Genetec™ Glossary - Genetec™ Glossary

Content type
Glossaries
Language
English
Last updated
2024-07-19

"A" terms

absolute time

In Clearance™, absolute time refers to the actual recording start and end times of the video evidence. For example, 08:35:00 AM - 08:40:00 AM.

Access control

The Access control task is the administration task for configuring your access control entities, which include roles, units, cardholders, credentials, and access rules.

access control (physical access)

Access control (physical access) is the management of access to physical assets such as doors and group of doors.

Access control health history

The Access control health history task is a maintenance task that reports on events related to the health of access control entities. Unlike the events in the Health history report, the events in the Access control health history report are not generated by the Health Monitor role, identified by an event number, or categorized by severity.

access control unit

An access control unit entity represents an intelligent access control device, such as a Synergis™ appliance, an Axis Powered by Genetec door controller, or an HID network controller, that communicates directly with the Access Manager over an IP network. An access control unit operates autonomously when it is disconnected from the Access Manager.
Also known as: door controller

Access control unit event delays

The Access control unit event delays task is a maintenance task that reports on event delays. It produces statistics on the time difference between when events are generated and received.

Access control unit events

The Access control unit events task is a maintenance task that reports on events pertaining to selected access control units.

Access Manager

The Access Manager role manages and monitors access control units on the system.

access point

An access point is any entry (or exit) point to a physical area where access can be monitored and governed by access rules. An access point is typically a door side.

access policy

An access policy refers to the permission levels granted to various integrations, users, groups, and departments on a particular case or file in a Clearance™ account.

access request workflow

An access request workflow is a series of activities associated with an access request. These activities are performed by the system or authorized people during the life cycle of an access request. The activities can change the access request state and properties, affect other entities in the system, or wait for a condition to become true.

access requests report

In Genetec ClearID™, an access requests report is a list of access requests for a specific site. The report includes information about the access request date, area requested, status, requested by, requested for, and period of access.

access reviews report

In Genetec ClearID™, an access reviews report is a list of access reviews. The report includes information about area, role, or identity access reviews and the current review status (not started, started, in progress, completed, or expired).

access right

An access right is the basic right users must have over any part of the system before they can do anything with it. Other rights, such as viewing and modifying entity configurations, are granted through privileges. In the context of a Synergis™ system, an access right is the right granted to a cardholder to pass through an access point at a given date and time.

access rule

An access rule entity defines a list of cardholders to whom access is either granted or denied based on a schedule. Access rules can be applied to secured areas and doors for entries and exits, or to intrusion detection areas for arming and disarming.

Access rule configuration

The Access rule configuration task is a maintenance task that reports on entities and access points affected by a given access rule.

Access troubleshooter

Access troubleshooter is a tool that helps you detect and diagnose access configuration problems. With this tool, you can find out about the following:
  • Who is allowed to pass through an access point at a given date and time.
  • Which access points a cardholder is allowed to use at a given date and time.
  • Why a given cardholder can or cannot use an access point at a given date and time.

account

An account defines a customer organization's settings for Clearance™. There is one account per Clearance™ system.

Account Administrator

The Account Administrator in Clearance™ is a predefined user group with full access to the site, whose members typically act as site administrators. Only members of the Account Administrator group have access to the Configurations menu, from which they can create and manage users, groups, departments, categories, and access policies.

action

An action is a user-programmable function that can be triggered as an automatic response to an event, such as door held open for too long or object left unattended, or that can be executed according to a specific time table.

active alarm

An active alarm is an alarm that has not yet been acknowledged.

active authentication

Active authentication is when the client application captures the user credentials and sends them through a secure channel to a trusted identity provider for authentication.

Active Directory

Active Directory is a directory service created by Microsoft, and a type of role that imports users and cardholders from an Active Directory and keeps them synchronized.

Active Directory (AD)

Acronym: AD

Active Directory Federation Services

Active Directory Federation Services (ADFS) is a component of the Microsoft® Windows® operating system that issues and transforms claims, and implements federated identity.

Active Directory Federation Services (ADFS)

Acronym: ADFS

Active manual actions

The Active manual actions task is an operation task in Security Desk that you can use to view and cancel any active causes on CCURE 9000 doors and alarms.

Activity trails

The Activity trails task is a maintenance task that reports on the user activity related to video, access control, and ALPR functionality. This task can provide information such as who played back which video recordings, who used the Hotlist and permit editor, who enabled hotlist filtering, and much more.

add-on

An add-on is a software package that adds tasks, tools, or specific configuration settings to Security Center systems.

advanced correlation

Advanced correlation in Genetec Citigraf™ uses correlation rules to find relevant information about an alert.

Advanced Enrollment

The Advanced Enrollment plugin integrates ID card printers and encoders into Security Center. Using this plugin, you can print ID badges that can be read by QR code and barcode scanners, magstripe readers or contactless card readers. You can create ID badge templates to print and encode cards for an individual cardholder or batches of cardholders.

Advanced Systems Format

The Advanced Systems Format (ASF) is a video streaming format from Microsoft. The ASF format can only be played in media players that support this format, such as Windows Media Player.

Advanced Systems Format (ASF)

Acronym: ASF

agent

An agent is a subprocess created by a Security Center role to run simultaneously on multiple servers for the purpose of sharing its load.

Air Operations Area

The Air Operations Area (AOA) is the portion of an airport designed and used for landing, take off, surface maneuvering or parking of airplanes together with all infield areas, runway protection zones, runway and taxiway safety areas, and unobstructed areas as appropriate. This area does not include the secured area.

Air Operations Area (AOA)

Acronym: AOA

airport access level

An airport access level grants a person working at the airport unescorted access to a physical area of the airport. The physical areas of the airport are Security Identification Display Area (SIDA), Airport Operations Area (AOA), Sterile area, Secured area, and Public area.

Airport badge applications

The Airport badge applications task is an investigation task that reports on the status of airport ID badge applications and applicant information.

Airport badging management

The Airport badging management task is the operation task used by the airport security personnel to manage the badge application process. This includes collecting applicants' personal information, following airport internal screening rules, conducting background checks, and issuing physical badges.

Airport Badging Solution (plugin)

The Airport Badging Solution plugin (or ABS plugin) is an access control plugin. It adds the necessary role, tasks, privileges, and custom fields to Security Center to manage airport ID badge applications, background checks, and the issuance of physical badges to cardholders.

Airport Badging Solution (role)

The Airport Badging Solution role (or ABS role) is the plugin role that manages all badge applicants' personal information and all communications between Security Center and the relevant authorities to perform background checks.

airport employee privilege

Airport employee privileges are used to describe activities that airport employees are allowed to perform, such as accessing airport ramps or escorting visitors. They should not be confused with Security Center privileges.

airport trusted agent

The airport trusted agent is an individual who is responsible for processing airport badge applications, from collecting applicants' personal information to activating and printing their physical badges.

alarm

An alarm entity informs users of a situation that requires immediate attention and provides details on how it can be handled in Security Center. For example, an alarm can indicate which entities (usually cameras and doors) best describe the situation, who must be notified, how it must be displayed to the user, and so on.

alarm acknowledgment

An alarm acknowledgment is the final user response to an alarm that ends its lifecycle and removes it from the active alarm list.

Alarm monitoring

The Alarm monitoring task is an operation task that you can use to monitor and respond to alarms (acknowledge, forward, snooze, and so on) in real time, and to review past alarms.

alarm receiver

An alarm receiver is a device that receives events from many different intrusion panels, either over a telephone line, a private IP network, or the Internet.

Alarm report

The Alarm report task is an investigation task that you can use to search and view current and past alarms.

Alarms

The Alarms task is an administration task that you can use to configure alarms and monitor groups.

alert

Alerts are notifications about time-sensitive events related to public safety, occurring at specific locations.

Alert details

The Alert details task is an operation task that displays detailed information about a specific alert or location you click on the map.

alert tray

The alert tray lists the most recent alerts you can see in Security Desk, based on the alert viewing criteria you set (time, priority, and district). Changing the alert viewing criteria automatically updates the number of active alerts displayed in the notification tray and the alerts displayed in the Maps task.

all open rule

When applied to areas, doors, and elevators, the all open rule grants access to all cardholders at all times.

allowed user

An allowed user of a Genetec Mission Control™ profile is a user to whom the profile can be assigned, as long as the user is connected to Security Center through Security Desk.

ALPR

The ALPR task is an administration task that you can use to configure roles, units, hotlists, permits, and overtime rules for ALPR, and related entities and settings.

ALPR camera

An Automatic License Plate Recognition (ALPR) camera is a camera connected to an ALPR unit that produces high resolution close-up images of license plates.

ALPR context

An ALPR context is an ALPR optimization that improves license plate recognition performance for license plates from a specific region (for example, New York) or from a group of regions (for example, Northeast states).

ALPR Frequency Monitor

The Stakeout - ALPR Frequency Monitor plugin tracks how often vehicles are detected by fixed Sharp cameras. The system can alert Security Desk users if vehicles without whitelisted license plates have exceed the configured threshold.

ALPR Manager

The ALPR Manager role manages and controls the patrol vehicle software (Genetec Patroller™), Sharp cameras, and parking zones. The ALPR Manager stores the ALPR data (reads, hits, timestamps, GPS coordinates, and so on) collected by the devices.

ALPR rule

ALPR rule is a method used by Security Center and AutoVu™ for processing a license plate read. An ALPR rule can be a hit rule or a parking facility.

ALPR unit

An ALPR unit is a device that captures license plate numbers. An ALPR unit typically includes a context camera and at least one ALPR camera.

analog monitor

An analog monitor entity represents a monitor that displays video from an analog source, such as a video decoder or an analog camera. This term is used in Security Center to refer to monitors that are not controlled by a computer.

antipassback

Antipassback is an access restriction placed on a secured area that prevents a cardholder from entering an area that they have not yet exited from, and vice versa.

architecture version

An architecture version is a software version that introduces significant changes to the architecture or user experience of the platform. Architecture upgrades require changes to system design and configuration settings, data migration, and retraining of users. Architecture versions are not compatible with previous versions. A license update is required to upgrade to a new architecture version. An architecture version is indicated by a version number with zeros at the second, third and fourth positions: X.0.0.0. For more information, see our Product Lifecycle page on GTAP.

Archive storage details

The Archive storage details task is a maintenance task that reports on the video files (file name, start and end time, file size, protection status, and so on) used to store video archive. Using this task, you can also change the protection status of these video files.

archive transfer

Archive transfer is the process of transferring your video data from one location to another. The video is recorded and stored on the video unit itself or on an Archiver storage disk, and then the recordings are transferred to another location.

Archive transfer

(Obsolete as of Security Center 5.8 GA) The Archive transfer task is an administration task that allows you to configure settings for retrieving recordings from a video unit, duplicating archives from one Archiver to another, or backing up archives to a specific location. Starting from Security Center 5.8 GA, Archive transfer is a page inside the Video administration task.

Archiver

The Archiver role is responsible for the discovery, status polling, and control of video units. The Archiver also manages the video archive and performs motion detection if it is not done on the unit itself.

Archiver events

The Archiver events task is a maintenance task that reports on events pertaining to selected Archiver roles.

Archiver statistics

Archiver statistics is a maintenance task that reports on the operation statistics (number of archiving cameras, storage usage, bandwidth usage, and so on) of the selected archiving roles (Archiver and Auxiliary Archiver) in your system.

Archives

The Archives task is an investigation task that you can use to find and view video archives by camera and time range.

archiving role

An archiving role is an instance of either the Archiver role or Auxiliary Archiver role.

area

In Security Center, an area entity represents a concept or a physical location (room, floor, building, site, and so on) used for grouping other entities in the system.

area

In Genetec ClearID™, an area is a logical entity that defines the relationship between Synergis™ doors and area owners. Areas are managed by the area owner.

Area activities

The Area activities task is an investigation task that reports on access control events pertaining to selected areas.

area approver

In Genetec ClearID™, an area approver is an identity that has approval authority over an area. The approver can approve or deny access requests for an area. They are also responsible for area access review approvals.

area owner

In Genetec ClearID™, an area owner is an identity that has authority over an area. The owner can define the policy for an area and assign area approvers.

Area presence

The Area presence is and investigation task that provides a snapshot of all cardholders and visitors currently present in a selected area.

area view

The area view is a view that organizes the commonly used entities such as doors, cameras, tile plugins, intrusion detection areas, zones, and so on, by areas. This view is primarily created for the day to day work of the security operators.

Area view

The Area view task is an administration task that you can use to configure areas, doors, cameras, tile plugins, intrusion detection areas, zones, and other entities found in the area view.

armed tile

An armed tile is a tile in Security Desk that displays new alarms that are triggered. In the Alarm monitoring task all tiles are armed, while in the Monitoring task, tiles must be armed by a user.

AS Portal

The Authorized Signatory Portal (AS Portal) is a web-based tool used with the Airport badging management task in Security Desk to help manage airport ID badge applications. It allows airports to give authorized users permission to collect and submit personal information from badge applicants to facilitate the application process.

Authorized Signatory Portal (AS Portal)

asset

An asset entity represents any valuable object with an RFID tag attached, thus allowing it to be tracked by an asset management software.

asymmetric encryption

See "public-key encryption".

asynchronous video

Asynchronous video is simultaneous playback video from more than one camera that are not synchronized in time.

attributes

In Genetec ClearID™, attributes are the traits or characteristics that make up an identity. Examples of attributes include department, location, role, seniority, pay grade, training certifications, and security clearance.

audio decoder

An audio decoder is a device or software that decodes compressed audio streams for playback. Synonym of speaker.

audio encoder

An audio encoder is a device or software that encodes audio streams using a compression algorithm. Synonym of microphone.

Audit trails

The Audit trails task is a maintenance task that reports on the configuration changes of the selected entities in the system. The report also indicates the user who made the changes.

authentication

The process of verifying that an entity is what it claims to be. The entity could be a user, a server, or a client application.

Authentication Service

The Authentication Service role connects Security Center to an external identity provider for third-party authentication.

Instances of the Authentication Service role are protocol-specific. One of the following protocols is selected at role creation:

  • OpenID
  • SAML2
  • WS-Trust or WS-Federation

Multiple Authentication Service roles can be created, but each must monitor a unique list of domains.

authorization

The process of establishing the rights an entity has over the features and resources of a system.

authorized signatory

An authorized signatory (AS) is an individual who has the authority to sign airport badge applications for other employees of their company, and who can request vehicle permits and keys. This person must be registered with the Airport Badge Office and is the primary point of contact for all security matters related to their company.

authorized signatory (AS)

Acronym: AS

authorized user

An authorized user is a user who can see (has the right to access) the entities contained in a partition. Users can only exercise their privileges on entities they can see.

automatic enrollment

Automatic enrollment is when new IP units on a network are automatically discovered by and added to Security Center. The role that is responsible for the units broadcasts a discovery request on a specific port, and the units listening on that port respond with a message that contains the connection information about themselves. The role then uses the information to configure the connection to the unit and enable communication.

automatic license plate recognition

Automatic license plate recognition (ALPR) is an image processing technology used to read license plate numbers. ALPR converts license plate numbers cropped from camera images into a database searchable format.

automatic license plate recognition (ALPR)

Acronym: ALPR

automation

Automation is a series of activities associated to an incident type. These activities are performed by the system during the life cycle of an incident. The activities can change the incident state and properties, affect other entities in the system, or simply wait for a condition to become true. The automation workflow helps automate simple tasks, such as exporting the incident when it is resolved, so operators can focus on more complex ones. (Replaces the term incident workflow)

automation engine

Automation engine is the Synergis™ Softwire feature that executes rules, similar to event-to-actions in Security Center. Automation engine works even when the Synergis™ unit is disconnected from its Access Manager.

AutoVu Cloudrunner™

AutoVu Cloudrunner™ is a cloud-based vehicle-centric investigation platform. In its current version, it facilitates law enforcement agencies with license plate reporting functionality.

AutoVu MLC™

AutoVu MLC™ (Machine Learning Core) replaces traditional rule-based ALPR technology with machine learning-based algorithms to reduce common ALPR misreads and false positives. It is a proprietary technology of Genetec Inc. used in AutoVu™ Sharp hardware for license plate recognition.

