logo
Contact us Contact us

1   A   B   C   D   E   F   G   H   I   J   K   L   M
N   O   P   Q   R   S   T   U   V   W   X   Y   Z

 

1

 

1:N Matching A term generally used in reference to biometric access control as a method of matching the person presented to the reader with the database. In 1:N matching, the reader does not know who it is supposed to be identifying and authenticating. When the person presents to the reader, their biometric information must be scanned and compared to all of the existing database to find and verify a match.
125kHz Proximity 125kHz proximity is an older technology used for communication between access control credentials and readers. It has been popular in the security industry since 1990, and consists of a physical RFID chip embedded into access credentials. When a 125kHz proximity card is presented to a reader, the RFID chip enters the electromagnetic field that is given out by the reader. When the chip’s antenna is excited by this electromagnetic field, it responds by sending a signal to the reader to identify the credential.
26-Bit This refers to the most common variant of the Wiegand protocol, which is now very widely used in access control systems. The 26 bits describe the way the binary code that is transferred through the system is organised. More about Wiegand

 

A

 

AC AC stands for Alternating Current. It refers to a type of electric current that reverses its direction periodically on a continuous basis. AC is commonly used for power supplies. The other type of current is Direct Current (DC).
Access Control Access control is a security measure that limits who can enter certain areas. Access control can be physical (regulating entry in the built environment with controlled doors, locks, gates, and other barriers) or logical (regulating access to networks, files, or data in a computer system).
Access Event An access event refers to the occurrence of a particular action within an access control system. There can be dozens of different defined event types within systems. Examples of access events include Access Granted, Access Denied, Door Open Too Long, and Door Forced Open.
Access Levels Access levels are sets of user permissions that determine which areas within a building users can enter. They generally refer to areas larger than a single door or room, and permissions are granted based on larger groups of users with similar access requirements.
Activation Distance The activation distance of an access control reader refers to the maximum distance away from the reader that a credential can be detected and scanned. If a credential is presented within that distance, it will be detected. If a credential is presented further away, it will not be detected.
Active Proximity Active proximity is a type of wireless communication technology used in access control for interaction between card/fob credentials and readers. Active credentials are powered by an internal lithium battery onboard the card/fob. This generally gives active cards a greater read range than the alternative passive proximity credentials. The onboard battery in active cards runs down over time, and will need to be replaced.
AES AES stands for Advanced Encryption Standard. This is a type of cypher (a method of transforming a message to conceal its meaning) that protects the transfer of data through the internet. Since being selected by the US government as its preferred method, AES has become the industry standard for encryption. More about AES encryption
Algorithm An algorithm is a fixed set of rules or processes that is used to solve a mathematical problem or calculation. In access control, an algorithm is used to encrypt data passed between components in systems utilising AES encryption.
ANPR ANPR stands for Automatic Number Plate Recognition. It refers to systems which utilise cameras to identify and read car registration plates for access control, payment, or identification purposes. ANPR for ATRIUM
ANSI Strike ANSI stands for American National Standards Institute. Strikes which conform to these standards are slightly different to those which conform to EURO standards.
Anti-Passback Anti-passback is a security feature built into some access control systems that helps to prevent users from sharing their credentials with others. It can also stop individuals from tailgating and following another user into a secure area.
Area In access control, an area is a defined zone to which users are granted or denied access. Some access control systems determine access rights based on individual doors. Meanwhile, ATRIUM determines access rights based on areas which are delimited by doors. An area (room) can have multiple access points (doors). In ATRIUM, all those doors are automatically given the same settings and permissions because they give access to the same area.
Armature Plate An armature plate, also known as a keeper plate, is a component of an electro-magnetic lock. Generally, the magnet itself is fitted to the door frame, while the armature plate is fitted to the door. When power is applied to the magnet, a strong attraction is generated between the magnet and the armature plate, and the door is held locked.
Authentication Authentication is one of the three key steps in access control validation: identification, authentication, and authorisation. Identification establishes which user is attempting to gain access. Authentication is the process of ensuring that they are who they say they are. Authorisation is checking that they have permission to enter.
Authentication Key In data encryption, an authentication key is used to authenticate the data according to the encryption standard that has been used to conceal the it. The authentication key allows the component receiving data to verify that the component sending data is valid, safe, and authorised to do so.

