Access Control System Glossary

Access Card - access control card. Similar to a credit card, it has coded data. Card types include magnetic cards, Wiegand cards, and proximity cards.

Access Control - Access Control. Allows the right person at the right access point at the right time, based on 1) permission recognition 2) identification 3) password recognition.

Access group - access control group. A group of people have the same access rights. In the relevant access points and time periods, the access control group defines the access permissions for each group, and all members of an access control group have the same access rights.

Access Level - access level, the access level allowed for cardholders.

Access Privileges - The right to access personnel, who can access when and where.

Anti_Passback (AP- Anti-Passback) is used to prevent a person from entering a zone and passing the card to the next person to enter; that is, to prevent two people from entering the same access point without going out. This function needs to be at the access point. A reader is installed at the entrance and exit, and if the cardholder tries to pass through the same entrance twice, an anti-report violation will occur.

The Archive-PC stores the file of the previous upload event. System users save and manage all events recorded by the system.

Arm Stay- stay armed. PassPoint's Anti-Theft Subsystem feature. In the stay mode, the meaning is to stay in the defense zone and activate the peripheral and 24-hour mode zone sensing devices. If an invasion occurs, a corresponding alarm will be generated.

Biometrics-identification device. Such as fingerprint recognition, means recognition, voice recognition, retina recognition.

Bypass (access point) - Bypass. If the access point is set to the bypass state, the door lock is forced to open, and access control is often referred to as "free access." No timeout alarms, etc. will be generated at this time.

Bypass (zone) - Zone bypass. In this state, zone alarms do not occur and are usually used to set the internal zone equipment to bypass (eg corridor passage during the day).

Card reader - reader. A device that identifies the identity of the cardholder. Identify the identity of the cardholder to determine if there is permission to enter or leave the zone. In some cases it may also be the keyboard that requires the user to enter a PIN number. In a highly secure location, a keyboard is also provided on the card reader.

Cardholder - Cardholder. Have a card or a PIN number with certain access permissions.

Committed Resource - Independent hardware resources such as card readers, relays, etc. Can only be used as a part of the access control point and cannot work independently.

CPM (Computer Port Model) - Computer Interface Module. CPM as a registration station cannot be configured at the access point.

Day Template-date template. It is used to define the time period for the corresponding daily action, and the editable action start time and end time in the time window.

DCM (Door Control Model) - The access control module provides control of the input and output of one or two access points. Only one access point can be controlled during back propagation.

Deny override - super release. This feature allows everyone to have access to various access points for system commissioning.

Disarm- disarms. PassPoint Anti-Theft Subsystem feature, so that the zone does not generate an alarm. Outgoing and disarming cancels internal, external and 24-hour zone alarm functions; leaving and disarming only cancels peripheral and 24-hour zone alarm functions.

Door Control Hardware - Door Control Equipment. The equipment installed at the access point controls the personnel in and out. It can be a card reader, a keyboard or a combination thereof.

Door Control Relay - gated relay for controlling electronically controlled door locks.

Door Open Time - The time the door is allowed to open. If the door opens longer than this time, an alarm will be generated.

Door Strike - An electric lock mounted on the door that can lock or open the door.

DSM (Door Status Monitor) - A door status monitor that senses the state of the door (on or off).

Duress - reserved. If the cardholder is being held, enter the special code to notify the system.

Enrollment Reader - A dedicated reader for access control systems.

Entry/Exit Control - In/Out control. According to the direction of the access route, define the access permission of the access control group to a specific area.

Entry Reader - entry reader, the control channel access card reader can also be a keyboard or a combination of them.

EOLR supervision (End of Line Resistor Supervision) - EOLR monitoring equipment to detect line faults in which the cable is short-circuited or disconnected.

Event/Action Relationship - Definition of event linkage. The user can program and initiate a corresponding action when a specific system event occurs.

Event Browser - event browser. All upload events are displayed on the screen in chronological order.

Event Log (or History Log) - Event Log (history log). Including the time, location and other information of the incident.

Executive Privileges - Execute permissions. Access to the system's highest access authority.

Exit Only - configures the access point mode. Only outgoing requests are accepted in this mode and access is not allowed.

Exit Reader- exit card reader, which can be a keyboard or a combination thereof.

Facility Code-factory code. Public password for entering and exiting the entrance. Using this mode will reduce the security of the access area.

Fail Safe - Power Failure Safe Mode: The door lock device automatically turns on after power failure.

Fail Secure - Power-fail safe mode: After power off, the door lock device automatically locks.

Force Arm Away - Forced Away Arming. By default, this function is bypassed.

Force Arm Stay- Forced Stay Arming, By default, this feature is bypassed.

Forgive (Entry/Exit, Anti-Pass back) - Allows the cardholder to enter or exit in the event of a back-propaganda or anti-pass violation.

Form (Relay Output) - Relay output, including a common terminal, a normally open terminal, a normally closed terminal. When there is no trigger, the common terminal is short-circuited to the normally closed terminal, and the common terminal is open to the normally open terminal. After the trigger, the common terminal is open to the normally closed terminal and short-circuited to the normally open terminal.

Free Access - See Bypass Access Point.

Hard Anti-Pass back - Hard anti-pass back method: If the cardholder violates anti-propaganda rules, he will be prohibited from entering or exiting.