AutoVu™ ALPR Processing Unit

AutoVu™ ALPR Processing Unit is the processing component of the SharpX system. The ALPR Processing Unit is available with two or four camera ports, with one dedicated processor per camera (if using SharpX) or per two cameras (if using SharpX VGA). This ensures maximum, per-camera, processing performance. The ALPR Processing Unit is sometimes referred to as the trunk unit because it is typically installed in a vehicle's trunk.
Also known as: trunk unit

AutoVu™ Free-Flow Credential Report

The AutoVu™ Free-Flow Credential Report plugin generates a real-time inventory of the parking zone occupancy along with the cardholder information. You can create a report for the current parking zone occupancy, or for a specific time in the past based on the selected time filter.

AutoVu™ Managed Services

With AutoVu™ Managed Services (AMS), your automatic license plate recognition (ALPR) system is hosted in the cloud and experts from Genetec Inc. configure and maintain it. This reduces the need for on-site IT infrastructure and support.

AutoVu™ Managed Services (AMS)

Acronym: AMS

AutoVu™ Portal

Installing the AutoVu™ Free-Flow plugin gives you access to the AutoVu™ Portal. From there, you can view parking log occupancy dashboard and investigate vehicle activity for each tenant.

AutoVu™ Third-party Data Exporter

The AutoVu™ Third-party Data Exporter is a feature that uses either an HTTPS or a SFTP connection protocol to securely export ALPR events, for example reads and hits, to external endpoints.

Auxiliary Archiver

The Auxiliary Archiver role supplements the video archive produced by the Archiver role. Unlike the Archiver role, the Auxiliary Archiver role is not bound to any particular discovery port, therefore, it can archive any camera in the system, including cameras federated from other Security Center systems. The Auxiliary Archiver role cannot operate independently; it requires the Archiver role to communicate with video units.

auxiliary PoE camera

For a more detailed view of the area surrounding a license plate read location, you can install AutoVu™ auxiliary PoE cameras on the parking enforcement patrol vehicle.

AVL area entry and exit report

The AVL area entry and exit report task is an investigation task installed with the Security Center Fleet Monitoring plugin. Use this task to visually report vehicle metrics, such as how many times a vehicle entered or exited a defined area over time.

AVL data offload

The AVL data offload task is an operation task installed with the Security Center Fleet Monitoring plugin. Use this task to offload data and video data from AVL units to an external Archiver.

AVL data offload report

The AVL data offload report task is an investigation task installed with the Security Center Fleet Monitoring plugin. Use this task to view details on past AVL data offloads.

AVL data offload status

The AVL data offload status task is an investigation task installed with the Security Center Fleet Monitoring plugin. You can use this task to view the status of queued, in-progress, and recently completed data offload requests.

AVL video offload status report

The AVL video offload status report task is an investigation task in Security Center. You can use this task to generate reports on the size of video offloaded from selected AVL units per four-hour period.

Axis Powered by Genetec

Axis Powered by Genetec is an all-in-one solution that combines Genetec™ access control software with Axis network door controllers. Synergis™ Softwire is preinstalled onto the Axis controllers and runs as an app on the AXIS OS platform. This simplifies their deployment, configuration, and maintenance in Security Center. Axis Powered by Genetec is sold exclusively through Genetec™ Certified channel partners.

"B" terms

background

In KiwiVision™ Video Analytics, the background is composed of the static environment and immovable objects that are learned to identify changes in an image.

BACnet

BACnet is a communication protocol used for building automation and control (BAC). Using the Industrial IoT plugin, you can integrate your network of BACnet devices and sensors into Security Center.

BACstac

BACstac (BACnet protocol stack) is a Windows service installed by the Industrial IoT plugin for the BACnet protocol. This service is required for the plugin to communicate with BACnet devices.

Badge designer

The Badge designer is the tool that you can use to design and modify badge templates.

badge template

A badge template is an entity used to configure a printing template for badges.

badge type

A badge type is a class of airport ID badges characterized by a set of airport access levels, employee privileges, and a badge template.

barcode scanner

A barcode scanner or reader is an optical scanner that reads barcodes and sends the bardcode information to an output port or other destination.

basic correlation

Basic correlation in Genetec Citigraf™ is the search for information related to an alert, based on two criteria: time window prior to the alert time, and radius around the alert location.

block

In KiwiVision™ Video Analytics, a block is a rectangular section of the camera image where image processing, such as pixelation, is performed.

block face (2 sides)

A block face (2 sides) is a parking regulation characterizing an overtime rule. A block face is the length of a street between two intersections. A vehicle is in violation if it is seen parked within the same block over a specified period of time. Moving the vehicle from one side of the street to the other does not make a difference.

body-worn camera station

A body-worn camera station is a physical device or software used to automatically upload media from a body-worn camera to Clearance™ or the Wearable Camera Manager role in Security Center, depending on which .json file is used.

bookmark

A bookmark is an indicator of an event or incident that is used to mark a specific point in time in a recorded video sequence. A bookmark also contains a short text description that can be used to search for and review the video sequences at a later time.

Bookmarks

The Bookmarks task is an investigation task that searches for bookmarks related to selected cameras within a specified time range.

Bosch Map 5000 intrusion panel

The Bosch Map 5000 intrusion panel extension receives events from a Bosch Map 5000 intrusion alarm system and saves them in the Security Center database for future investigations. The extension can raise alarms on intrusion panel events and state changes, display events on maps, allows operators to view video that is linked to intrusion areas, events, and alarms for video verification, which helps to reduce false alarms.

Breakout box

The breakout box is the proprietary connector box of Genetec Inc. for AutoVu™ mobile solutions that use Sharp cameras. The breakout box provides power and network connectivity to the Sharp units and the in-vehicle computer.

broadcast

Broadcast is the communication between a single sender and all receivers on a network.

BuyTime

BuyTime is a plugin you can use to postpone the scheduled arming of intrusion detection areas in Security Center.

body-worn camera

A body-worn camera (BWC), also known as a wearable camera, is a video recording system that is typically used by law enforcement to record their interactions with the public or gather video evidence at crime scenes.
Acronym: BWC

"C" terms

call dialog box

The call dialog box is a Sipelia-related dialog box that appears from the notification tray within Security Desk once an incoming call comes in from a SIP endpoint. In the call dialog box, users can manage their calls and their list of contacts and favorites, and set their availability status.

Call report

The Call report task is an investigation task. You can use it to review call sessions and generate reports. Among the possible actions that can be performed in this task, users can view the call logs for all sessions, watch playback video of all recorded call sessions, and see the bookmarks that have been added to video sequences of associated cameras.

call session

A call session is the sequence of events or activities that occur from the time a SIP call is started to the time that it ends, including all call transfers. For example, if a call is transferred twice, the sequence of events that occur in both those transfers are all part of the same call session. In a Security Center system equipped with the Sipelia™ module, call sessions can be reviewed and exported through the Call report task within Security Desk.

camera (Security Center)

A camera entity represents a single video source in the system. The video source can either be an IP camera, or an analog camera that connects to the video encoder of a video unit. Multiple video streams can be generated from the same video source.

camera (Stratocast)

A camera is a video unit that represents a single video source in the system. The video source can be an IP camera, or an analog camera that is connected to a video encoder.

camera blocking

Camera blocking is an Omnicast™ feature that lets you restrict the viewing of video (live or playback) from certain cameras to users with a minimum user level.

Camera configuration

The Camera configuration task is a maintenance task that reports on the properties and settings of local cameras in your system (manufacturer, resolution, frame rate, stream usage, and so on).

Camera events

The Camera events task is an investigation task that reports on events pertaining to selected cameras within a specified time range.

Camera Integrity Monitor

The Camera Integrity Monitor role samples video images from cameras at regular intervals. The role detects any abnormal variations that indicate possible camera tampering, and generates Camera tampering events.

camera integrity monitoring

In Security Center, camera integrity monitoring is software that detects any form of tampering with the camera. This includes moving the camera, obstructing the camera view, changing the camera focus, and so on. The software automatically generates events to alert the security team to remedy the situation.

camera sequence

A camera sequence is an entity that defines a list of cameras that are displayed one after another in a rotating fashion within a single tile in Security Desk.

canvas

Canvas is one of the panes found in the Security Desk's task workspace. The canvas is used to display multimedia information, such as videos, maps, and pictures. It is further divided into three panels: the tiles, the dashboard, and the properties.

capture rate

The capture rate measures the speed at which a license plate recognition system can take a photo of a passing vehicle and detect the license plate in the image.

Card and PIN

Card and PIN is an access point mode that requires a cardholder to present their card, and then enter a personal identification number (PIN).

cardholder

A cardholder entity represents a person who can enter and exit secured areas by virtue of their credentials (typically access cards) and whose activities can be tracked.

Cardholder access rights

The Cardholder access rights task is a maintenance task that reports on which cardholders and cardholder groups are granted or denied access to selected areas, doors, and elevators.

Cardholder activities

The Cardholder activities task is an investigation task that reports on cardholder activities, such as access denied, first person in, last person out, antipassback violation, and so on.

Cardholder Audit Report

The Cardholder Audit Report plugin shows cardholder and credential information in a single report. The report includes when credentials are assigned and removed for each cardholder, when access rules are assigned or removed, and whether access rules are assigned individually or inherited from cardholder groups.

cardholder group

A cardholder group is an entity that defines the common access rights of a group of cardholders.

Cardholder management

The Cardholder management task is an operation task. You can use this task to create, modify, and delete cardholders. With this task, you can also manage a cardholders' credentials, including temporary replacement cards.

Cardholder configuration

The Cardholder configuration is a maintenance task that reports on cardholder properties, such as first name, last name, picture, status, custom properties, and so on.

case

A case in Clearance™ is a record of an incident. You can share cases with internal and external organizations, and add digital evidence such as videos, images, and documents to cases.

cash register

A cash register entity represents a single cash register (or terminal) in a point of sale system.

category

Categories in Clearance™ are used to classify cases. Each category defines an incident type and a retention policy.

CCURE 9000 Access Control manual action activity trails

The CCURE 9000 Access Control manual action activity trails task is an investigation task in Security Desk. You can use this task to search for actions performed in Security Center-synchronized CCURE 9000 entities, and see which Security Center users performed the action and when.

certificate

Designates one of the following: (1) digital certificate; (2) SDK certificate.

certificate authority

A certificate authority or certification authority (CA) is an entity or organization that signs identity certificates and attests to the validity of their contents. The CA is a key component of the public-key infrastructure (PKI)

certificate authority (CA)

Acronym: CA

Certificate Signing

The Certificate Signing role acts as the certificate authority (CA) for all access control and video units whose certificates are managed in Security Center by the Unit Assistant role. You may have only one instance of this role in your system.

checkpoint

A checkpoint can be any entity in Security Center; including events, door readers, intrusion detection units, license plate reads, or any device that a cardholder can use to present a credential.

Checkpoint history

The Checkpoint history task is a Security Patrol System (SPS) CheckPoint task that you use to investigate when checkpoints were badged, skipped, late, extended, and canceled.

City Parking Enforcement

City Parking Enforcement is a Genetec Patroller™ software installation that is configured for the enforcement of parking permit and overtime restrictions.

City Parking Enforcement with Wheel Imaging

City Parking Enforcement with Wheel Imaging is a City Parking Enforcement installation of a Genetec Patroller™ application that also includes wheel imaging. The use of maps is mandatory and the mobile AutoVu™ system must include navigation hardware.

claim

A statement that a trusted third-party makes about a subject, such as a user. For example, a claim can be about a name, identity, key, group, privilege, or capability. Claims are issued by an identity provider. They are given one or more values and then packaged in a security token that is sent to relying applications during third-party authentication.

Clearance (plugin)

The Genetec Clearance™ plugin is used to export video recordings and snapshots from Security Center to Clearance. You can also create a registry of Security Center cameras in a Clearance account that you can use to send notifications to operators and automate exports when video requests are received.

Clearance (role)

The Genetec Clearance™ role manages video exports to a Clearance account. This role also handles communications between Security Center and the Clearance web application.

Clearance Activities task

The Genetec Clearance™ Activities task is an activity trail report that you can use to track and audit evidence exports and video requests involving Clearance.

Clearance Capture

Genetec Clearance™ Capture is a Google Chrome extension that is used to capture evidence from websites and social media and upload the evidence directly to your Clearance account.

Clearance Seen

Genetec Clearance™ Seen is a mobile app that officers and security personnel can use to capture videos, images, and audio recordings from their phone, and upload evidence directly to their Clearance™ account. Evidence can quickly be added to cases and shared with investigators and other parties, all while maintaining its safety and security.

Clearance™ Uploader

Genetec Clearance™ Uploader is an application used to automatically upload media from body-worn cameras, sync folders, or other devices to Clearance™, or a Security Center video archive, depending on which .json config file is used.

client administrator

User level that is assigned by either the integrator administrator or integrator user. The client administrator does not have all of the privileges that the integrator user levels have, but the client administrator can allow or restrict client user or remote monitoring user access to the Stratocast™ portal. You can only have one client administrator per client account, but you can register the same username to multiple users.

client certificate

A client certificate is an identity certificate used to authenticate the client's identity to the server. Unlike server certificates, client certificates are not used to encrypt data-in-transit. They only serve as a more secure authentication mechanism than passwords.

client user

User level that is assigned by either the integrator administrator, integrator user, or the client administrator. You can only add a maximum of nine client users per client account, not including the client administrator, and they can each be assigned unique usernames or the same username.

client-specific key stream

The client-specific key stream is the encrypted form of the master key stream. The master key stream is encrypted with the public key contained in an encryption certificate, specifically issued for one or more client machines. Only the client machines that have the encryption certificate installed have the required private key to decrypt the encrypted key stream.

Cloud Link Roadrunner™

Cloud Link Roadrunner™ is an Internet of Things (IoT) device that protects unsupervised enclosures such as those that contain telecommunications equipment. The unit communicates with Security Center and lets you open the enclosure doors remotely or by using an access control card on-site. Cloud Link Roadrunner™ is considered a Synergis™ appliance and is enrolled in Security Center as an access control unit.

Cloud Link Roadrunner™ Portal

The Cloud Link Roadrunner™ Portal is the web-based administration tool used to configure and administer the Cloud Link Roadrunner™ appliance and upgrade its firmware.

cloud platform

A cloud platform provides remote computing and storage services through centralized data centers that are accessible via the Internet.

Cloud Playback

The Cloud Playback role is used by Cloud storage to stream video archives from the cloud to clients and federated users connected to the system. Cloud Playback supports the Real Time Streaming Protocol (RTSP) locally and uses TLS to retrieve video sequences from the cloud.

Cloud Storage

Cloud Storage is a service from Genetec Inc. that extends on-premises storage for Security Center Omnicast™ into the cloud. Video archives in Cloud Storage benefit from extended retention periods, secure and redundant storage, and seamless retrieval from Security Desk.

collaborative incident

A collaborative incident is an incident type that requires the collaboration of multiple teams to resolve. Each team has specific tasks to follow, which are represented by sub-incidents. The collaborative incident is resolved when all its sub-incidents are resolved.

Commercial Identity Verification

Commercial Identity Verification (CIV) is a credential standard that works within the Personal Identity Verification (PIV) framework, but is tailored for the commercial sector.

Commercial Identity Verification (CIV)

Acronym: CIV

compression artifact

A compression artifact is a type of error, or deviation from the original recording, that can be detected in images, audio, and video after applying a lossy compression algorithm. The severity of these errors can vary depending on the compression being used.

computer-aided dispatch

Computer-aided dispatch (CAD), also called computer-assisted dispatch, is a method of dispatching police vehicles, fire trucks, ambulances, and so on, assisted by computer. CAD systems consist of several modules that provide services at multiple levels in a dispatch center and in the field of public safety. These services include call input, call dispatching, call status maintenance, event notes, field unit status and tracking, and call resolution and disposition.

computer-aided dispatch (CAD)

Acronym: CAD

Config Tool

Config Tool is the Security Center administrative application used to manage all Security Center users and to configure all Security Center entities such as areas, cameras, doors, schedules, cardholders, patrol vehicles, ALPR units, and hardware devices.