 

B

 

Back-EMF Back Electro-Motive Force, also known as counter-electro-motive force, refers to the voltage that is generated when an electric motor spins. This force pushes against the current which causes the motor to spin, and reduces the voltage of the current flowing through the motor’s coils.
Balanced Door A balanced door is a type of swing door that is held open or held closed by weights. They are particularly useful when the door leaf is particularly tall or heavy, as a balanced system makes it easier for people to push or pull a heavy door.
Binary Code Binary is a system of coding that uses only the digits 1 and 0 to represent data.
Bit-Rate The bit-rate of a network or system refers to the number of bits (items of data) that can be transmitted or encoded in a certain period of time.
Bluetooth® Bluetooth is a trademarked short-range wireless technology that allows the transfer of data between mobile phones, computers, and other electronic devices.
Breakglass A breakglass is a type of emergency exit trigger device. It is comprised of a small pane of glass which, when broken, triggers the emergency exit. Once broken, the glass must be replaced before it can be used again.

 

C

 

Capacitive Sensor Often found in fingerprint readers, capacitive sensors employ an array of pixels to scan fingerprints and identify tiny variations in the electric charges that are present in the fingerprint’s ridges.
Capacity Management Capacity management, also known as occupancy management, is a security measure which controls the number of people allowed within a defined area at any given time. Access control systems count people into and out of an area, and automatically lock the doors when the pre-set capacity has been reached, preventing any more people from entering the area.
Card Cloning In access control, card cloning refers to the process of individuals intercepting signals from RFID access cards and copying them, usually for malicious purposes. Low-frequency access cards and those without built-in security or encryption are most at risk from cloning.
CC In locking, CC stands for continuous current or constant current. This is a type of direct current (DC) that does not change intensity over time. It allows systems to maintain the same voltage level regardless of variations in current.
Centralised In access control, a centralised system stores all the user data and parameter settings in one central location, rather than at each individual access point. Centralised systems are generally installed on larger sites with larger numbers of doors and users to manage.
Changeover Contact A changeover contact is the part of a relay where normally open (N/O) contacts touch to make or break contact. Relays can contain multiple changeover contacts.
Check Bit A check bit or parity bit is a bit added to a string of binary code for the purposes of detecting errors and validating data integrity. The value of the check bit is assigned 0 or 1 depending on the number of 1s in the string. The most common type of check requires the number of 1s in the string to be an even number – if the number is already even, the check bit is set to 0; if it is odd, the check bit is set to 1 to make the total even. There is another type of check which requires the number of 1s to be odd, but this is much less common.
Contactless Contactless access control, also known as touchless, touch-free, and contact-free, is designed to reduce or eliminate physical contact between human users and the products or components making up the system. More about touchless systems
Counter-Electro-Motive Force Counter-Electro-Motive Force, commonly known as Back-EMF, refers to the voltage that is generated when an electric motor spins. This force pushes against the current which causes the motor to spin, and reduces the voltage of the current flowing through the motor’s coils.
Credentials In an access control system, a credential is the thing used to authenticate the person who wishes to gain entry to a door or barrier. There are many different types of credentials, ranging from plastic access cards to fingerprint data, a PIN code, or mobile phone signals. Generally a credential is either something you know (password or code), something you have (card or tag), or something you are (fingerprint or iris patterns).
Cypher A cypher (or cipher) is a method of transforming a message in order to conceal the message and hide its meaning. In access control, AES encryption is a type of cypher commonly used to protect the transfer of data through the internet.

 

D

 

