AC |
AC stands for Alternating Current. It refers to a type of electric current that reverses its direction periodically on a continuous basis. AC is commonly used for power supplies. The other type of current is Direct Current (DC). |
Access Control |
Access control is a security measure that limits who can enter certain areas. Access control can be physical (regulating entry in the built environment with controlled doors, locks, gates, and other barriers) or logical (regulating access to networks, files, or data in a computer system). |
Access Event |
An access event refers to the occurrence of a particular action within an access control system. There can be dozens of different defined event types within systems. Examples of access events include Access Granted, Access Denied, Door Open Too Long, and Door Forced Open. |
Access Levels |
Access levels are sets of user permissions that determine which areas within a building users can enter. They generally refer to areas larger than a single door or room, and permissions are granted based on larger groups of users with similar access requirements. |
Activation Distance |
The activation distance of an access control reader refers to the maximum distance away from the reader that a credential can be detected and scanned. If a credential is presented within that distance, it will be detected. If a credential is presented further away, it will not be detected. |
Active Proximity |
Active proximity is a type of wireless communication technology used in access control for interaction between card/fob credentials and readers. Active credentials are powered by an internal lithium battery onboard the card/fob. This generally gives active cards a greater read range than the alternative passive proximity credentials. The onboard battery in active cards runs down over time, and will need to be replaced. |
AES |
AES stands for Advanced Encryption Standard. This is a type of cypher (a method of transforming a message to conceal its meaning) that protects the transfer of data through the internet. Since being selected by the US government as its preferred method, AES has become the industry standard for encryption. |
Algorithm |
An algorithm is a fixed set of rules or processes that is used to solve a mathematical problem or calculation. In access control, an algorithm is used to encrypt data passed between components in systems utilising AES encryption. |
ANPR |
ANPR stands for Automatic Number Plate Recognition. It refers to systems which utilise cameras to identify and read car registration plates for access control, payment, or identification purposes. |
ANSI Strike |
ANSI stands for American National Standards Institute. Strikes which conform to these standards are slightly different to those which conform to EURO standards. |
Anti-Passback |
Anti-passback is a security feature built into some access control systems that helps to prevent users from sharing their credentials with others. It can also stop individuals from tailgating and following another user into a secure area. |
Area |
In access control, an area is a defined zone to which users are granted or denied access. Some access control systems determine access rights based on individual doors. Meanwhile, ATRIUM determines access rights based on areas which are delimited by doors. An area (room) can have multiple access points (doors). In ATRIUM, all those doors are automatically given the same settings and permissions because they give access to the same area. |
Armature Plate |
An armature plate, also known as a keeper plate, is a component of an electro-magnetic lock. Generally, the magnet itself is fitted to the door frame, while the armature plate is fitted to the door. When power is applied to the magnet, a strong attraction is generated between the magnet and the armature plate, and the door is held locked. |
Authentication Key |
In data encryption, an authentication key is used to authenticate the data according to the encryption standard that has been used to conceal the it. The authentication key allows the component receiving data to verify that the component sending data is valid, safe, and authorised to do so. |