Conflict resolution utility

The Conflict resolution utility is a tool that helps you resolve conflicts caused by importing users and cardholders from an Active Directory.

connector

In Genetec ClearID™, a connector is a custom component that allows third-party system integrations to share data with Genetec ClearID™. Connectors are application-dependent.

Contact ID

Contact ID is the communication protocol that the Receiver intrusion detection extension uses to communicate with third-party alarm receivers.

container

A container is an isolated user space on a container platform running an instance of a particular container image.

container image

A container image is a static file that includes all the executable code, libraries, and platform settings needed to run an isolated process on a container platform, such as Docker.

container platform

A container platform is an IT infrastructure where you can run applications in isolated user spaces, called containers. Container platforms are usually more cost-effective than running multiple virtual machines.

container registry

The container registry is the cloud service that stores and distributes production container images.

context camera

A context camera is a camera connected to an ALPR unit that produces a wider angle color image of the vehicle whose license plate was read by the ALPR camera.

Continuous Delivery

The Continuous Delivery (CD) release track offers customers an upgrade path with ongoing innovations, introducing new features, bug fixes, performance enhancements, and support for the latest devices through minor versions. The frequency of changes introduced on the CD track may be impractical for some organizations, who opt for the long-term predictability of the LTS track.

Continuous Delivery (CD)

Acronym: CD

contract permit parking

Contract permit parking is a parking scenario where only drivers with monthly permits can park in the parking zone. A whitelist is used to grant permit holders access to the parking zone.

controlled exit

A controlled exit is when credentials are necessary to leave a secured area.

controller module

Controller module is the processing component of Synergis™ Master Controller with IP capability. This module comes pre-loaded with the controller firmware and the web-based administration tool, Synergis™ Appliance Portal.

convenience time

The convenience time is a configurable leeway time before a vehicle starts to be charged after entering the parking zone. For example, if you need to set up a 2-hour free parking period before paid time or parking enforcement takes effect, you would set the convenience time for 2 hours. For parking lots where parking enforcement begins immediately, you would still need to set a short convenience time to allow vehicle owners time to find a parking spot and purchase parking time before parking enforcement begins.

conversation window

The conversation window is a Sipelia™-related window that opens within Security Desk once a SIP call has been accepted by either the caller or the recipient of a call. From the conversation window, Security Center users can manage conversations, forward calls, and view associated video when available.

Copy configuration tool

The Copy configuration tool helps you save configuration time by copying the settings of one entity to many others that partially share the same settings.

correlation

Correlation refers to the relationship that exists between two types of events, X and Y. A correlation exists between X and Y if whenever event X occurs, event Y is expected. For example, if we observe that every time there is a large gathering of people (event X), the number of new cases of COVID-19 increases in the days that follow (event Y), we can assume that there is a correlation between large gatherings and the increase in the number of new cases of COVID-19.

correlation rule

A correlation rule is a set of user-defined data queries based on a correlation hypothesis. When alerts are received in Genetec Citigraf™, the correlation rules are automatically matched against the available data sources to validate the hypothesis. When a match is found (called a hit), a new alert is generated.

Correlation Rules Engine

The Correlation Rules Engine role (rules engine in short) is the role dedicated to the processing of correlation rules in Genetec Citigraf™.

covert hit

A covert hit is a read (captured license plate) that is matched to a covert hotlist. Covert hits are not displayed on the Genetec Patroller™ screen, but can be displayed in Security Desk by a user with proper privileges.

covert hotlist

Covert hotlists allow you to ensure the discretion of an ongoing investigation or special operation. When a hit is identified, only the authorized officer at the Security Center station is notified, while the officer in the patrol vehicle is not alerted. This enables enforcement officials to assign multiple objectives to the vehicle and back-end systems, while not interrupting the priorities of officers on duty.

credential

A credential entity represents a proximity card, a biometrics template, or a PIN required to gain access to a secured area. A credential can only be assigned to one cardholder at a time.

Credential activities

The Credential activities task is an investigation task that reports on credential related activities, such as access denied due to expired, inactive, lost, or stolen credentialsl, and so on.

credential code

A credential code is a textual representation of the credential, typically indicating the Facility code and the Card number. For credentials using custom card formats, the user can choose what to include in the credential code.

Credential configuration

The Credential configuration task is a maintenance task that reports on credential properties, such as status, assigned cardholder, card format, credential code, custom properties, and so on.

Credential management

The Credential management task is an operation task. You can use this task to create, modify, and delete credentials. With this task, you can also print badges and enroll large numbers of card credentials into the system, either by scanning them at a designated card reader or by entering a range of values.

Credential request history

The Credential request history task is an investigation task that reports on which users requested, canceled, or printed cardholder credentials.

cumulative security rollup

A cumulative security rollup is a periodic release that contains the latest security fixes and updates for legacy Synergis™ Cloud Link units.

custom event

A custom event is an event added after the initial system installation. Events defined at system installation are called system events. Custom events can be user-defined or automatically added through plugin installations. Unlike system events, custom events can be renamed and deleted.

custom field

A custom field is a user-defined property that is associated with an entity type and is used to store additional information that is useful to your organization.

cyphertext

In cryptography, cyphertext is the encrypted data.

"D" terms

Daily usage per Patroller

The Daily usage per Patroller task is an investigation task that reports on the daily usage statistics of a selected patrol vehicle (operating time, longest stop, total number of stops, longest shutdown, and so on) for a given date range.

Dashboards

The Dashboards task is an operation task that provides a blank canvas on which you can pin widgets, including Security Center tiles, reports, and charts. These widgets track key indicators, and provide an overview of the activity and events recorded by the system.

data center

A secure, off-site facility that acts as a centralized repository for computer and server systems, telecommunication equipment, and related storage systems. In Stratocast™, the country that you select when creating or modifying your client accounts is used to choose the closest data center, and helps to establish an efficient connection between your client and Stratocast™.

data ingestion

Data ingestion is the means through which you can import data from external sources into Security Center without having to develop complex code-based integrations.

data point

A data point is a specific type of information, which can be a number, a string, or a Boolean, that has a specific value at a specific time. The Industrial IoT plugin role reads this information from a device if it uses a client protocol, or receives this information from a device if it uses a server protocol. Examples of data points include the temperature read by a thermometer, the ON or OFF position of a light switch, and the speed of a fan.

data source

A data source in Genetec Citigraf™ is an external data provider that can be queried for specific types of information. The integration of the external data provider to Security Center is handled by a plugin role. Typical data sources used in Genetec Citigraf™ are computer-aided dispatch (CAD) systems, geographic information systems (GIS), record management systems (RMS), and so on.

database server

A database server is an application that manages databases and handles data requests made by client applications. Security Center uses Microsoft SQL Server as its database server.

day-and-night camera

A day-and-night camera is a camera that can be used to record during the day and at night, because it adapts to the amount of ambient light in a given scene. As a result, users can easily make out the images in a scene, regardless of the amount of light that is present.

debounce

A debounce is the amount of time an input can be in a changed state (for example, from active to inactive) before the state change is reported. Electrical switches often cause temporarily unstable signals when changing states, possibly confusing the logical circuitry. Debouncing is used to filter out unstable signals by ignoring all state changes that are shorter than a certain period (in milliseconds).

decision support system

A decision support system (DSS) is an information system that supports business or organizational decision-making activities.

decision support system (DSS)

Acronym: DSS

default expiration delay

The default expiration delay is used for permits supplied by Pay-by-Plate Sync that do not include an expiration. In this case, AutoVu™ Free-Flow checks with the parking permit provider to see if the permit is still valid. Increasing this value reduces the frequency of the permit checks. For example, if the parking lot charges for parking in increments of 15 minutes, and you also set the default expiration delay to 15 minutes, the system validates the permit with the parking provider every 15 minutes.

degraded mode

Degraded mode is an offline operation mode of the interface module when the connection to the Synergis™ unit is lost. The interface module grants access to all credentials matching a specified facility code.

Deister Commander

Deister Commander is a software platform manufactured by Deister and used to manage Deister ProxSafe lockers, terminals, keys, and keytags.

deister proxSafe

The deister proxSafe plugin integrates deister proxSafe key management systems into Security Center. You can use this plugin to manage proxSafe cardholders and assets in Security Center and monitor proxSafe events in Security Desk.

delegation

In Genetec ClearID™, delegation is the process of transferring Genetec ClearID™ tasks for site owners, area owners, area approvers, role owners, role managers, supervisors, and visit event approvers to someone else in your organization. For example, during a planned vacation, sabbatical, and so on.

department

A department in Clearance™ is a collection of users, integrations, and groups. The department's access policies are added to the policies that its members already have. Users, integrations, and groups can belong to more than one department.

dependent mode

Dependent mode is an online operation mode of the interface module where the Synergis™ unit makes all access control decisions. Not all interface modules can operate in dependent mode.

Destination Entry Computer

A Destination Entry Computer (DEC), also known as a terminal, is a point of entry in a destination dispatch system. A cardholder gains access to an elevator from a DEC, which is located at an elevator landing.

Destination Entry Computer (DEC)

Acronym: DEC

Destination entry devices

A destination entry device refers to the devices in an Otis CompassPlus™ Destination Management system related to entry; including the Destination Entry Computers (DEC) and the Destination Entry Redirectors (DER).

Destination entry devices (DED)

Acronym: DED

Destination Entry Redirector

The Destination Entry Redirector (DER) is a redirector that manages the network routes of the Otis CompassPlus™ Destination Management system.

Destination Entry Redirector (DER)

Acronym: DER

Destination Entry Server

A Destination Entry Server (DES) is a server that controls a group of Destination Entry Computers (DECs) in the Otis CompassPlus™ Destination Management system. For failover purposes, the CompassPlus™ system might also have standby servers.

Destination Entry Server (DES)

Acronym: DES

destination input device

Destination input devices are elevator kiosks where passengers input their desired destination floor.

device

In Stratocast™, a device can be either a video unit (camera or video encoder) or a NAS (network attached storage) volume. You can add a device from the Devices page of the client account.

device (Industrial IoT)

In the context of Industrial IoT, a device refers to a piece of electronic equipment that can communicate with the Industrial IoT plugin role using one of the supported IoT protocols.

dewarping

Dewarping is the transformation used to straighten a digital image taken with a fisheye lens.

Diagnostic data collector

The Diagnostic data collector is a tool that you can use to collect and package system information to send to Genetec™ Technical Assistance Center for troubleshooting purposes.

dial plan

A dial plan is a collection of rules that defines how calls are routed locally or between two SIP trunks. Dial plans ensure that calls are routed and rerouted correctly, and they also allow administrators to block calls to certain geographic locations or ensure the privacy of the callers.

digital certificate

A digital certificate, also known as X.509 certificate, is a digitally signed document that binds the identity of the certificate owner (a person, a computer, or an organization) to a pair of electronic encryption keys. Digital certificates are used for identity verification, asymmetric cryptography, data-in-transit security, and so on. Digital certificates are the basis for the HTTPS protocol.

digital signature

A digital signature is cryptographic metadata added to video frames by the Archiver or Auxiliary Archiver to ensure their authenticity. If a video sequence is manipulated by adding, deleting, or modifying frames, the signature of the modified content will differ from the original, indicating that the video sequence has been tampered with.

digital signature origin

A digital signature origin is a string of code that contains the Archiver ID of a Security Center system and an encrypted copy of the public key it uses for digital signatures. This string of code can be generated from the system and from each G64x video file its Archiver creates. The origins can then be compared for a match when validating the source Archiver for the digital signature of a file.

direct reports

In Genetec ClearID™, direct reports are employees (identities) that report to a supervisor.

direct reports report

In Genetec ClearID™, a direct reports report is a list of identities of employees that report to a supervisor. The report includes information about direct reports, delegated direct reports, job titles, companies, and access control status.

Directory

The Directory role identifies a Security Center system. It manages all entity configurations and system-wide settings. Only a single instance of this role is permitted on your system. The server hosting the Directory role is called the main server, and must be set up first. All other servers you add in Security Center are called expansion servers, and must connect to the main server to be part of the same system.

Directory gateway

Directory gateways allow Security Center applications located on a non-secured network to connect to the main server that is behind a firewall. A Directory gateway is a Security Center server that acts as a proxy for the main server. A server cannot be both a Directory server and a Directory gateway; the former must connect to the Directory database, while the latter must not, for security reasons.

Directory Manager

The Directory Manager role manages the Directory failover and load balancing to produce the high availability characteristics in Security Center.

Directory server

A Directory server is any one of the multiple servers simultaneously running the Directory role in a high availability configuration.

Directory authentication

Directory authentication is a Security Center option that forces all client and server applications on a given machine to validate the identity certificate of the Directory before connecting to it. This measure prevents manipulator-in-the-middle attacks.

discovery port

A discovery port is a port used by certain Security Center roles (Access Manager, Archiver, ALPR Manager) to find the units they are responsible for on the LAN. No two discovery ports can be the same on one system.

district

A district is a parking regulation characterizing an overtime rule. A district is a geographical area within a city. A vehicle is in violation if it is seen within the boundaries of the district over a specified period of time.

DMP

The DMP Intrusion Panel extension integrates DMP panels in Security Center so that users can monitor intrusions in DMP areas.

DMS message history

The DMS message history task is a Security Center Digital Signage Management investigation task in Security Desk that shows the changes to messages activated on a sign.

DMS message library

The DMS message library is an inventory of saved messages in Security Center that can be displayed on a sign. Each sign has it's own DMS message library.

door

A door entity represents a physical barrier. Often, this is an actual door but it could also be a gate, a turnstile, or any other controllable barrier. Each door has two sides, named In and Out by default. Each side is an access point (entrance or exit) to a secured area.

Door activities

The Door activities task is an investigation task that generates reports on door-related activities, such as access denied, door forced open, door open too long, hardware tamper, and so on.

door contact

A door contact monitors the state of a door, whether it is open or closed. It can also be used to detect an improper state, such as door open too long.

door side

Every door has two sides, named In and Out by default. Each side is an access point to an area. For example, passing through one side leads into an area, and passing through the other side leads out of that area. For the purposes of access management, the credentials that are required to pass through a door in one direction are not necessarily the same that are required to pass through in the opposite direction.

door template

A door template defines the wiring for a specific door configuration, which simplifies and accelerates the door creation process by eliminating the need to manually map the physical wiring for a door entity.

Door troubleshooter

The Door troubleshooter task is a maintenance task that lists all the cardholders who have access to a particular door side or elevator floor at a specific date and time.

double-badge activation

With double-badge activation, also known as double-swipe activation, an authorized cardholder can unlock a door and trigger actions by badging twice. The door remains unlocked and the action remains active until the next double-badge event.

Driver Development Kit

Driver Development Kit is a SDK for creating device drivers.

Driver Development Kit (DDK)

Acronym: DDK

dual recording

Dual recording is the process of recording and storing recorded videos in the cloud and on an SD card of supported devices simultaneously.

duress

A duress is a special code used to disarm an alarm system. This code quietly alerts the monitoring station that the alarm system was disarmed under threat.

dynamic permit

In a system that uses the Pay-by-Plate Sync plugin, a dynamic permit holds a list of vehicles that is updated by a third-party permit provider. For example, in a system where vehicle owners pay for parking at a kiosk or using a mobile phone app, the list of vehicles are dynamically managed by a third-party permit provider.

dynamic user procedure

A dynamic user procedure (or dynamic SOP) is a standard operating procedure where the step sequence depends on the response provided by the operator at each step. The dynamic SOP is represented by a flowchart in Config Tool.
Also known as: dynamic SOP

"E" terms

edge recording

Edge recording is the process of recording and storing recorded videos on the peripheral device, thus removing the need for a centralized recording server or unit. With edge recording, you can store video directly on the camera’s internal storage device (SD card) or on a network attached storage volume (NAS volume).

eDiscovery

In Clearance™, eDiscovery is the process where electronic data is sought, secured, located, explored, and retrieved with the intention of using it as evidence in a civil or criminal case.

eDiscovery receipt

In Clearance™, an eDiscovery receipt is an audit-compliant digital proof of receipt report (in PDF format) for evidence being shared between two parties. For example, between the District Attorney's office and the Attorney of the defendant. The report includes evidence shared, how it was sent, and a list of items shared.