DAC Discretionary Access Control. One of the three core methods of access control, DAC is a user-based system which is best suited to small premises. The end user determines user permissions by manually and directly granting access to individuals. This might be by issuing them an access card or telling them a PIN code.
Daisy-Chain In electrical engineering, a daisy-chain is a method of wiring devices together where the components are connected either in a ring or in sequence. The name refers to the comparison with a number of daisy flowers tied together in a chain.
DC DC stands for Direct Current. It refers to electrical current that flows in one direction only. DC is commonly used in low-voltage electrical items. The other type of current is Alternating Current (AC).
DDA DDA refers to the Disability Discrimination Act 1995, a piece of legislation introduced by the government of the United Kingdom. The Act made it unlawful to discriminate against people in education, transport, workplaces, or services because of a disability. Although this specific Act has now been repealed and replaced by the Equality Act 2010, the term DDA is still commonly used.
Dead-Bolt A dead-bolt is a feature of some locking systems. It is comprised of a (usually metal) bolt which is moved manually with a key or handle in order to lock or unlock the door.
Decrypt Decryption is the process of converting a message that has been hidden through encryption back into its original, readable form.
Demodulation In radio transmission, demodulation is the process of converting the radio waves that have been sent by the transmitter back into a usable form.
Diax® Diax® is a trademarked brand of security screws designed to increase resistance to vandalism.
DIN A DIN rail is a standardised type of metal rail generally fixed to a wall on which electrical equipment can be mounted. DIN stands for Deutsches Institut für Normung, the German body which originally published the specifications for this type of rail. DIN rails have been widely standardised since the 1950s.
Door Station In audio or video intercom or door entry systems, the door station is the component located at the point of entry on the unsecured side of the door. This is where visitors approach and initialise a call to the monitor.
Double Action Lock A double action lock is one that can be used with doors that swing in both directions. These locks can both latch and be locked as normal.
Double Pole In an electrical switch, a pole refers to a circuit that the switch can control. A double-pole switch can control two separate circuits, using the same switch.

 

E

 

Egress Egress is the action of exiting or leaving a place or area.
Electric Lock An electric lock consists of a small motor which is activated by an electrical impulse. The electrical impulse powers moving parts such as a bolt to secure the door. Browse electric locks
Electric Strike An electric strike is a type of lock. They consist of a powered latch and a faceplate. When the strike is activated, either by the application or removal of power, the latch is released and the door can be opened. Strikes are cost-effective and durable locks. Browse electric strikes
Electro-Magnetic Lock An electro-magnetic lock (also known as a maglock) consists of an electro-magnet and an armature plate. When power is applied to the electro-magnet, a magnetic field is created and a powerful attraction is generated between the magnet and the armature plate. When power is removed, the magnetic field drops and the door can be opened. Maglocks are designed to be easy to install and offer both durability and longevity. Browse electro-magnetic locks
Encryption Encryption is the process of converting a message or other information into a code for the purposes of concealing it. The message is passed through a cypher in order to encrypt it. The code can only be decrypted when passed through the correct corresponding cypher.
End-to-End Encryption End-to-end encryption refers to systems which encrypt the transmission of data between all the components of the system. This level of encryption means that all points of data transfer in the system are strong and cannot be easily intercepted and deciphered.
Enrolment Enrolment is the process of registering new users into an access control system. There are many different methods of enrolment, including manual card registration at a reader, software-based enrolment in a centralised system, or remote enrolment using mobile access technology.
EURO Strike EURO strikes adhere to the international European standards for locking. Standards vary around the world, but in the UK, EURO strikes are the most common type. The other type that is common in the UK is ANSI strikes, which meet the American standard.

 

F

 

Faceplate When referring to locks, a faceplate is the part of a lock that is visible on the surface of the door edge. Typically, the lock mechanism is installed set back into the body of the door. When the lock is activated, the bolt or latch protrudes from the mechanism and through the faceplate into the lock keep in the door frame.
Faceprint A faceprint is a digital representation of the features of a person’s face, used for the purposes of facial recognition technology. A specialist camera scans the face and identifies its features, mapping them onto a digital template that can later be used to compare and match faces.
Facility Code A facility code appears in a string of binary code used to identify access credentials according to the Wiegand protocol. The binary codes which are transferred between components are split into different sections, one of which is common to all the credentials on the same site or system. This is the facility code.
Fail Safe Fail safe locks are unlocked when power is removed. Power must be applied to the lock in order to secure the door and prevent access.
Fail Secure Fail secure locks are locked when power is removed. When power is applied, the lock is released and the door is free to open.
Failover Failover is a reliability procedure built into systems to maintain normal operation when a fault or failure occurs. Failover usually consists of a duplicate system that can be activated when a problem is detected.
FAR FAR stands for False Acceptance Rate. This refers to unauthorised individuals gaining entry via an access control system by being wrongly accepted as authorised.
Fire Rated Fire ratings are standardised regulations that certify how well a product can withstand the effects of being exposed to fire. Also known as fire resistance, there are a huge number of different regulations in use, which apply to specific categories of product types. Some of the common fire regulations in access control and door automation
Fixed Code Fixed code is a term used in relation to radio frequency transmission. In fixed code systems, the code that is transferred from the transmitter to the receiver never changes. Fixed code is less secure than rolling code because if an attacker intercepted a fixed code signal, they could find the code and use it to gain entry to a premises.
Flashover In a fire, flashover refers to an advanced stage of the fire at which point everything in the room has ignited. Flashover is caused by the ignition of smoke or fumes from objects in the room, resulting in very sudden and rapid spread of fire through the air.
Flush Mount Flush mounting (also known as mortice mounting in reference to locks) is the installation of a product set back into the surface of a wall, so that the surface of the product is aligned with the wall. The opposite of flush mounting is surface mounting.
Folding Door A folding door is comprised of multiple sections or panels which fold together to open the door. They are also known as bifold doors (despite most having more than two panels) or concertina doors.
Frequency In radio transmission, frequency refers to how quickly or slowly a sine wave oscillates from top to bottom in one complete cycle. Frequency is measured in cycles per second, also known as Hertz. Frequency bands are used to pair transmitting and receiving devices to ensure that data is being sent from and to the right places.
FRR FRR stands for False Rejection Rate. This refers to authorised individuals being wrongly rejected by an access control system despite the fact that they are properly registered.

