vostra richiesta.