EIZO events report

The EIZO events report task is a monitoring task that you can use to search, review, and generate reports on EIZO custom events for analysis.

EIZO ONVIF camera

An EIZO ONVIF camera custom entity is created using the EIZO Video Wall plugin in Security Center. You can use an EIZO ONVIF camera entity to control a camera directly from the Monitoring task.

EIZO Video Wall

The EIZO Video Wall plugin integrates EIZO video walls into Security Center. You can use this plugin to monitor entities or display live video and alarms on video walls.

electric door strike

An electric door strike is an electric device that releases the door latch when current is applied.

elevator

An elevator is an entity that provides access control properties to elevators. For an elevator, each floor is considered an access point.

Elevator activities

The Elevator activities task is an investigation task that reports on elevator related activities, such as access denied, floor accessed, unit is offline, hardware tamper, and so on.

Elevator dispatch activities

The Elevator dispatch activities task is an investigation task that reports on elevator related activities, including the credential that was swiped by a cardholder at a kiosk; the elevator group that was used; the source and destination floor; and the timestamps of when the cardholder swiped their card and selected their destination floor.

encryption certificate

An encryption certificate, also known as a digital certificate or public-key certificate, is an electronic document that contains a public and private key pair used in Security Center for fusion stream encryption. Information encrypted with the public key can only be decrypted with the matching private key.

enforce

To enforce is to take action following a confirmed hit. For example, a parking officer can enforce a scofflaw violation (unpaid parking tickets) by placing a wheel boot on the vehicle.

entity

An entity represents anything in your system that requires configuration. This can be a physical device, such as a camera or a door, or an abstract concept, such as an alarm, a schedule, a user, a role, a plugin, or an add-on.

entity (Industrial IoT)

In the context of Industrial IoT, an entity is a virtual device used to represents a set of data points that can belong to a single or multiple devices. From a configuration perspective, you can do with entities everything you can do with devices. The only difference between devices and entities is that a device is tied to one protocol while an entity is not.

entity tree

An entity tree is the graphical representation of Security Center entities in a tree structure, illustrating the hierarchical nature of their relationships.

Error (severity level)

The Error severity level indicates that the system event is critical. To have your system continue running smoothly and not incur the loss of information, immediate attention is required. System events and their corresponding severity levels appear on the Health monitoring page and in the health dashboard.

essential worker

An essential worker is an individual who does not need to be counted in the mustering list because they are part of the team ensuring everyone's safety. For example, a security guard, a mustering captain, or the driver of a truck retrieving people from around campus.

Evacuation Assistant

Evacuation Assistant helps you manage and monitor emergency evacuations to ensure the safety of individuals by tracking who has or has not reached their designated mustering points. Evacuation Assistant is integrated into Security Center through a plugin role. You can track evacuations in real time using the portal available through this role.

event

An event is a record of an activity or incident that occurred in the system. Security personnel can monitor events in real time and investigate them later. Events can also trigger automations in the system.

event-to-action

An event-to-action links an action to an event. For example, you can configure an alarm to trigger when a door is forced open.

Exchangeable Image File

Exchangeable Image File (EXIF) encodes additional information in an image file, such as when and where the image was taken. This additional information provides chain of custody information that can be can be used by internal or external authorities in the analysis of a case and in a court of law where admissible.

Exchangeable Image File (EXIF)

Acronym: EXIF

expansion server

An expansion server is any server machine in a Security Center system that does not host the Directory role. The purpose of the expansion server is to add to the processing power of the system.

extension

An extension refers to a group of manufacturer-specific settings found in the Extensions configuration page of a role, such as Archiver, Access Manager, or Intrusion Manager. Most extensions are built-in to Security Center, but some require the installation of an add-on; in those situations, the extension also refers to this add-on.

"F" terms

F2F protocol

The F2F protocol is a proprietary Casi Rusco reader protocol. F2F is a one-wire protocol, as opposed to two wires in the cases of Wiegand or OSDP.

failover

Failover is a backup operational mode in which a role (system function) is automatically transferred from its primary server to a secondary server that is on standby. This transfer between servers occurs only if the primary server becomes unavailable, either through failure or through scheduled downtime.

false positive read

False positive plate reads can occur when a license plate recognition system mistakes other objects in an image for license plates. For example, lettering on a vehicle or street signs can sometimes create false positive plate reads.

Federal Information Processing Standard

Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States federal government for use in computer systems by non-military government agencies and government contractors.

Federal Information Processing Standard (FIPS)

Acronym: FIPS

federated entity

A federated entity is any entity that is imported from an independent system through a Security Center Federation™ role.

federated identity

A federated identity is a security token that is generated outside of your own realm that you accept. Federated identity enables single sign-on, allowing users to sign on to applications in different realms without needing to enter realm-specific credentials.

federated reads matching

Federated reads matching is a feature that allows the live matching of license plate reads from federated sites against hotlists available on the Federation™ host. This feature makes it unnecessary to share hotlists with federated sites to raise hits.

federated system

A federated system is a independent Security Center system that is unified under your local Security Center through a Federation™ role, so that the local users can view and control its entities as if they belong to their local system.

Federation™

Federation™ joins multiple, independent Genetec™ security systems into a single virtual system. With this feature, users on a central system, called the Federation host, can view and control entities that belong to remote systems.

Federation™ host

The Federation™ host is the Security Center or Security Center SaaS system that runs Federation™ roles. Users on the Federation™ host can view entities that belong to federated systems and control the entities directly from their system.

Federation™ user

The Federation™ user is the local user account on the remote system that the Federation™ host uses to connect to the remote system. The Federation™ user must have the Federation™ privilege. It is used to control what the Federation™ host can access on the remote system.

file

A file in Clearance™ is a piece of digital evidence, such as a video, image, document, or other type of file. Files can be grouped within one or more cases.

first-person-in rule

The first-person-in rule is the additional access restriction placed on a secured area that prevents anyone from entering the area until a supervisor is on site. The restriction can be enforced when there is free access (on door unlock schedules) and when there is controlled access (on access rules).

Fleet health

The Fleet health task is an operation task that shows the status of your AVL units and their associated entities, such as cameras, Archiver, and GPS units. Use it to identify where to direct maintenance.

floor marking

A floor marking represents the floor serviced by an elevator or elevator group. It is the physical representation of the button located on an elevator kiosk.

Flowbird GO

The Flowbird GO plugin is an ALPR plugin. Using this plugin, you can automatically export license plate reads with related lane information to a Flowbird GO API from Security Center.

foreground

In KiwiVision™ Video Analytics, the image foreground is composed of people and mobile objects. These dynamic elements are identified by comparing the input image to the learned background to identify changes in an image.

Forensic search

The Forensic search task is an investigation task that searches for video sequences based on video analytics events.

four-port RS-485 module

A four-port RS-485 module is a RS-485 communication component of Synergis™ Master Controller with four ports (or channels) named A, B, C, and D. The number of interface modules you can connect to each channel depends on the type of hardware you have.

free access

A free access is an access point state where no credentials are necessary to enter a secured area. The door is unlocked. This is typically used during normal business hours, as a temporary measure during maintenance, or when the access control system is first powered up and is yet to be configured.

free exit

A free exit is an access point state where no credentials are necessary to leave a secured area. The person releases the door by turning the doorknob, or by pressing the REX button, and walks out. An automatic door closer shuts the door so it can be locked after being opened.

fusion stream

Fusion stream is a proprietary data structure of Genetec Inc. for streaming multimedia. Each fusion stream is a bundle of data (video, audio, and metadata) streams and key streams related to a single camera. Fusion streams are generated on specific client requests. The key streams are included only if the data streams are encrypted.

fusion stream encryption

Fusion stream encryption is a proprietary technology of Genetec Inc. used to protect the privacy of your video archives. The Archiver uses a two-level encryption strategy to ensure that only authorized client machines or users with the proper certificates on smart cards can access your private data.

fuzzy matching

Environmental factors such as dirt or snow can partially obstruct license plate characters and increase the likelihood of partial plate reads occurring. In addition, similarly shaped letters and numbers, like “2” and “Z” or, “8”, “B”, and “0”, can also reduce plate read accuracy. Fuzzy matching lets AutoVu™ compare reads not only to exact matches in hotlists, but also to potential or probable matches.

"G" terms

G64

G64 is a Security Center format used by archiving roles (Archiver and Auxiliary Archiver) to store video sequences issued from a single camera. This data format supports audio, bookmarks, metadata overlays, timestamps, motion and event markers, and variable frame rate and resolution.

G64x

G64x is a Security Center format used to store video sequences from multiple cameras that are exported or backed up simultaneously. This data format supports audio, bookmarks, metadata overlays, timestamps, motion and event markers, variable frame rate and resolution, and watermarking.

Genetec Citigraf™

Genetec Citigraf™ is a decision support system (DSS) that assists public safety departments such as law enforcement, fire, and emergency management, to collaborate, plan for, identify, and respond to situations happening in the city. It unifies public safety operations through situational awareness and the proper dissemination of information. To learn more about Genetec Citigraf™, refer to the Genetec Resource Center.

Genetec Citigraf™ Auto

Genetec Citigraf™ Auto is an add-on module for Genetec Patroller™. It enhances the situational awareness of patrol vehicle operators by showing correlated events from various sources on their portable data terminal.

Genetec Citigraf™ Command

Genetec Citigraf™ Command is an add-on module for Security Center. It allows Security Desk operators to receive public safety alerts and make better decisions by correlating events from various data sources to the situation they are facing, and by showing their respective locations on the map.

Genetec Citigraf™ Insights

Genetec Citigraf™ Insights is the web application for analyzing and deriving intelligence from data correlated from different sources. Using Genetec Citigraf™ Insights, public safety analysts can gauge the effectiveness of city initiatives, and refine their prevention plans, response strategies, and resource management to better prepare for the future.

Genetec Citigraf™ Mobile

Genetec Citigraf™ Mobile is the mobile app designed to bring the intelligence derived from the correlation of various data sources to smartphone and tablet users.

Clearance™

Genetec Clearance™ is an evidence management system that you can use to help accelerate investigations by securely collecting, managing, and sharing evidence from different sources.

Clearance™ Drive

Clearance™ Drive is an application used to transfer files, such as those generated by VMS, in-car systems, cellphones or body cameras, to Clearance™. Clearance™ Drive uses Windows File Explorer to facilitate mass transfer of files to and from Clearance™.

Genetec ClearID™

Genetec ClearID™ is a smarter way to manage physical access using a self-service solution for Synergis™.

Genetec ClearID™

The Genetec ClearID™ Plugin integrates Genetec ClearID™ with Security Center and connects Synergis™ and ClearID cloud services. Any actions performed in ClearID are automatically synchronized with Synergis.

Genetec ClearID™ API

The Genetec ClearID™ API is an Application Programming Interface that developers can use to help customers and partners integrate additional software or perform custom functions.

Genetec ClearID™ LDAP Synchronization Agent

The Genetec ClearID™ LDAP Synchronization Agent is a Windows application that is used to synchronize Active Directory (AD) Lightweight Directory Access Protocol (LDAP) attributes into Genetec ClearID™ identity attributes.

Genetec ClearID™ One Identity Synchronization Tool

The Genetec ClearID™ One Identity Synchronization Tool is a Windows service that you can use to import identities information from an external system into Genetec ClearID™.

Genetec ClearID™ Self-Service Kiosk

Genetec ClearID™ Self-Service Kiosk is a mobile app that simplifies the management of visitors enrolled using the Genetec ClearID™ self-service portal. The self-service kiosk is intended for visitor centers or gated facilities where guests check-in by themselves.

Genetec Mission Control™

Genetec Mission Control™ is a collaborative decision management system that provides organizations with new levels of situational intelligence, visualization, and complete incident management capabilities. It allows security personnel to make the right decision when faced with routine tasks or unanticipated situations by ensuring a timely flow of information. To learn more about Genetec Mission Control™, refer to the Genetec™ resource center.

Genetec Mission Control™ Web API

The Genetec Mission Control™ Web API is a suite of development tools with which our partners and customers can enhance their collaborative decision management systems by integrating additional software and custom functionality.

Genetec Motoscan™

Designed to help increase parking enforcement efficiency in cities with narrow streets, Genetec Motoscan™ is a lightweight, low-power, yet fully-featured license plate recognition unit that is designed to be easily mounted on a smaller vehicle such as a scooter or small motorcycle.

Genetec Patroller™

Genetec Patroller™ is the software application installed on an in-vehicle computer that analyzes license plate reads from AutoVu™ Sharp camera units. The application can be installed to operate in different modes to suit your specific enforcement needs and can be configured to notify the vehicle operator if immediate action is required.

Genetec Third-Party ALPR

The Third-Party ALPR plugin enables the integration of non-AutoVu ALPR cameras in Security Center. The plugin has an API to receive reads directly from cameras on the network and has integrations to ALPR systems.

Genetec™ Airport Badging Solution

Genetec™ Airport Badging Solution (ABS) is a complete airport ID badge management solution for Security Center Synergis™. It manages the badge application process from the collection of the applicant's personal information to the issuance of the physical badge. The process includes background checks by relevant authorities and the definition and enforcement of the airport's internal screening rules.

Genetec™ Airport Badging Solution (ABS)

Acronym: ABS

Genetec™ Container Image List Provider

The Genetec™ Container Image List Provider is a service developed by Genetec Inc. to retrieve the list of supported container images from the container registry.

Genetec™ Enhanced Cardholder Management

The Genetec™ Enhanced Cardholder Management plugin is an access control plugin that extends the functionality of the Cardholder management task in Security Center. The plugin adds cardholder field options and cardholder templates.

Genetec™ Intrusion Bridge

The Genetec™ Intrusion Bridge is the component of the Genetec™ Intrusion Protocol that communicates with intrusion alarm panels and relays their information to Security Center.

Genetec™ Intrusion Hub

The Genetec™ Intrusion Hub is a component of the Genetec™ Intrusion Protocol that enables the connection between the Intrusion Manager and the Genetec™ Intrusion Bridge.

Genetec™ Intrusion Protocol

The Genetec™ Intrusion Protocol integrates specific third-party intrusion panels with Security Center, either on-premise or hosted. You can then monitor and investigate intrusion events in Security Desk.

Genetec™ Mobile

Official name of the map-based Security Center mobile application for Android and iOS devices.

Genetec™ Protocol

Genetec™ Protocol is a standard protocol developed by Genetec Inc. that third-party video encoder and IP camera manufacturers can use to integrate their products to Security Center Omnicast™.

Genetec™ Receiver

The Genetec™ Receiver extension integrates alarm receivers into Security Center so that operators can monitor alarms forwarded by the alarm receivers from connected intrusion panels.

Genetec™ Server

Genetec™ Server is the Windows service that is at the core of Security Center architecture, and that must be installed on every computer that is part of the Security Center's pool of servers. Every such server is a generic computing resource capable of taking on any role (set of functions) you assign to it.

Genetec™ Update Service

The Genetec™ Update Service (GUS) is automatically installed with most Genetec™ products and enables you to update products when a new release becomes available.

Genetec™ Update Service (GUS)

Acronym: GUS

Genetec™ Update Service Sidecar

The Genetec™ Update Service Sidecar is a Windows service that is needed for GUS to communicate with other components. It is installed with the GUS.

Genetec™ Update Service (GUS) Sidecar

Acronym: GUS Sidecar

Genetec™ Video Player

Genetec™ Video Player is a standalone media player you can use to view G64 and G64x video files exported from Security Desk. You can also use it to view video on a computer that does not have Security Center installed.

geocoding

Geocoding, sometimes called forward geocoding, is the process of converting a street address into geographic location, such as a latitude and longitude pair.

Geographic Information System

Geographic Information System (GIS) is a system that captures spatial geographical data. Map Manager can connect to third-party vendors that provide GIS services in order to bring maps and all types of geographically referenced data to Security Center.