 

H

 

Hardware Hardware refers to the physical components of a system, as opposed to software which is a virtual computer programme. In access control, hardware includes the controllers, readers, receivers, wiring, and other physical products that comprise a system.
Hertz Hertz is another term for the measure of radio wave cycles per second. The time it takes for a radio wave to oscillate from the highest point of its peak to the lowest point of its trough defines its frequency. The number of complete cycles from top to bottom that are completed in one second gives the Hertz value.
Holding Force Holding force is a measure of the strength of a lock. Measured in kilograms or pounds, holding force indicates the amount of weight that would be required to break the lock.
Hopping Code Hopping code, also known as rolling code, is a security technology used with radio frequency transmission. Every time a signal is passed between a transmitter and the receiver, the code used to grant access changes. This is a more secure technology than a fixed code system, because a code cannot be used more than once, and if intercepted, can no longer be used to gain access. Browse transmission solutions

 

I

 

IK Rating IK ratings indicate protection against mechanical impact. The grade runs from 0 (minimum resistance) to 10 (maximum resistance). Each grade defines how many joules of impact the device can withstand when hit from a certain distance.
Infrared Infrared waves are a type of electro-magnetic radio waves. The wavelength of infrared waves is just beyond the visible red light spectrum, but smaller than microwaves. In access control, infrared technology is often used for automatic sensors and touch-free trigger buttons.
Ingress Ingress is the action of entering or going into a place or area.
Intercom An intercom is an electronic system that allows one or two-way communication utilising usually audio, but sometimes also video channels. They are commonly found in apartment buildings for residents to communicate with visitors.
Interlock In access control, an interlock is a system that makes the status of one door dependent on another. For example, in a clean room environment, a user would not be able to unlock and open a door to the inner area until the door to the external area was closed and locked.
IP IP stands for Internet Protocol. It refers to the rules and regulations that standardise the format of data that is sent or received over the internet.
IP Rating An IP rating is a measure of how well a product can resist liquid and solid particles entering the body of the product. It stands for ingress protection. The rating is a two-digit number. The first digit is measured from 0 to 6 and signifies the level of protection against solids. The second digit measures protection against liquids and ranges from 0 to 8.

 

K

 

KeeLoq® KeeLoq® is a proprietary block cypher that is one of the most commonly used encryption methods for radio frequency transmission.
Keeper Plate A keeper plate, also known as an armature plate, is a component of an electro-magnetic lock. Generally, the magnet itself is fitted to the door frame, while the keeper plate is fitted to the door. When power is applied to the magnet, a strong attraction is generated between the magnet and the keeper plate, and the door is held locked.

 

L

 

LAN LAN stands for Local Area Network. It refers to a network of computers, cables, and other related devices set up within a limited environment.
LCD LCD stands for Liquid Crystal Display. An LCD screen is a type of digital display that utilises liquid crystals to make up the elements of the display.
LED An LED is a Light Emitting Diode. It refers to a semiconductor device through which an electric current is passed in order to produce light. Light emitted by LEDs can be controlled in order to appear in different colours.
Legacy Legacy technology, systems, or applications are those which are outdated, but still in use. In a system upgrade, it is common for legacy equipment to be replaced by a more modern version.
Logical Access Control Logical access control is a type of access control that restricts the computer files, data, and systems that individuals can see and use. This type of access control consists of identification (knowing which user is attempting to gain access), authentication (ensuring they are who they say they are), and authorisation (checking they have permission).