Holiday - The definition of holiday in the timetable, different from the working day.

Keypad-keypad, typically 12 keys.

Locked (Access Point) - The locked mode of the access point, prohibiting any access activities.

Magnetic Strip-magnetic card. A black or composite magnetic stripe on a credit card or access card records certain data.

Mag Lock (Magnetic Lock) - magnetic lock. When power is applied, the coil generates magnetic force to lock the door; when it is not charged, the magnetic field disappears and the door opens.

MLB (Main Logic Board) - Main Logic Board. The main control part of the access control system. Memory card data, event logs, system configuration information, and system status information are supplied by the access control power supply and communicate with the DOC module to determine whether cardholders are allowed to enter the access point. MLB can be connected to other system modules, such as QRM or ZIM modules.

Modem-modem. Convert digital signals to analog signals and communicate remotely over telephone lines.

Name Pool-name collection. Can be given relays, card readers and so on. Up to 60 names can be accommodated, each up to 5 characters long.

Output - Slave peripherals for access control systems. Such as electronically controlled locks, sounders, indicators, etc. These include relay outputs or transistor outputs.

PIN-personal identification number. Through the keyboard input, the access control system recognizes one way of entering and leaving personnel.

PIN Retry Lockout - After several consecutive incorrect PIN entries, the keyboard is locked to prevent the intruder from attempting to unlock the PIN. Keyboard lock events are recorded in the system.

PIR (Passive Infra Red-) - active infrared detector. The mobile object can be detected in a specific area. The detector is connected to the RTE device of the access control system and is used to identify the outbound request of the personnel in the area.

Power Supply - Access Control Power Supply. It is used to power the MLS and DCM modules. The power input is connected to the 18VAC, 50VA output of the plug-in power transformer. The power supply provides backup battery/charger interface and supports 7AH battery. In addition, monitor the AC power input and battery condition. The monitoring results are provided for each module and MLB.

Pre-Alarm Trigger Timer - The alarm trigger time, the prompt time before the open timeout alarm, and after the door closes, it will release itself.

Precedence level-priority. The priority level of action in the system.

Protected-protected, a mode of operation of the access point. The access point is in the protected mode, and can only enter or leave with a valid card.

Proximity-sensing. Card readers communicate with the card via wireless sensors.

QRM (Quad Relay Module) - four relay module. Four relay outputs and four trigger outputs are available.

RCM (Reduced Capability Mode) - Safe Operation Mode. When the DEM module is disconnected from other components of the system, the DCM goes into this mode of operation and runs offline.

Reader-reader. Identify equipment that enters or exits as a person. Read the card data and send it to the controller to determine the corresponding action after reading the card.

Relay Supervision-C relay common, can monitor the voltage conditions, such as the detection of no voltage, it will send an alarm, can be used for external power (such as lock power supply) power-down detection.

RTE (Request To Exit)-outgoing request device. Such as buttons, impact belts, infrared detectors, switchboards and other equipment, you can identify people need to leave the zone, do not need to swipe, the system opens the door to let people go out.

Schedule- schedule. The schedule for the occurrence or stop of an event or action consists of a date template.

Shunt (Access Point) - The DSM module on the screen access point. This function can be used when the system hardware fails, such as a connection failure at the access point.

Shunt (Zone) - Shield zone. Basically the same function as the bypass zone. After the zone is bypassed, the zone status will be transmitted, but no alarm will be generated. After the zone is shielded, the zone status will not be detected and used for hardware failure.

Skeleton Code (or Skeleton Card) - Security code (or security card). Used to open the door lock in the (RCM) safe operation mode. If the DCM communication fails, the security code or the security card is no longer valid after exiting the RCM mode.

Soft Anti-Passback - Moderate anti-back-propagation. When there is a back-propagation, the cardholder is still allowed to enter and exit, but the system will record the corresponding event.

Soft Entry/Exit-moderate entry/exit control. If the cardholder does not have access rights, the cardholder is allowed to enter or exit, but the system will record the corresponding event.

Supervision-Fault monitoring equipment, generally monitored by voltage or resistance (see EOLR monitoring and relay monitoring).

Threat Level - System threat level, divided into six levels: TL0-TL5.TL5 is the highest threat level, this parameter is set for each action, if the threat level of action is higher than the system threat level. This action cannot happen.

Transaction - The incident of the access control system has a record in the database.

Transient Suppression - Instant Suppressor. Prevent damage to sensitive electrical components and suppress transient currents.

Trigger Output - Trigger output. Solid-state digital switch output for driving LEDs, sounders, external relays, or signalling to wireless transmitters.

Trouble-line fault (cable or connection)

User (System) - System user. Divided into four categories: Installer, Holder, Administrator, Operator.

User Code: The user ID entered in the system.

Visual Verification - Visual recognition. After cardholders swipe or enter a PIN code. The operator also needs to visually recognize the identification, which is an optional feature.

Watchdog Timer - The system internal watchdog timer allows the system to automatically reset in case of a crash.

Wiegand Wiegand card reader, the method of reading Wiegand card data.

Windows (Time) - Used to define the time window for each time period in the date template.

XX Minutes Timer - preset minute timer. Output relay power-on time.

YY Seconds Timer - Preset seconds timer. Output relay power-on time.

Zone - Area or object protected by a circuit.