Geographic Information System (GIS)

Acronym: GIS

georeferencing

Georeferencing is the process of using an object’s geographic coordinates (latitude and longitude) to determine its position on a map.

ghost camera

A ghost camera is an entity used as a substitute camera. This entity is automatically created by the Archiver when video archives are detected for a camera whose definition has been deleted from the Directory, either accidentally or because the physical device no longer exists. Ghost cameras cannot be configured, and only exist so users can reference the video archive that would otherwise not be associated to any camera.

ghost patroller

A ghost patroller entity is automatically created by the ALPR Manager when the AutoVu™ license includes the XML Import module. In Security Center, all ALPR data must be associated to a Genetec Patroller™ entity or an ALPR unit corresponding to a fixed Sharp camera. When you import ALPR data from an external source through a specific ALPR Manager using the XML Import module, the system uses the ghost entity to represent the ALPR data source. You can formulate queries using the ghost entity as you would with a normal entity.

global antipassback

Global antipassback is a feature that extends the antipassback restrictions to areas controlled by multiple Synergis™ units.

Global cardholder management

Global cardholder management (GCM) is used to synchronize cardholders between independent Security Center installations. With GCM, you can have a central repository of cardholder information for your entire organization, whether this information is managed from a central office or by individual regional offices.

Global cardholder management (GCM)

Acronym: GCM

Global Cardholder Synchronizer

The Global Cardholder Synchronizer (GCS) role ensures the two-way synchronization of shared cardholders and their related entities between the local system (sharing guest) where it resides and the central system (sharing host).

Global Cardholder Synchronizer (GCS)

Acronym: GCS

Global Destination Entry Computer

A Global Destination Entry Computer (DEC), is a point of entry in the Otis CompassPlus™ Destination Management system that can manage the elevator dispatch settings of multiple elevator groups. Global DECs are located at elevator landings where cardholders can access different groups of elevators, such as a lobby. Global DECs send elevator dispatch requests to a Destination Entry Redirector (DER), which forwards the request to the correct elevator group.

global entity

A global entity is an entity that is shared across multiple independent Security Center systems by virtue of its membership to a global partition. Only cardholders, cardholder groups, credentials, and badge templates are eligible for sharing.

global partition

Global partition is a partition that is shared across multiple independent Security Center systems by the partition owner, called the sharing host.

global watchlist

In Genetec ClearID™, a global watchlist is a watchlist that is enforced across all sites in your system.

grace period

You can add a grace period to a parking session for purposes of lenient enforcement. Following the expiration of the vehicle’s paid time or convenience time, the grace period gives extra time before a parking session is flagged as a Violation.

group

A group in Clearance™ is a collection of users and integrations. The group's access policies are added to the policies that its members already have. Users and integrations can belong to more than one group.

"H" terms

hard antipassback

Hard antipassback logs the passback event in the database and prevents the door from being unlocked due to the passback event.

hardening

Hardening is the process of enhancing hardware and software security. When hardening a system, basic and advanced security measures are put in place to achieve a more secure operating environment.

hardware integration package

A hardware integration package, or HIP, is an update that can be applied to Security Center. It enables the management of new functionalities (for example, new video unit types), without requiring an upgrade to the next Security Center release.

hardware integration package (HIP)

Acronym: HIP

Hardware inventory

The Hardware inventory task is a maintenance task that reports on the characteristics (unit model, firmware version, IP address, time zone, and so on) of access control, video, intrusion detection, and ALPR units in your system.

hardware zone

A hardware zone is a zone entity in which the I/O linking is executed by a single access control unit. A hardware zone works independently of the Access Manager, and consequently, cannot be armed or disarmed from Security Desk.

hash function

In cryptography, a hash function uses a mathematical algorithm to take input data and return a fixed-size alphanumeric string. A hash function is designed to be a one-way function, that is, a function which is infeasible to revert.

health dashboard

The health dashboard is a pane on the homepage that provides a brief overview of the current health of your system. This dashboard shows a list of the five most recent system events that are active, and also indicates the number of system errors and warnings that are currently active.

Health history

The Health history task is a maintenance task that reports on health issues.

Health Monitor

The Health Monitor role monitors system entities such as servers, roles, units, and client applications for health issues.

Health statistics

The Health statistics task is a maintenance task that gives you an overall view of the health of your system by reporting on the availability of selected system entities such as roles, video units, and access control units.

high availability

High availability is a design approach that enables a system to perform at a higher than normal operational level. This often involves failover and load balancing.

hit

A hit is a license plate read that matches a hit rule, such as a hotlist, overtime rule, permit, or permit restriction. A Genetec Patroller™ user can choose to reject or accept a hit. An accepted hit can subsequently be enforced.

hit rule

A hit rule is an ALPR rule used to identify vehicles of interest (called "hits") using license plate reads. The hit rules include the following types: hotlist, overtime rule, permit, and permit restriction.

Hits

The Hits task is an investigation task that reports on hits reported within a selected time range and geographic area.

hot action

A hot action is an action mapped to a PC keyboard function key (Ctrl+F1 through Ctrl+F12) in Security Desk for quick access.

hotlist

A hotlist is a list of wanted vehicles, where each vehicle is identified by a license plate number, the issuing state, and the reason why the vehicle is wanted (stolen, wanted felon, Amber alert, VIP, and so on). Optional vehicle information might include the model, the color, and the vehicle identification number (VIN).

Hotlist and permit editor

The Hotlist and permit editor task is an operation task. You can use it to edit an existing hotlist or permit list. A new list cannot be created with this task, but after an existing list has been added to Security Center, you can edit, add, or delete items from the list, and the original text file is updated with the changes.

hotspot

A hotspot is a map object that represents an area on the map which requires special attention. Clicking on a hotspot displays associated fixed and PTZ cameras.

HUB MLPI Integration

With the AutoVu™ HUB MLPI Integration, you can export the latest MLPI data from Security Center to the HUB system.

"I" terms

I/O configuration

The I/O configuration task is a maintenance task that reports on the I/O configurations (controlled access points, doors, and elevators) of access control units.

I/O linking

I/O (input/output) linking is controlling an output relay based on the combined state (normal, active, or trouble) of a group of monitored inputs. A standard application is to sound a buzzer (through an output relay) when any window on the ground floor of a building is shattered (assuming that each window is monitored by a "glass break" sensor connected to an input).

I/O zone

An I/O zone is a zone entity in which the I/O linking can be spread across multiple Synergis™ units, while one unit acts as the master unit. All Synergis™ units involved in an I/O zone must be managed by the same Access Manager. The I/O zone works independently of the Access Manager, but ceases to function if the master unit is down. An I/O zone can be armed and disarmed from Security Desk as long as the master unit is online.

Identical plate multi-vehicle

The Identical plate multi-vehicle task is an investigation task to help you detect illegally duplicated license plates. The task flags license plates detected at locations too far apart for one vehicle to have traveled between reads.

identity

In Genetec ClearID™, an identity represents a person and defines what they can do across various platforms, security systems, business systems, and functions. Each identity has one or more access control badges (credentials) and is linked to a cardholder in Synergis™. ​For example, these credentials could be a Windows user (Active Directory), an employee (Human Resources and Payroll), a sales person (CRM and Quoting Tool), and a cardholder (Physical Security).

identity certificate

An identity certificate is a digital certificate used to authenticate one party to another in a secure communication over a public network. Identity certificates are generally issued by an authority that is trusted by both parties, called a certificate authority (CA).

identity provider

An identity provider is a trusted, external system that administers user accounts, and is responsible for providing user authentication and identity information to relying applications over a distributed network.

identity request workflow

An identity request workflow is a series of activities associated with an identity request. These activities are performed by the system or authorized people during the life cycle of an identity request. The activities can create an individual identity, or multiple identities (using a CSV import), and add each new identity to a role to inherit relevant role access for a specified period.

identity requests report

In Genetec ClearID™, an identity requests report is a list of identity requests for your ClearID account. The report includes information about the identity request date, requester, name, identity template, status, and reviewers.

iFob

An iFob entity represents a physical cylinder that attaches permanently to a key, set of keys, or an asset. The iFob has an electronic chip that gives it a unique identity. It is inserted into a receptor in a cabinet until released by an authorized user.

illuminator

An illuminator is a light in the Sharp unit that illuminates the plate, thereby improving the accuracy of the images produced by the ALPR camera.

iLOQ 5 Series

The iLOQ 5 Series is a self-powered digital locking and NFC-enabled mobile access management solution. From within Security Center, an operator can perform tasks such as assign an iLOQ credential like an iFob or mobile credential to cardholders and associate access rules that grant access to iLOQ locks.

Import tool

The Import tool is the tool that you can use to import cardholders, cardholder groups, and credentials from a comma-separated values (CSV) file.

inactive entity

An inactive entity is an entity that is shaded in red in the entity browser. It signals that the real world entity it represents is either not working, offline, or incorrectly configured.

incident

An incident is an unexpected event reported by a Security Desk user. Incident reports can use formatted text and include events and entities as support material.

incident (Genetec Mission Control™)

A Genetec Mission Control™ incident is an undesirable or unusual situation that needs investigation and resolution, or a routine, scheduled task that requires monitoring.

incident category

An incident category is an entity that represents a grouping of incident types that have similar characteristics.

Incident Manager

The Incident Manager is the central role that recognizes situational patterns, and triggers incidents in a Genetec Mission Control™ system. This role manages the automation workflows and keeps track of all user activities that are related to incidents.

Incident monitoring

The Incident monitoring task is an operation task that you can use to monitor and respond to incidents. From this task, you can see the incidents displayed on a map, thus improving your situational awareness.

incident owner

The incident owner is the incident recipient who took ownership of the incident. Only the incident owner can take actions to resolve the incident. An incident can only have one owner at a time.

incident recipient

An incident recipient is a user or user group that the incident has been dispatched to. Incident recipients can see the incident in the Incident monitoring task.

Incident report

The Incident report task is an investigation task that you can use to search, review, and analyze Genetec Mission Control™ incidents.

incident supervisor

An incident supervisor is a user who sees an incident in the Incident monitoring task because they supervise the incident recipients. Incident supervisors are not incident recipients themselves. A user cannot be both supervisor and recipient of the same incident.

incident trigger

An incident trigger is an event or a sequence of events that can trigger an incident. The Genetec Mission Control™ Rules Engine looks for specific combinations of events (type, time, correlation, and frequency) to determine whether to trigger an incident.

incident type

An incident type entity represents a situation that requires specific actions to resolve it. The incident type entity can also be used to automate the incident detection in Genetec Mission Control™ and to enforce the standard operating procedures that your security team must follow.

Incident configuration

The Incident configuration task is an administration task that you can use to configure the incident types, the incident categories, and the support documents for Genetec Mission Control™. You can also use this task to generate reports on the changes made to incident types.

Incidents

The Incidents task is an investigation task that you can use to search, review, and modify incident reports created by Security Desk users.

Industrial IoT

Industrial IoT is a building automation and control plugin. With this plugin, you can use Security Center to monitor and control devices that support one of the following IoT protocols: BACnet, HTTP Server, Modbus Client, MQTT Client, OPC Client, SNMP Client, and TCP Server.

Industrial IoT health history

The Industrial IoT health history task is an investigation task that reports on health events related to the plugin, the message queue, the protocols, and the managed devices.

Industrial IoT input activities

The Industrial IoT input activities task is an investigation task that reports on the state changes of the inputs associated to the device data points configured in the system.

EN/_Gloss/.dita.html

Industrial Protocol Interface

The Industrial Protocol Interface plugin is a building automation and control plugin. Using this plugin, you can expose Security Center data to compatible client applications using protocols such as BACnet or SNMP.

integration

An integration in Clearance™ is an external device or application that is authorized to transfer data to the Clearance™ account.

integrator administrator

User level that is assigned by the Stratocast™ cloud administrator. The integrator administrator level has the most privileges. You can only have one integrator administrator per integrator account, but you can register the same username to multiple accounts.

integrator user

User level that is assigned by the integrator administrator. The integrator user has the same privileges as the integrator administrator, except for the ability to add other integrator users. You can have an unlimited number of integrator users per integrator account, and they can each be assigned unique usernames or the same username.

interface module

An interface module is a third-party security device that communicates with an access control unit over IP or RS-485, and provides additional input, output, and reader connections to the unit.

interlock

An interlock (also known as sally port or airlock) is an access restriction placed on a secured area that permits only one perimeter door to be open at any given time.

Inter-System Gateway

The Inter-System (IS) Gateway is a Windows service that provides Security Center applications, access to independent systems running as containers on a virtualization platform.

Inter-System (IS) Gateway

IS Gateway

intrusion detection

Intrusion detection designates one of the following: intrusion detection (hardware) or intrusion detection (analytics).

Intrusion detection

The Intrusion detection task is an administration task that you can use to configure intrusion detection roles and units.

Intrusion detection area activities

The Intrusion detection area activities task is an investigation task that reports on activities (master arm, perimeter arm, duress, input trouble, and so on) in selected intrusion detection areas.

Intrusion detection unit events

The Intrusion detection unit events task is an investigation task that reports on events (AC fail, battery fail, unit lost, input trouble, and so on) related to selected intrusion detection units.

intrusion detection (analytics)

In KiwiVision™ video analytics, intrusion detection refers to the software technology that is used to automatically detect the intrusion of people, objects, or vehicles into protected or private areas when analyzing a video sequence.

intrusion detection (hardware)

In Security Center, intrusion detection refers to the detection of an intrusion into a secured area by an intrusion detection unit (hardware device).

intrusion detection area

An intrusion detection area entity represents a zone (sometimes called an area) or a partition (group of sensors) on an intrusion panel.

intrusion detection unit

An intrusion detection unit entity represents an intrusion device (intrusion panel, control panel, receiver, and so on) that is monitored and controlled by the Intrusion Manager role.

Intrusion Manager

The Intrusion Manager role monitors and controls intrusion detection units. It listens to the events reported by the units, provides live reports to Security Center, and logs the events in a database for future reporting.

intrusion panel

An intrusion panel (also known as alarm panel or control panel) is a wall-mounted unit where the alarm sensors (motion sensors, smoke detectors, door sensors, and so on) and wiring of the intrusion alarms are connected and managed.
Also known as: alarm panel

intrusion panel area

An intrusion panel area is and entity that represents an area, zone, or partition (group of sensors) configured on the intrusion panel. These areas only report events and cannot be controlled (armed, disarmed) from Security Center. On a map, an intrusion panel area is represented by an icon.

intrusion panel input

An intrusion panel input entity represents a sensor (motion sensor, smoke detector, door sensor, and so on) configured on the intrusion panel. These inputs report events and can be added to a Security Center map as an icon.

Inventory management

The Inventory management task is an operation task that you can use to add and reconcile license plate reads to a parking facility inventory.

Inventory report

The Inventory report task is an investigation task that you can use to view a specific inventory (vehicle location, vehicle length of stay, and so on) or compare two inventories of a selected parking facility (vehicles added, vehicles removed, and so on).

IP camera

An IP camera is a video encoder unit incorporating a camera.

IPv4

IPv4 is the first generation Internet protocol using a 32-bit address space.

IPv6

IPv6 is a 128-bit Internet protocol that uses eight groups of four hexadecimal digits for address space.

Item transactions

The Item transactions task is an investigation task in Security Desk. You can use it to investigate individual lines in a transaction that that took place in point-of-sale systems or at individual terminals.

"K" terms

Kashef Third-Party Matcher

The AutoVu™ - Kashef Third Party Matcher plugin forwards license plate reads to the Kashef API and triggers alarms based on the vehicle legal status returned from Kashef.

key logger

A key logger is a software or hardware solution that logs keystrokes for monitoring purposes.

Key Programmer

The Genetec™ Medeco XT Key Programmer is a service that provides the communication channel between the plugin and the USB key programming station. The service must run on the computer to which the USB key programming station connects.

Key Systems Security Asset Manager

The Key Systems Security Asset Manager plugin integrates Key Systems Security Asset Manager key cabinets into Security Center. You can use this plugin to manage Key Systems cardholders and assets in Config Tool, and monitor and report on assets and events related to the plugin in Security Desk.

Keyhole Markup Language

Keyhole Markup Language (KML) is a file format used to display geographic data in an Earth browser such as Google Earth and Google Maps.