 

M

 

MAC MAC stands for Mandatory Access Control. This is one of the three core types of access control. User settings, rights, and permissions can only be defined or changed by the system administrator. MAC is generally the highest security type of access control and is commonly used in military or government facilities where security clearance and classification are essential.
Master In access control, master refers to a lead or primary component of the system that defines certain parameters or characteristics for the subordinate slave components. The actions of the master component control and initiate commands for the slave components to follow.
Microwaves Microwaves are a type of invisible electro-magnetic wave which is shorter than a standard radio waves but longer than an infrared wave.
MIFARE® MIFARE® is a trademarked brand name referring to integrated circuit chips which are commonly used inside access credentials such as cards and tags. There are different variants of MIFARE® technology, generally differentiated based on the security level of the chips. More about MIFARE®
MIFARE® DESFire® MIFARE® is a trademarked brand name referring to integrated circuit chips which are commonly used inside access credentials such as cards and tags. There are different variants of MIFARE® technology, generally differentiated based on the security level of the chips. MIFARE® DESFire® is a higher security variant than MIFARE® Classic. There have been three evolutions of MIFARE® DESFire® so far: EV1, EV2, and EV3. More about MIFARE® DESFire®
Minutiae In biometrics, specifically fingerprint recognition, minutiae are the tiny features of a fingerprint that are used by the system to identify an individual.
Modulation In radio transmission communication, modulation is the process of converting the raw data being transmitted, such as a string of text or a voice recording, into radio waves.
Monitor In video intercom or door entry systems, the monitor is the internal component on the secure side of the system. Calls come into the monitor, where the person inside can answer them and choose to grant or deny access.
Monitored Monitoring refers to technology which allows certain products such as electro-magnetic locks to record and report their status to a central system. This allows security officers to see the live status of a lock and record the history of access events.
Mortice Mount Mortice (or mortise) refers to one of the two methods for mounting a lock onto a door. Mortice locks are mounted into the body of the door itself, meaning a pocket must be cut into the door in order to install the lock. The opposite is a surface mount lock.
MOV MOV stands for Metal Oxide Varistor. An MOV is a component that is included in some electronic devices in order to maintain a safe and consistent voltage level, even in an unusual power surge. By absorbing energy and dissipating it as heat, an MOV prevents damage to vulnerable system components.
MSI MSI stands for Multi Spectral Imaging. It refers to an advanced method of capturing images that ensures a very high level of detail. Multi-spectral imaging penetrates deeper into the surface of its subject than standard optical sensors, and creates clearer, cleaner, more accurate images.
Multi-Factor Authentication Multi-factor authentication or MFA is a method of validating identity in an access control system by requiring the user to submit more than one credential. For example, to gain access to a secure area, the user may have to enter the correct keypad code as well as present their fingerprint to a scanner. The more rounds of authentication in a system, generally the more secure it is.

 

N

 

N/C N/C stands for Normally Closed. It refers to one of the two states of switches, sensors, or relay contacts in an electronic system. The other is Normally Open (N/O). An N/C contact remains closed until a certain condition is filled, at which point it is triggered to open.
NFC NFC stands for Near Field Communication. It refers to a set of protocols for communication between two electronic devices over a distance of less than 4cm. In access control, NFC is useful for smartphone credentials.
NIR NIR stands for Near-Infrared Radiation. It refers to radiation bands in the infrared spectrum that are at the closest part of that spectrum to red visible light. In access control, NIR is used in facial recognition technology to improve the scanning and analysis of faces in low light conditions.
N/O N/O stands for Normally Open. It refers to one of the two states of switches, sensors, or relay contacts in an electronic system. The other is Normally Closed (N/C). An N/O contact remains open until a certain condition is filled, at which point it is triggered to close.
Networked Access Control Networked access control (also known as online access control) is a method of access control where the database of users is stored in a central location, either in a LAN or in the cloud via internet connection. It is generally suited to larger sites with more doors, more areas, and more users to control.

 

O

 

Occupancy Management Occupancy management, also known as capacity management, is a security measure which controls the number of people allowed within a defined area at any given time. Access control systems count people into and out of an area, and automatically lock the doors when the pre-set capacity has been reached, preventing any more people from entering the area.
Offline Access Control Offline access control (also known as standalone access control) is a basic system generally designed for smaller premises with fewer users. Doors cannot be centrally controlled and user databases are stored at each door individually. This method does not require a connection to a central network or the internet.
Online Access Control Online access control (also known as networked access control) is a method of access control where the database of users is stored in a central location, either in a LAN or in the cloud via internet connection. It is generally suited to larger sites with more doors, more areas, and more users to control.
Open Cycle In door automation, one open cycle refers to the entire process of the door being triggered to open, opening to full extension, and then closing and returning to its dormant position.
Open Format Open format refers to files which have a specification that is openly published for anyone to use. A file in an open format can be opened by multiple applications, unlike proprietary formats which must be opened by the specific application it is designed for.
Optical Sensor Often found in fingerprint readers, optical sensors use light sources and an image sensor to analyse fingerprints.
OSDP OSDP stands for Open Supervised Device Protocol. It refers to an access control communications standard that is designed to improve intercompatibility in security electronics.
Oscillate Oscillation is the action of moving back and forth between two points in a regular rhythm. In radio transmission, radio waves oscillate from their highest to their lowest point repeatedly as they travel through the air.

 

P

 

Parameter A parameter is an adjustable factor that is set within a system to define certain conditions of its operation.
Parity Bit A parity bit or check bit is a bit added to a string of binary code for the purposes of detecting errors and validating data integrity. The value of the parity bit is assigned 0 or 1 depending on the number of 1s in the string. The most common type of parity requires the number of 1s in the string to be an even number – if the number is already even, the parity bit is set to 0; if it is odd, the parity bit is set to 1 to make the total even. There is another type of parity which requires the number of 1s to be odd, but this is much less common.
Passive Proximity Passive proximity is a type of wireless communication technology commonly used in access control. This is the most widely used method for interaction between card/fob credentials and readers, in contrast to active proximity. In passive proximity, communication is powered by radio frequency signals from the reader. When the credential is held within the range of those signals, it transmits its unique identifying number to the reader for verification. Passive proximity generally has a shorter read range than active proximity.
Physical Access Control Physical access control limits and/or regulates the entry and exit of individuals into and out of a physical building or area. This is in opposition to virtual or logical access control which restricts access to data, files, and computer systems.
Physical Credentials Physical credentials are a type of access control credential where the microchip carrying ID data is contained within a physical item. The chip might be inside a swipe card, keyring fob, or wristband.
PIN PIN stands for Personal Identification Number. It is most frequently used to refer to the 4-digit code that validates credit or debit card payments, but can also refer to any other numerical code, such as for an access control keypad.
PoE PoE stands for Power over Ethernet. It refers to a method of carrying and moving electrical power through ethernet cables. PoE reduces the cabling requirements for an installation, as only one cable is required for carrying both power and data.
PRNG PRNG stands for Pseudo-Random Number Generator. PRNG is an algorithm which generates a sequence of numbers which simulate random number generation. It is not a truly random sequence because a PRNG starts with a seed value, from which the rest of the sequence is generated. In access control, PRNGs are used in KeeLoq® rolling code.
Protocol A protocol is an official procedure or system that defines rules and regulations for how something is done. In technology and networks, a protocol defines how data is formatted and transmitted between different components to ensure compatibility.
Proximity In access control, proximity refers to a wireless technology that allows devices to communicate and interact with one another simply by being close to one another. When cards or fob credentials are held close to a reader, proximity technology allows the credential to be identified and verified. There are two main types of proximity credentials: active and passive.
PSU PSU stands for Power Supply Unit. It refers to a component of electronic systems which convert power from alternating current into direct current. They also regulate the DC output voltage in order to ensure it matches the tolerance of the other components in the system.
PVC PVC stands for polyvinyl chloride. It is the third-most widely produced synthetic plastic polymer in the world and is used in a huge range of manufacturing processes for different products.