Keyhole Markup Language (KML)

Acronym: KML

KiwiVision™ Camera Integrity Monitor

KiwiVision™ Camera Integrity Monitor is a Security Center module that ensures cameras are operational at all times by performing regular checks of their video to detect whether the cameras have been tampered with.

KiwiVision™ Analyzer

The KiwiVision™ Analyzer role performs video analytics processing for assigned cameras.

KiwiVision™ intrusion detector

(Obsolete) The KiwiVision™ intrusion detector task is an investigation task in Security Desk that is used to generate software intrusion detection reports. Starting in KiwiVision™ video analytics 4.1 GA, this task is replaced by the Security video analytics task.

KiwiVision™ Manager

The KiwiVision™ Manager role manages and distributes the video analytics requests to the available KiwiVision™ Analyzer roles, stores the events generated by these Analyzer roles, and handles the report requests sent from Security Desk.

KiwiVision™ People Counter

The KiwiVision™ People Counter module is part of the KiwiVision™ video analytics plugin, and adds analytics capabilities for people counting to Security Center.

KiwiVision™ Privacy Protector™

KiwiVision™ Privacy Protector™ is a Security Center module that ensures the privacy of individuals recorded by video surveillance cameras while safeguarding potential evidence.

KiwiVision™ Security video analytics

The KiwiVision™ Security video analytics module is part of the KiwiVision™ video analytics plugin, and adds analytics capabilities for security monitoring to Security Center.

KiwiVision™ video analytics

The KiwiVision™ video analytics plugin adds automation to security monitoring and people counting tasks through the KiwiVision™ Security video analytics and KiwiVision™ People Counter modules.

known issues

Known issues are software issues that have been discovered in the current or previous release of a product, and have not yet been resolved.

KONE Destination Dispatch

KONE Destination Dispatch is an elevator control plugin. Using this plugin, you can monitor and control elevators and cardholders managed by your KONE Destination Dispatch system from Security Center

KONE Group Controller

A KONE Group Controller is the system that manages the operation of KONE elevators and controls the operating panels related to the elevator group.

"L" terms

landing

A landing represents the physical location where a cardholder enters or exits an elevator.

Law Enforcement

Law Enforcement is a Genetec Patroller™ software installation that is configured for law enforcement: the matching of license plate reads against lists of wanted license plates (hotlists). The use of maps is optional.

layout

In Security Desk, a layout entity represents a snapshot of what is displayed in a Monitoring task. Only the tile pattern and the tile contents are saved, not the tile state.

license key

A license key is the software key used to unlock the Security Center software. The license key is specifically generated for each computer where the Directory role is installed. To obtain your license key, you need the System ID (which identifies your system) and the Validation key (which identifies your computer).

license plate read

A license plate read is a license plate number captured from a video image using ALPR technology.

license plate inventory

A license plate inventory is a list of license plate numbers of vehicles found in a parking facility within a given time period, showing where each vehicle is parked (sector and row).

limitations

Limitations are software or hardware issues that cannot be fixed for a product. For some limitations, workarounds are documented in the product release notes.

live event

A live event is an event that Security Center receives when the event occurs. Security Center processes live events in real-time. Live events are displayed in the event list in Security Desk and can be used to trigger event-to-actions.

live hit

A live hit is a hit matched by the Genetec Patroller™ and immediately sent to the Security Center over a wireless network.

live read

A live read is a license plate captured by the patrol vehicle and immediately sent to Security Center over a wireless network.

load balancing

Load balancing is the distribution of workload across multiple computers.

lockdown rule

The lockdown rule is a permanent access rule that denies access to all cardholders at all times, and can be used as an exception to rules that grant access.

logical ID

Logical ID is a unique ID assigned to each entity in the system for ease of reference. Logical IDs are only unique within a particular entity type.

Logons per Patroller

The Logons per Patroller task is an investigation task that reports on the logon records of a selected patrol vehicle.

long-term overtime

If you need to monitor long-term parking violations for vehicles that are parked for more than a certain number of days, you can configure long-term overtime settings in Genetec Patroller™ and Security Center.

Long-Term Support

The Long-Term Support (LTS) release track offers customers an upgrade path that minimizes changes to software and extends access to critical bug and security fixes. The LTS track includes major and patch versions. Minor versions are excluded. Choosing the LTS track limits your access to new capabilities, but increases stability due to less frequent code change and extends the maintenance period by two years.

Long-Term Support (LTS)

Acronym: LTS

LPM protocol

The License Plate Management (LPM) protocol provides a Sharp camera with a secure and reliable connection to Security Center. When The LPM protocol is enabled on a Sharp camera, the protocol manages the camera’s connection to the ALPR Manager role.

"M" terms

macro

A macro is an entity that encapsulates a C# program that adds custom functionalities to Security Center.

main server

The main server is the only server in a Security Center system hosting the Directory role. All other servers on the system must connect to the main server to be part of the same system. In a high availability configuration where multiple servers host the Directory role, it is the only server that can write to the Directory database.

major version

A major version is a software version that adds new features, behavioral changes, SDK capabilities, support for new devices, and performance improvements. Using backward compatibility mode, major versions are compatible with up to three previous major versions. A license update is required to upgrade to a new major version. A major version is indicated by a version number with zeros at the third and fourth positions: X.Y.0.0. For more information, see our Product Lifecycle page on GTAP.

manipulator-in-the-middle

In computer security, manipulator-in-the-middle is a form of cyberattack where attackers position themselves in communications between users and applications for information theft, to capture and manipulate sensitive information, or to gain a foothold for an advanced persistent threat.

manipulator-in-the-middle (MITM)

Acronym: MITM

manual capture

Manual capture is when license plate information is entered into the system by the user and not by the ALPR.

map

A map entity is a two-dimensional diagram that enables you to interact with your security equipment, while providing a reference to their physical locations and statuses.

Map designer

The Map designer task is an administration task that you can use to create and edit maps that represent the physical locations of your equipment to Security Desk users.

map link

A map link is a map object that brings you to another map with a single click.

Map Manager

The Map Manager is the central role that manages all mapping resources in Security Center, including imported map files, external map providers, and KML objects. It acts as the map server for all client applications that require maps and as the record provider for all Security Center entities placed on georeferenced maps. The Map Manager role replaced the Plan Manager role in Security Center 5.4 GA.

map mode

Map mode is a Security Desk canvas operating mode that replaces tiles and controls with a geographical map showing all active, georeferenced events in your system. Switching to Map mode is a feature that comes with AutoVu™, Correlation, or Genetec Mission Control™, and requires a license for one of these major features.

map object

Map objects graphically represent entities, cities, highways, and other geographical features on maps. Using map objects, you can interact with your system without leaving the map.

map preset

A map preset is a saved map view. Every map has at least one preset, called the default view, that is displayed when a user opens the map.

map view

A map view is a defined section of a map.

Maps

The Maps task is an operation task that heightens your situational awareness by providing the context of a map to your security monitoring and control activities.

master arm

Master arm is arming an intrusion detection area in such a way that all sensors attributed to the area would set the alarm off if one of them is triggered.
Also known as: Away arming

master key stream

In fusion stream encryption, the master key stream is the sequence of symmetric keys generated by the Archiver to encrypt one data stream. The symmetric keys are randomly generated and change every minute. For security reasons, the master key stream is never transmitted or stored anywhere as plaintext.

max occupancy

The max occupancy feature monitors the number of people in an area, up to a configured limit. Once the limit is reached, the rule will either deny access to additional cardholders (if set to Hard) or trigger events while allowing further access (Soft).

maximum session time

Setting a maximum session time helps to improve parking lot occupancy statistics. When a vehicle exceeds the maximum session time, it is assumed that the vehicle's plate was not read at the exit and the vehicle is no longer in the parking zone. The parking session appears in reports generated from the Parking sessions task with the State reason: Maximum session time exceeded.

MCE Sentry Destination Dispatch

The MCE Sentry Destination Dispatch plugin integrates the MCE Sentry elevator system into Security Center. Using the plugin, you can manage and monitor your elevators and cardholders in Security Center.

Medeco XT

The Medeco XT plugin imports your Medeco XT Intelligent keys, cylinders, and programming stations into Security Center so that you can manage access rules and investigate access events.

Media Gateway

The Media Gateway role is used by Genetec™ Mobile, Security Center Web Client, and Genetec™ Web App to get transcoded video from Security Center. The Media Gateway role supports the Real Time Streaming Protocol (RTSP), which external applications can use to request raw video streams from Security Center.

Media Router

The Media Router is the central role that handles all audio and video stream requests in Security Center or Security Center SaaS. It establishes streaming sessions between the stream source, such as a camera or an Archiver role, and the client applications that request the sessions. The location and transmission capabilities of each party determine the routing decisions.

minor version

A minor version is a software version that adds new features, SDK capabilities, support for new devices, bug fixes, and security fixes. Different system components can run at different minor versions, provided they share the same major version. No license update is required to upgrade to a new minor version. A minor version is indicated by a version number with a zero at the fourth position: X.Y.Z.0. For more information, see our Product Lifecycle page on GTAP.

missing file

A missing file is a video file that is still referenced by an archive database, but cannot be accessed anymore. This situation occurs when video files are deleted manually without using the Archive storage details task, creating a mismatch between the number of video files referenced in the database and the actual number of video files stored on disk.

Mobile Admin

(Obsolete as of SC 5.8 GA) Mobile Admin is a web-based administration tool used to configure the Mobile Server.

mobile authentication key

A string of user-defined characters that is used to authenticate a user's identity for mobile applications. When connecting to the Stratocast™ mobile apps from a mobile device, users must enter a valid mobile authentication key.

mobile credential

A mobile credential is a credential on a smartphone that uses Bluetooth or Near Field Communication (NFC) technology to access secured areas.

Mobile Credential Manager

The Mobile Credential Manager role links Security Center to your third-party mobile credential provider so that you can view your subscription status, and manage your mobile credentials and profiles in Config Tool.

mobile credential profile

A mobile credential profile links a part number from your mobile credential provider to your subscription so that you can create mobile credentials in Security Center.

Mobile Data Computer

Mobile Data Computer is a tablet computer or ruggedized laptop used in patrol vehicles to run the Genetec Patroller™ application. The MDC is typically equipped with a touch-screen with a minimum resolution of 800 x 600 pixels and wireless networking capability.

Mobile Data Computer (MDC)

Acronym: MDC

Mobile License Plate Inventory

Mobile License Plate Inventory (MLPI) is the Genetec Patroller™ software installation that is configured for collecting license plates and other vehicle information for creating and maintaining a license plate inventory for a large parking area or parking garage.

Mobile License Plate Inventory (MLPI)

Acronym: MLPI

Mobile Server

The Mobile Server role provides Security Center access on mobile devices.

Modbus

Modbus is a communication protocol used by electronic devices to transmit data to a computer for building automation and control. Using the Industrial IoT plugin, you can turn Security Center into a Modbus client application.

monitor group

A monitor group is an entity used to designate analog monitors for alarm display. Besides the monitor groups, the only other way to display alarms in real time is to use the Alarm monitoring task in Security Desk.

monitor ID

Monitor ID is an ID used to uniquely identify a workstation screen controlled by Security Desk.

Monitoring

The Monitoring task is an operation task that you can use to monitor and respond to real-time events that relate to selected entities. Using the Monitoring task, you can also monitor and respond to alarms.

Morse Watchmans KeyWatcher Touch

The Morse Watchmans KeyWatcher Touch plugin integrates KeyWatcher sites, lockers and keys into Security Center.

motion detection

Motion detection is the feature that watches for changes in a series of video images. The definition of what constitutes motion in a video can be based on highly sophisticated criteria.

Motion search

The Motion search task is an investigation task that searches for motion detected in specific areas of a camera's field of view.

motion zone

A motion zone is a user defined areas within a video image where motion should be detected.

Move unit

Move unit tool is used to move units from one manager role to another. The move preserves all unit configurations and data. After the move, the new manager immediately takes on the command and control function of the unit, while the old manager continues to manage the unit data collected before the move.

multi-factor authentication

Multi-factor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction.

Multi-Factor Authentication (MFA)

Acronym: MFA

multi-tenant parking

If you manage transient parking and contract permit parking in parking zones, you can install AutoVu Free-Flow Multi-tenant plugin to manage parking lots where parking spots are leased to tenants.

Mustering (task)

The Mustering task is used to generate a list of people who have physically reached their emergency mustering areas.

mustering area

A mustering area is an area in Security Center that represents where individuals must gather during emergency evacuations.

mustering captain

A mustering captain is the person responsible for ensuring everyone in a given area is safely evacuated and gathered to a designated mustering area during an emergency evacuation. For example, there could be a mustering captain assigned to each floor of a building.

mustering operation

A mustering operation consists of moving a cardholder to a mustering area, either manually from the Mustering task, or by presenting a credential to the associated USB reader.

mustering point

A mustering point refers to the reader that evacuees must badge onto to confirm their safety during an emergency evacuation.

My offloads

The My offloads task is an investigation task you can use to offload data from a vehicle system to Security Center. Use it to view queued, in-progress, and completed offloads, and easily launch new ones.

"N" terms

NAS volume

A NAS (network attached storage) volume is a formatted section on the hard disk of a NAS, which represents a logical storage device that is independent from the other volumes on the same NAS. You can store video recordings from a single camera to a designated NAS volume on your NAS device.

network

The network entity is used to capture the characteristics of the networks used by your system so that proper stream routing decisions can be made.

network address translation

Network address translation is the process of modifying network address information in datagram (IP) packet headers while in transit across a traffic routing device, for the purpose of remapping one IP address space into another.

network address translation (NAT)

Acronym: NAT

network attached storage

A network attached storage (NAS) is an edge recording storage device that has a dedicated network address and IP address, and provides file storing and sharing capabilities to other devices on the same network. With a NAS, you can expand the hard disk space of your local network and securely store more recordings from more cameras.

network attached storage (NAS)

Acronym: NAS

network view

The network view is a browser view that illustrates your network environment by showing each server under the network they belong to.

Network view

The Network view task is an administration task that you can use to configure your networks and servers.

new wanted

A new wanted is a manually entered hotlist item in Genetec Patroller™. When you are looking for a plate that does not appear in the hotlists loaded in the Genetec Patroller™, you can enter the plate in order to raise a hit if the plate is captured.

node

Nodes are roadside detectors and segment endpoints that gather data for the Travel Times Engine. Nodes can serve several different functions in the calculation of travel times, such as being the source or destination used in these calculations.

notification tray

The notification tray contains icons that allow quick access to certain system features, and also displays indicators for system events and status information. The notification tray display settings are saved as part of your user profile and apply to both Security Desk and Config Tool.

"O" terms

OCR equivalence

OCR equivalence is the interpretation of OCR (Optical Character Recognition) equivalent characters performed during license plate recognition. OCR equivalent characters are visually similar, depending on the plate’s font. For example, the letter “O” and the number “0”, or the number “5” and the letter “S”. There are several pre-defined OCR equivalent characters for different languages.

odometry sensor

To track and display a patrol vehicle's position accurately on a map, you can provide an odometry signal to the SharpZ3 system by installing an odometry sensor on the drive shaft of the vehicle.

officer

An officer, or wearable camera user, is an entity that identifies a person who holds a body-worn camera license and uploads video evidence to Genetec Clearance™ or a Security Center video archive. Officers are automatically added when a camera is connected to the Genetec Clearance™ Uploader, but can also be added and modified manually.

offline event

An offline event is an event that occurs while the event source is offline. Security Center only receives the offline events when the event source is back online.

offloading

Offloading is the process of transferring data and video data from a vehicle system to a central system.

Omnicast™

Security Center Omnicast™ is the IP video management system (VMS) that provides organizations of all sizes the ability to deploy a surveillance system adapted to their needs. Supporting a wide range of IP cameras, it addresses the growing demand for HD video and analytics, all the while protecting individual privacy.

Omnicast™ compatibility pack

Omnicast™ compatibility pack is the software component that you need to install to make Security Center compatible with an Omnicast™ 4.x system. Please note Omnicast™ 4.8 has reached End of Life. For more information, see the Genetec™ Product Lifecyle page.