 

R

 

RAL RAL refers to an international colour matching standard. It originated in Germany in the 1920s and is now commonly used for varnish and powder coating colour matching. RAL stands for Reichs-Ausschuß für Lieferbedingungen (National Committee for Delivery and Quality Assurance).
Radio waves Radio waves are a type of electro-magnetic wave that transmit at frequencies lower than microwaves. They are generally used for long-distance wireless communication. In physical security, radio transmission solutions utilise radio waves for projects such as gate and door automation.
RBAC RBAC stands for Role-Based Access Control. It refers to a system of access control which is based on a person’s job role within a company. User rights and permissions are assigned to roles rather than individuals. The sets of user rights that are created for different roles are commonly known as access levels.
Read Range Read range is the minimum and maximum distance from a reader that a credential will be detected and identified. Outside of the read range, the credential will not be picked up. Many access control products have customisable read ranges that can be manually adjusted to meet the needs of the system or site.
Receiver In radio transmission communications, the receiver is the component which receives radio waves and converts them to a format that can be utilised by the system.
Relay In electronics, a relay refers to a switch operated by electrical current. They open and close circuits based on electrical signals sent from other sources.
Remote Access Remote access refers to a system that can be entered and managed without the user having to be physically located in the same place as the system. For example, a security administrator could log into an access control system at a second site while being sat at their desk at their usual site.
Remote Electronics Remote electronics refers to devices which have their internal electronics housed separately to the external casing of the device. The electronics are generally housed on the secure side of the door and cannot be accessed from the unsecure side. The main benefit of remote electronics is that intruders who vandalise or tamper with the external product cannot then gain entry.
Retrofit Retrofitting refers to the process of adding a component or accessory to something that didn’t have it when it was originally built or manufactured.
Revolving Door A revolving door is a type of entrance secured by multiple partitions attached to a central axis, which turn in a circular motion to allow users access.
RF RF stands for Radio Frequency. It refers to the rate of oscillation of electro-magnetic radio waves between 3kHz and 300GHz. This band of frequency is used for transmitting communications signals and broadcasting radio channels. In access control, radio frequency is often used for wireless communication to unlock and open doors and gates.
RFID RFID stands for Radio Frequency Identification. This is a wireless communication technology that uses radio waves and electro-magnetic fields to identify objects with embedded RFID chips. In access control, this is the main technology that allows readers to identify credentials.
Rolling Code Rolling code, also known as hopping code, is a security technology used with radio frequency transmission. Every time a signal is passed between a transmitter and the receiver, the code used to grant access changes. This is a more secure technology than a fixed code system, because a code cannot be used more than once, and if intercepted, can no longer be used to gain access.
RS485 RS485 is an industrial standard for serial communication. It sets out the physical electrical interface which facilitates communication between devices. As an advancement from its predecessor (RS232), RS485 supports multiple devices on the same bus instead of just device-to-device, and allows for long wiring distances.

 

S

 

SAA SAA stands for Satin Anodised Aluminium. SAA is a finish style on some aluminium products. It is created by applying an anodic treatment to the surface of the metal. The coating increases the product’s resistance to abrasion and corrosion.
SDK SDK stands for Software Development Kit. An SDK consists of a set of tools created and provided by the manufacturer of a platform or system in order for third parties to use in developing applications or integrations for use with that platform or system.
Seed Code In a pseudo-random number generator (PRNG), the seed code or seed value is the starting value from which the rest of the sequence is generated according to the algorithm in use.
Self-Contained Electronic devices which are described as self-contained house all the electronics and components of the device within the body of the product. The alternative is remote electronics.
Shadow Card A shadow card is a method of twinning physical access credential cards to make administration of the system simpler. If a user’s usual card is lost, stolen, or not returned, the credential can be easily removed from the system using the corresponding shadow card.
Shearlock A shearlock or shear lock is a type of electric lock which adds to the security of a standard magnetic lock with pins or bolts which protrude into the armature plate. The pins add a physical locking method to the electro-magnet, so that if power to the magnet fails for whatever reason, the pins remain in place and keep the door secure.
Slave In access control, a slave refers to a subsidiary or subordinate component of the system that has its parameters or characteristics defined by the master component. The actions of the master component control and initiate commands for the slave components to follow.
Sliding Door Sliding doors are those that open and close by sliding laterally along a track or groove to block or free the door opening.
Smart Card A smart card is a type of access control credential that contains an integrated circuit chip. In comparison to older proximity credentials, smart cards can store multiple types and formats of data.
Software Software refers to the programs, apps, and systems used by a computer.
Solenoid Bolt A solenoid bolt is a type of electric lock. The locking mechanism is activated by an electro-mechanically operated bolt that is thrown into the armature plate to hold the door securely shut. Solenoid bolts can be either fail safe or fail secure.
Spoof Detection Spoof detection is a security measure designed to identify and reject attacks from intruders attempting to simulate legitimate entry. In access control, this can refer to, amongst other things, biometric fingerprint readers which reject ‘fake fingers’ presented to the readers.
Standalone Access Control Standalone access control (also known as offline access control) is a basic system generally designed for smaller premises with fewer users. Doors cannot be centrally controlled and user databases are stored at each door individually. This method does not require a connection to a central network or the internet.
Star Configuration In electronics and wiring, a star configuration or star network refers to a network where all communication between two components must pass through a central point, hub, or controller.
Supercomputer A supercomputer is a computer with a much higher performance and operation level than a standard computer. They are often used to perform computational tasks that require massive databases or very large quantities of calculations or computations.
Surface Mount A surface mounted device is one which is installed and fixed on top of the wall or surface, so that the body of the device protrudes. The alternative is flush mounting, where products are set back into the wall, leaving a continuous flat surface at the installation site.
Swing Door A swing door is a type of door fixed to the door frame with hinges alone one side.
Switching Power Switching power is also known as a switched-mode power supply. It refers to an electronic power supply (PSU) which utilises a switching regulator to maximise the efficiency with which electrical power is converted. Switched-mode power supplies benefit from low heat generation and wide output range, while delivering typically 60-70% better efficiency.

 

T

 

Tailgating Tailgating in access control refers to the process of an authorised person gaining access to a restricted area, and then another person following them into the restricted area while the door remains unlocked following the validation of the first person’s credentials. Tailgating is problematic for security systems for two reasons: firstly it allows potentially unauthorised individuals to gain access to restricted areas, and secondly it undercuts the accuracy of reporting and visibility within the system.
Torx® Torx® is a trademarked type of screw developed in the 1960s by Camcar Textron. Its characteristic feature is a six-point pattern in the drive, shaped like a star. Because of the unusual nature of the drive shape, Torx® screws are often used for tamper- or vandal-resistant installations.
Touchless / Touch-Free Touchless access control, also known as contactless or contact-free, is designed to reduce or eliminate physical contact between human users and the products or components making up the system.
Trailing Parity Bit A parity bit or check bit is a bit added to a string of binary code for the purposes of detecting errors and validating data integrity. The value of the parity bit is assigned 0 or 1 depending on the number of 1s in the string. The most common type of parity requires the number of 1s in the string to be an even number – if the number is already even, the parity bit is set to 0; if it is odd, the parity bit is set to 1 to make the total even. There is another type of parity which requires the number of 1s to be odd, but this is much less common. The trailing parity bit appears at the end of the binary string.
Transmitter In radio transmission communications, the transmitter is the component that converts the message being sent into radio waves and then emits them, to be picked up by the corresponding receiver.
Triple Pole In an electrical switch, a pole refers to a circuit that the switch can control. A triple-pole switch can control three separate circuits, using the same switch.

 

V

 

Voltage Voltage is the pressure in an electrical circuit that pushes the current through the conducting loop. The pressure comes from the circuit’s power source. Voltage is measured in Volts, named after physicist Alessandro Volta.

 

W

 

Wattage Wattage is the measure of Watts. A Watt is a unit of power that refers to the amount of energy required by a device in order to function.
Wiegand Wiegand is a wiring standard that is commonly used in access control systems to facilitate communication between the reader and the controller. There are many variations of the Wiegand protocol, the most common being the 26-bit format. The 26 bits refer to the way the binary code chunks are organised as they are transmitted through the system.

 

Z

 

Zamak® Zamak is a trademarked family of alloy metals. The base metal is zinc, with aluminium, magnesium, and copper alloys. Zamak alloys were developed in the 1920s and are known for their resistance to wear and corrosion, the ability to cast to high-precision specifications, and a lower overall cost than many other alloys. Zamak can also be recycled and is made in a production cycle with a relatively low environmental impact.
Man using a laptop zoomed in on his hands on the keyboard

Can't find what you're looking for?

If there's something missing from this page, get in touch and tell us what it is, and we'll add it straight away. We're all in this together!