Omnicast™ Federation™

The Omnicast™ Federation™ role connects an Omnicast™ 4.x system to Security Center. That way, the Omnicast™ entities and events can be used in your Security Center system. Please note Omnicast™ 4.8 has reached End of Life. For more information, see the Genetec™ Product Lifecyle page.

orphan file

An orphan file is a video file that is no longer referenced by any archive database. Orphan files remain on the disk until they are manually deleted. This situation occurs when the archive database is changed inadvertently, creating a mismatch between the number of video files referenced in the database and the actual number of video files stored on disk.

Otis Compass

The Otis Compass plugin integrates the Otis CompassPlus™ Destination Management system into Security Center. Using this plugin, you can manage and monitor your elevators and cardholders in Security Center.

Otis Compass activities

The Otis Compass activities task is an investigation task that reports on the entities and events related to the Otis CompassPlus™ Destination Management system.

output behavior

An output behavior is an entity that defines a custom output signal format, such as a pulse with a delay and duration.

overtime rule

An overtime rule is an entity that defines a parking time limit and the maximum number of violations enforceable within a single day. Overtime rules are used in city and university parking enforcement. For university parking, an overtime rule also defines the parking area where these restrictions apply.

Owner Authentication Key

An Owner Authentication Key (OAK) is a security key that is used to ensure that only the owner or authorized user(s) of a device are able to register the device with a service.

Owner Authentication Key (OAK)

Acronym: OAK

"P" terms

paid time

The paid time stage of a parking session begins when the convenience time expires. Vehicle owners can purchase parking time through a pay station or mobile app, and the payment system can be provided by integrated third-party parking permit providers.

parking facility

A parking facility entity defines a large parking area as a number of sectors and rows for the purpose of inventory tracking.

parking lot

A parking lot is a polygon that defines the location and shape of a parking area on a map. By defining the number of parking spaces inside the parking lot, Security Center can calculate its percentage of occupancy during a given time period.

parking rule

A parking rule defines how and when a parking session is either considered to be valid or in violation.

parking session

The AutoVu™ Free-Flow feature in Security Center uses parking sessions to track each vehicle's stay in a parking zone. A parking session is divided into four states: Valid (including convenience time, paid time, and grace period), Violation, Enforced, and Completed.

parking session states

A vehicle's parking session is divided into four states: Valid (including convenience time, paid time, and grace period), Violation, Enforced, and Completed. When a vehicle parks in a parking zone, its parking session progresses through the parking session states based on the timing that is configured for the parking rule, the validity of the paid time, and whether the vehicle's parking session incurs a violation.

Parking sessions

The Parking sessions task is an investigation task that you can use to generate a list of vehicles that are currently in violation. You can create a vehicle inventory report for the current parking zone occupancy or for a specific time in the past based on the selected time filter.

parking zone

The parking zones that you define in Security Center represent off-street parking lots where the entrances and exits are monitored by Sharp cameras.

parking zone capacity

The parking zone capacity is the maximum number of vehicles that can be parked in a parking zone.

parking zone capacity threshold

The parking zone capacity threshold setting determines at what point a capacity threshold reached event is generated. For example, if you lower the threshold to 90%, the system generates an event when the parking zone reaches 90% capacity.

Parking zone activities

The Parking zone activities task is an investigation task that you can use to track the parking zone-related events that occur between the time the vehicle's plate is read at the entrance and at the exit of the parking zone.

parser

A parser receives, standardizes, and formats data from a point-of-sale system, so it can be pushed to Security Center.

participant

A participant is an individual or business that wishes to share videos with a Clearance™ account. You can add participants' cameras to the Clearance™ registry to make them available to system users.

partition

A partition is an entity in Security Center that defines a set of entities that are only visible to a specific group of users. For example, a partition could include all areas, doors, cameras, and zones in one building.

patch version

A patch version is a software version that adds support for new devices, bug fixes, and security fixes. Patch versions do not affect system compatibility, as long as all your system components are at the same major version. A patch version is indicated by a version number where the fourth position is not a zero. For more information, see our Product Lifecycle page on GTAP.

patrol vehicle

A patrol vehicle monitors parking lots and city streets for parking violations or wanted vehicles. A patrol vehicle includes one or more Sharp automatic license plate recognition (ALPR) cameras and an in-vehicle computer running Genetec Patroller™ software.

Patroller Config Tool

Genetec Patroller™ Config Tool is the Genetec Patroller™ administrative application used to configure Patroller-specific settings, such as adding Sharp cameras to the in-vehicle LAN, enabling features such as Manual Capture or New Wanted, and specifying that a username and password are needed to log on to Genetec Patroller™.

patroller entity

A patroller entity in Security Center represents a patrol vehicle equipped with an in-vehicle computer running Genetec Patroller™ software.

Patroller tracking

The Patroller tracking task is an investigation task that you can use to replay the route followed by a patrol vehicle on a given date on a map, or view the current location of patrol vehicles on a map.

People counting

The People counting task is an operation task that keeps count in real-time of the number of cardholders in all secured areas of your system.

people counting (analytics)

In KiwiVision™ video analytics, people counting refers to the software technology that is used to detect the number of people in an area, and entering or exiting an area.

perimeter arm

Perimeter arm is arming an intrusion detection area in such a way that only sensors attributed to the area perimeter set the alarm off if triggered. Other sensors, such as motion sensors inside the area, are ignored.

permission level

Permission levels in Clearance™ are used to define the level of access granted on a case or a file. The different permission levels include View only, View and download, Edit, and Manage, and they can be granted to an integration, user, group, or department.

permit

A permit is an entity that defines a single parking permit holder. Each permit holder is characterized by a category (permit zone), a license plate number, a license issuing state, and optionally, a permit validity range (effective date and expiry date). Permits are used in both city and university parking enforcement.

permit hit

A permit hit is a hit that is generated when a read (license plate number) does not match any entry in a permit or when it matches an invalid permit.

permit restriction

A permit restriction is an entity that applies time restrictions to a series of parking permits for a given parking area. Permit restrictions can be used by patrol vehicles configured for University Parking Enforcement and for systems that use the AutoVu™ Free-Flow feature.

Personal Identity Verification

Personal Identity Verification (PIV) is a credential specified by the US government's Federal Information Processing Standard Publication 201 (FIPS 201), which specifies cryptographic key sizes, algorithms, biometrics, and best practices in physical access control.

Personal Identity Verification (PIV)

Acronym: PIV

Personal Identity Verification-Interpoerable

Personal Identity Verification-Interoperable (PIV-I) is a credential specified by the US government's Federal Information Processing Standard Publication 201 (FIPS 201), which is mainly issued by US non-federal entities, but might be used for either federal or non-federal installations.

Personal Identity Verification-Interoperable (PIV-I)

Acronym: PIV-I

PIN padding

PIN padding is a DMP Intrusion Panel extension feature that adds leading zeroes to PINs that are shorter than the specified minimum length.

pixelation

In KiwiVision™ Video Analytics, pixelation is an anonymization method that uses groups of pixels, called blocks, to obscure all or part of an image.

plaintext

In cryptography, plaintext is the data that is not encrypted.

Plan Manager

(Obsolete) Plan Manager is a module of Security Center that provides interactive mapping functionality to better visualize your security environment. The Plan Manager module has been replaced by the Security Center role, Map Manager, since version 5.4 GA.

Plate link

When a patrol vehicle that is registered with Plate link enters a parking zone, it downloads all recent plate reads and hits from other patrol vehicles that are registered with the same account. This data sharing ensures that the system catches parking violations that would otherwise be missed.

Plate Reader

Plate Reader is the software component of the Sharp unit that processes the images captured by the ALPR camera to produce license plate reads, and associates each license plate read with a context image captured by the context camera. The Plate Reader also handles the communications with the Genetec Patroller™ and the ALPR Manager. If an external wheel imaging camera is connected to the Sharp unit, the Plate Reader also captures wheel images from this camera.

plugin

A plugin (in lowercase) is a software component that adds a specific feature to an existing program. Depending on the context, plugin can refer either to the software component itself or to the software package used to install the software component.

Plugin

Plugin (with an uppercase, in singular) is the role template that serves to create specific plugin roles.

plugin role

A plugin role adds optional features to Security Center. A plugin role is created by using the Plugin role template. By default, it is represented by an orange puzzle piece in the Roles view of the System task. Before you can create a plugin role, the software package specific to that role must be installed on your system.

Plugins

The Plugins task is an administration task that you can use to configure plugin-specific roles and related entities.

Point of sale

Point of sale (POS) is a system that typically refers to the hardware and software used for checkouts - the equivalent of an electronic cash register. These systems are used to capture detailed transactions, authorize payments, track inventory, audit sales, and manage employees. Point of sale systems are used in supermarkets, restaurants, hotels, stadiums, casinos, retail establishments.

Point of sale (POS)

Acronym: POS

Post-Payment

The AutoVu™ Post-Payment plugin validates the parking session against the parking lot rules and the payment provider database, and then sends an evidence package to ticketing system if an infraction is detected.

Powered by Genetec

Powered by Genetec is a Genetec™ program where Genetec Inc. works with its partners to deploy Genetec™ software directly on their devices or firmware. Axis Powered by Genetec is the first application of this program.

primary server

The primary server is the default server chosen to perform a specific function (or role) in the system. To increase the system's fault-tolerance, the primary server can be protected by a secondary server on standby. When the primary server becomes unavailable, the secondary server automatically takes over.

primitive rule

A primitive rule is a method used by Synergis™ Softwire to generate an action when a trigger event occurs, even when the Synergis™ unit is disconnected from its Access Manager.

privacy protection

In Security Center, privacy protection is software that anonymizes or masks parts of a video stream where movement is detected. The identity of individuals or moving objects is protected, without obscuring movements and actions or preventing monitoring.

Privacy Protector™

The Privacy Protector™ role requests original video streams from Archiver roles and applies data anonymization to the original video streams. The privacy-protected (anonymized) video stream is then sent back to the Archiver role for recording.

private IP address

A private IP address is an IP address chosen from a range of addresses that are only valid for use on a LAN. The ranges for a private IP address are: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.16.255.255, and 192.168.0.0 to 192.168.255.255. Routers on the Internet are normally configured to discard any traffic using private IP addresses.

private key

In cryptography, a private or secret key is either an encryption or decryption key known only to one of the parties that exchange secret messages.

private task

A private task is a saved task that is only visible to the user who created it.

privilege

Privileges define what users can do, such as arming zones, blocking cameras, and unlocking doors, over the part of the system they have access rights to.

Privilege troubleshooter

The Privilege troubleshooter is a tool that helps you investigate the allocation of user privileges in your Security Center system. With this tool, you can discover:
  • Who has permission to work with a selected entity
  • What privileges are granted to selected users or groups
  • Who has been granted a privilege, has access to a specific entity, or both

profile

A profile in Genetec Mission Control™ is an incident filter used to distribute active incidents among the operators who are currently logged on to the system. Profiles filter incidents by type and by occurrence location.

programming station

A programming station is a workstation that runs the Medeco XT Key Programmer software. The programming station configures electronic keys. In Security Center, this device is represented by the programming station entity.

protection ending period

The protection ending period is a setting in Security Center that is applied automatically to video when a user manually removes the video's protection. During this 24-hour period, the video continues to be protected from deletion.

provisioning rule

In Genetec ClearID™, a provisioning rule is a logic-based criterion used to grant or revoke access by adding identities to or removing identities from a specific role or area.​

proxSafe Asset Inventory Report

The proxSafe Asset Inventory Report task is an operation task in Security Desk. You can use this task to view a list of all deister proxSafe assets that are part of your system, and view information about an asset, such as an asset's associated locker, whether the asset is currently in the locker, or when the asset is scheduled to be returned.

proxSafe Asset Release

The proxSafe Asset Release task is an operation task in Security Desk. You can use this task to manually release deister proxSafe assets to cardholders.

proxSafe Asset Management

The proxSafe Asset Management task is an operation task in Config Tool. You can use this task to manage deister proxSafe assets and asset groups.

proxSafe Event Report

The proxSafe Event Report report is an investigation task in Security Desk. You use it to investigate events that occurred at deister proxSafe lockers.

proxy authentication

Proxy authentication is the process of validating user credentials for access to a proxy server. This authentication typically includes a username and can also include a password.

proxy server

A proxy server is a server that verifies and forwards incoming client requests to other servers for further communication. For example, when a client is unable to meet the security authentication requirements of the server but should be permitted access to some services.

public area (airport)

A public area is any area of an airport open to the general public.

public key

In cryptography, a public key is a value provided by a designated authority as an encryption key that, combined with a private key that is generated at the same time, can be used to effectively encrypt messages and verify digital signatures.

public task

A public task is a saved task that can be shared and reused among multiple Security Center users.

public-key encryption

Public-key encryption, also known as asymmetric encryption, is a type of encryption where two different keys are used to encrypt and decrypt information. The private key is a key that is known only to its owner, while the public key can be shared with other entities on the network. What is encrypted with one key can only be decrypted with the other key.

public-key infrastructure

A public-key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to support the distribution and identification of public encryption keys. This enables users and computers to securely exchange data over networks such as the Internet and verify the identity of the other party.

public-key infrastructure (PKI)

Acronym: PKI

push notification

A push notification is the delivery of information or a message from a software application to a mobile device, without a specific request from the client.

"R" terms

RabbitMQ

RabbitMQ is a message broker software that transmits data from external devices and systems to Security Center. The following Genetec™ software install and use RabbitMQ: Genetec Mission Control™, Sipelia™, Restricted Security Area Surveillance, and Industrial IoT.

Rap Back

Rap Back (Record of Arrest and Prosecutions BACK) is a service under the FBI's Next Generation Identification (NGI) system that enables authorized entities to receive ongoing notifications of subsequent criminal history changes reported for individuals who have submitted fingerprints as part of a CHRC.

read fusing

For patrol vehicles that are configured with forward-facing and rear-facing cameras, you can fuse reads from multiple cameras to improve the capture rate and read rate. When read fusing is activated and two Sharp cameras read one or both of the vehicle's plates, only the best plate read from the two fused cameras is kept. The other plate read is discarded.

read rate

The read rate measures the speed at which a license plate recognition system can correctly detect and read all of the characters in an image of a license plate.

reader

A reader is a sensor that reads the credential for an access control system. For example, this can be a card reader, or a biometrics scanner.

Reads

The Reads task is an investigation task that reports on license plate reads performed within a selected time range and geographic area.

Reads/hits per day

The Reads/hits per day task is an investigation task that reports on license plate reads performed within a selected time range and geographic area.

Reads/hits per zone

The Reads/hits per zone task is an investigation task that reports on the number of reads and hits per parking area for a selected date range.

realm

In identity terms, a realm is the set of applications, URLs, domains, or sites for which a token is valid. Typically a realm is defined using an Internet domain such as genetec.com, or a path within that domain, such as genetec.com/support/GTAC. A realm is sometimes described as a security domain because it encompasses all applications within a specified security boundary.

Receiver activities

The Receiver activities task is an investigation task that reports on the events sent by alarm receivers and connected intrusion panels. There is a receiver activities report for each manufacturer supported by the Receiver extension.

receiver unit

A receiver unit is an entity in the area view that contains the intrusion panels connected to an alarm receiver.

record cache

The record cache is the database where the Record Caching Service role keeps copies of records ingested from external data sources in Security Center. You can generate reports on the cached records using the Unified report investigation task.

Record Caching Service

The Record Caching Service role is used for data ingestion. Using this role, you can import records from external data sources into Security Center. You can share the ingested data across the entire unified platform to enhance awareness and response, to provide contextual information on dynamic maps, or to visualize in operational dashboards.

Record Fusion Service

The Record Fusion Service is the central role that provides a unified querying mechanism for data records that come from a wide variety of sources, such as Security Center modules or third-party applications. All record requests go through this role, which then queries their respective record providers.

record provider

A record provider is either a Security Center role or an SDK application that connects a data source to the Record Fusion Service role.

record type

In Security Center, a record type defines the data format and display properties of a set of records that you can share across the entire system through the Record Fusion Service role.

recording mode

Recording mode is the criteria by which the system schedules the recording of video streams. There are four possible recording modes:
  • Continuous. Records continuously.
  • On motion/Manual. Records according to motion detection settings, and when a user or system action requests it.
  • Manual. Records only when a user or system action requests it.
  • Off. No recording is permitted.

recording state

Recording state is the current recording status of a given camera. There are four possible recording states: Enabled, Disabled, Currently recording (unlocked), and Currently recording (locked).

Records

Renamed to Unified report in Security Center 5.11.2.0.

redaction

Redaction in Clearance™ is the act of obscuring faces, audio, or other sensitive information from supported video files.

redirector

A redirector is a server assigned to host a redirector agent created by the Media Router role.

redirector agent

A redirector agent is an agent created by the Media Router role to redirect data streams from one IP endpoint to another.

redundant archiving

Redundant archiving is an option that enhances the availability of video and audio archives during failover and protects against data loss.

registry

The registry is the Genetec Clearance™ module that simplifies the video request process and improves collaboration between participants and investigators. The registry can include a list of cameras that authorized users can request video from.

regular expression

A regular expression is a sequence of symbols used by a regular expression engine to identify all the strings of characters that match a specific search pattern without having to list all the possible discrete values that must be returned. The Microsoft's .NET Framework Regular Expression engine is the engine used in Sipelia™.

relative time

In Clearance™, relative time refers to the duration of the video recording with no reference to when the recording started. For example, a 5 minute recording would be shown as 0:00 - 05:00.

Remote

The Remote task is an operation task that you can use to remotely monitor and control other Security Desk applications in your system that are running the Monitoring task or the Alarm monitoring task.

Remote configuration

The Remote configuration task is an administration task that you can use to configure federated Security Center entities without logging off from your local Config Tool.

rendering rate

Rendering rate is the comparison of how fast the workstation renders a video with the speed the workstation receives that video from the network.

Report Manager

The Report Manager role automates report emailing and printing based on schedules.

report pane

The report pane is one of the panes found in the Security Desk workspace. It displays query results or real-time events in a tabular form.

Reports

The Reports task enables users to generate customized queries about entities, activities, and events for investigation or maintenance purposes.

request to exit

Request to exit (REX) is a door release button normally located on the inside of a secured area that when pressed, allows a person to exit the secured area without having to show any credential. This can also be the signal from a motion detector. It is also the signal received by the controller for a request to exit.

request to exit (REX)

Acronym: REX

requester

In Clearance™, a requester is a user who can request video from camera sources of interest. This includes requesting video from a public or privately owned camera defined in the Clearance™ registry.

restricted camera

Restricted cameras are cameras that Genetec Inc. has identified as cybersecurity risks.

Restricted Security Area Surveillance

The Restricted Security Area Surveillance (RSA Surveillance) plugin integrates tracking systems into Security Center. A tracking system might use radars, lasers, heat sensors, and cameras to detect activity in restricted areas and on the perimeter of a property.

Restricted Security Area Surveillance (RSA Surveillance)

Acronym: RSA

RSA Surveillance

retention policy

A retention policy in Clearance™ defines how long a case remains in the system after it is closed or how long a file is retained before it is permanently deleted. A retention policy can prescribe a finite or indefinite duration.

reverse geocoding

Reverse geocoding is the process of converting a geographic location, such as a latitude and longitude pair, into a human-readable address.

reverse tunnel

A reverse tunnel is a private communication channel open between a server inside a secured LAN and a client outside. In the Security Center implementation, certificate authentication is used to protect against manipulator-in-the-middle attacks.

Reverse Tunnel

The Reverse Tunnel role is used on the federated system to connect to the Federation™ host residing in the cloud. The connection is established using a keyfile generated from the cloud system. The keyfile can only be used once to ensure maximum security.

Reverse Tunnel Server

The Reverse Tunnel Server role is used on the Federation™ host to manage reverse tunnels. Reverse tunnels are created using this role, but must be opened from the federated sites using the Reverse Tunnel roles.

reverse tunneling

Reverse tunneling is a method of securing communication between clients and servers that are behind a firewall. This technique enhances security and simplifies firewall management. When using a reverse tunnel, the server initiates a connection to the client. This tunnel connection is secured by a previously shared keyfile that contains an identity certificate. When established, the reverse tunnel allows bidirectional communication without opening inbound firewall ports.

ring group

A ring group is a group of SIP entities that has its own unique SIP phone extension. All entities (or members) within a ring group are part of a call list, and all members get called when the ring group extension is called. The members of a ring group can either be called all at the same time, or successively at a set interval. The call stops ringing when any one of the members within a call list answers the call.

role

A role is a software component that performs a specific job within Security Center or Security Center SaaS.

role

In Genetec ClearID™, a role is a group of people who are assigned the same access. A person can be assigned multiple roles. Roles are linked to cardholder groups in Synergis™. A role manager controls who is granted access to the group.

role activity report

In Genetec ClearID™, a role activity report is an audit trail of all activities related to roles. The report includes timestamp information, activity type, who activity was performed by, and a details section including reason information.

role manager

In Genetec ClearID™, a role manager is an identity that has authority over who is assigned to a role. A role manager can add people to and remove people from a role. They are also responsible for role access review approvals.

role owner

In Genetec ClearID™, a role owner is responsible for assigning role managers and configuring role-based policies.

roles and units view

The roles and units view is a browser view that lists the roles on your system with the units they control as child entities.

route

A route is a setting that configures the transmission capabilities between two end points in a network for the purpose of routing media streams.

RSA coverage zone

An RSA coverage zone is a horizontal RSA zone that cannot be disarmed. When targets are detected in a coverage zone, all the same events are generated in the Monitoring task, but no event notifications are displayed on the map. Only the outline of the coverage zone is represented on the map.

RSA perimeter

An RSA perimeter is a logical representation of a physical barrier, such as a fence or border of a property, displayed as a line on georeferenced map in Security Center.

RSA target

An RSA target represents an intruder in a restricted area on a map. When an intruder is detected entering the area, a map object is created in the RSA zone that represents the restricted area, and is shown on the map until the target is acknowledged.

RSA zone

An RSA zone defines the boundaries of a restricted area. In Security Center, an RSA zone is shown as a colored shape or outline on a map. The color indicates if the zone is armed, disarmed, or on alert. When a tracking system reports an intrusion, the RSA Surveillance plugin generates an event if the intrusion occurs in an armed RSA zone.

Rules Engine

The Rules Engine is the component of the Genetec Mission Control™ system that analyzes and correlates the events collected by Security Center, based on predefined rules. The Rules Engine uses these events to detect and trigger incidents in the Genetec Mission Control™ system.

"S" terms

salt (cryptography)

In cryptography, a salt is data that is used as an additional input to the information you want to encrypt or protect with a hash function, so that the original information is nearly impossible to guess, even when the attacker knows what algorithm is being used.

SALTO Virtual Network

The SALTO Virtual Network plugin integrates SALTO Virtual Network access control systems into Security Center so that users can provide and monitor access to SALTO doors, SALTO lockers, areas, and events in Security Desk.

SAM card

A secure access module (SAM) card is a physical smart card that increases key management security by moving the cryptography off the access control appliance and onto the card itself. A SAM card is inserted into a slot on an expansion module-equipped Synergis™ Cloud Link.

secure access module (SAM) card

SAM card configuration

The SAM card configuration tool enables configuration of Secure Access Module (SAM) cards for Synergis™ units.

same position

The same position regulation is a type of parking regulation characterizing an overtime rule. A vehicle is in violation if it is seen parked at the exact same spot over a specified period of time. Genetec Patroller™ must be equipped with GPS capability to enforce this type of regulation.

schedule

A schedule is an entity that defines a set of time constraints that can be applied to a multitude of situations in the system. Each time constraint is defined by a date coverage (daily, weekly, ordinal, or specific) and a time coverage (all day, fixed range, daytime, and nighttime).

scheduled task

A scheduled task is an entity that defines an action that executes automatically on a specific date and time, or according to a recurring schedule.

Schindler PORT Elevator

The Schindler PORT Elevator plugin integrates the Schindler PORT Technology destination dispatch system into Security Center. Using this plugin, you can manage and monitor your elevator systems and cardholders in Security Center.

SDK certificate

An SDK certificate is what an SDK application (or plugin) needs to connect to Security Center. The certificate must be included in the Security Center license key for the SDK application to work.

SDS Guardian

The SDS Guardian plugin is a shooter detection plugin. With this plugin installed on an expansion server and client workstations, you can create the SDS Guardian role and use it to integrate Guardian gunshot detection sensors into Security Center.

secondary server

A secondary server is an alternative server on standby intended to replace the primary server in case the latter becomes unavailable.
Also known as: standby server

Secure Socket Layer

The Secure Sockets Layer (SSL) is a computer networking protocol that manages server authentication, client authentication and encrypted communication between servers and clients.

Secure Socket Layer (SSL)

Acronym: SSL

secured area

A secured area is an area entity that represents a physical location where access is controlled. A secured area consists of perimeter doors (doors used to enter and exit the area) and access restrictions (rules governing the access to the area).

secured area (airport)

A secured area is any area of an airport where aircraft operators and airline personnel enplane and deplane passengers and sort and load baggage. It also includes any adjacent areas that are not separated by adequate security measures.

Security Center

Security Center is a truly unified platform that blends IP video surveillance, access control, automatic license plate recognition, intrusion detection, and communications within one intuitive and modular solution. By taking advantage of a unified approach to security, your organization becomes more efficient, makes better decisions, and responds to situations and threats with greater confidence.

Security Center Digital Signage Management

The Digital Signage Management plugin is a software package with which Security Center users can create, manage, and schedule messages to display on variable message signs.

Security Center Fleet Monitoring

The Security Center Fleet Monitoring plugin, previously known as the AVL plugin, gathers and connects video and metadata, such as location and other sensor inputs, from vehicles running the Security Center Fleet Monitoring plugin. When installed, you can track vehicle locations, detect vehicles as they enter or exit areas of interest, offload data from vehicles, and review the playback of the video and metadata in synchronization.

Security Center Incident Snapshots Generator

The Incident Snapshots Generator plugin captures images from cameras when an incident occurs. You can configure different triggers to automatically generate snapshots, such as intrusion events or panic buttons.

Security Center Mobile

(Obsolete) See Mobile Server and Genetec™ Mobile.

Security Center Mobile application

(Obsolete) See Genetec™ Mobile.

Security Center SaaS Edition (Classic)

The Security Center SaaS Edition (Classic) is Security Center offered by subscription. Subscription-based ownership simplifies the transition to cloud services and provides an alternative way to purchase, deploy, and maintain the Genetec™ Security Center unified platform.

Security Center Transportation Sensor Management

The Transportation Sensor Management plugin is a traffic management plugin that integrates sensor alerts and data with Security Center. This data includes vehicle counts, people counts, vehicle speeds, area occupancies, and traffic volumes.

Security Center Travel Times

Travel Times is a solution that comprises the Travel Times Engine and the Travel Times Plugin.

Security Center Travel Times Engine

The Travel Times Engine is a cloud-based solution that gathers data from detectors that provide unique IDs for objects traveling between points. It calculates average travel times between those points and provides alerts for absolute and relative thresholds.

Security Center Travel Times Plugin

The Travel Times Plugin can send data to the Travel Times Engine and integrates the calculated travel times and alerts into Security Center.

Security Center Vehicle Monitoring

The Security Center Vehicle Monitoring plugin, previously known as the GPS plugin, is installed on the vehicle system. This plugin collects telematics, GPS information, and other sensor data as GPS (Global Positioning System) entities. This plugin also gathers health information from on-board cameras and other Security Center server components.

Security Center Federation™

The Security Center Federation™ role connects the local system to an independent remote Security Center system. After connecting to the remote system, your local system acts as the Federation™ host and you can view federated entities and events locally.

security clearance

A security clearance is a numerical value used to further restrict the access to an area when a threat level is in effect. Cardholders can only enter an area if their security clearance is equal or higher than the minimum security clearance set on the area.

Security Desk

Security Desk is the unified user interface of Security Center. It provides consistent operator flow across all of the Security Center main systems, Omnicast™, Synergis™, and AutoVu™. The unique task-based design of Security Desk lets operators efficiently control and monitor multiple security and public safety applications.

Security Identification Display Area

The Security Identification Display Area (SIDA) is defined in the airport security program as any area that requires individuals to continuously display the airport ID badge. Before allowing unescorted access to this area, a person must be trained, and their background investigated. The SIDA includes the secured area, the AOA, and possibly other areas.

Security Identification Display Area (SIDA)

Acronym: SIDA

Security Patrol System CheckPoint

The Security Patrol System (SPS) CheckPoint plugin is a perimeter protection plugin. Using this plugin, you can create guard tours and personnel sweeps that have a set or sequence of checkpoints that must be triggered to complete the tour. The plugin generates events when the guard tour criteria are not met. Checkpoints can be any Security Center event, such as access granted, PIN entered, license plate reads, motion detected, and more.

Security Patrol System (SPS) CheckPoint

security policy

A security policy in Clearance™ defines which users and groups have access to a particular system feature.

security profile

In the Otis Compass plugin, a security profile defines the operation modes of a Destination Entry Computer (DEC), and which floors and door sides can be accessed, based on schedules. Security profiles are assigned to DECs. By default, the Default security profile is assigned to all DECs that are part of the Otis CompassPlus™ Destination Management system.

security token

An on-the-wire representation of claims that is cryptographically signed by the issuer of the claims, providing strong proof to any relying party as to the integrity of the claims and the identity of the issuer.

Security video analytics

The Security video analytics task is an investigation task that reports on video analytics events that are triggered based on analytics scenarios.

self-signed certificate

A self-signed certificate is an identity certificate that is signed by the same entity whose identity it certifies, as opposed to a certificate authority (CA). Self-signed certificates are easy to make and do not cost money. However, they do not provide all of the security properties that certificates signed by a CA aim to provide.

server

In Security Center, a server entity represents a computer on which the Genetec™ Server service is installed.

Server Admin

Server Admin is the web application running on every server machine in Security Center that you use to configure the Genetec™ Server settings. You use this same application to configure the Directory role on the main server.

server certificate

A server certificate is an identity certificate used to authenticate the server's identity to the client. Server certificates are also used to encrypt data-in-transit to ensure data confidentiality.

server mode

The server mode is a special online operation mode restricted to Synergis™ units, in which the unit allows the Access Manager (the server) to make all access control decisions. The unit must stay connected to the Access Manager at all times to operate in this mode.

Service Release

A Service Release (SR) is a standalone release that includes minor functionality improvements, bug fixes, and the integration of new hardware, intrusion devices, and plugins.

Service Release (SR)

Acronym: SR

shared message library

The shared message library is an inventory of saved messages in Security Center that can be displayed on any of the signs in your system.

sharing guest

A sharing guest is a Security Center system that has been given the rights to view and modify entities owned by another Security Center system, called the sharing host. Sharing is done by placing the entities in a global partition.

sharing host

A sharing host is a Security Center system that gives the right to other Security Center systems to view and modify its entities by putting them up for sharing in a global partition.

Sharp Portal

Sharp Portal is a web-based administration tool used to configure Sharp cameras for AutoVu™ systems. From a web browser, you log on to a specific IP address (or the Sharp name in certain cases) that corresponds to the Sharp you want to configure. When you log on, you can configure options such as selecting the ALPR context (for example, Alabama, Oregon, Quebec), selecting the read strategy (for example, fast moving or slow moving vehicles), viewing the Sharp’s live video feed, and more.

Sharp unit

The Sharp unit is a proprietary ALPR unit of Genetec Inc. that integrates license plate capturing and processing components, as well as digital video processing functions, inside a ruggedized casing.

SharpOS

SharpOS is the software component of a Sharp unit. SharpOS is responsible for everything related to plate capture, collection, processing, and analytics. For example, a SharpOS update can include new ALPR contexts, new firmware, Sharp Portal updates, and updates to the Sharp's Windows services (Plate Reader, HAL, and so on).

SharpV

SharpV is a Sharp unit that is specialized for fixed installations. It is ideally suited for a range of applications, from managing off-street parking lots and facilities to covering major city access points to detect wanted vehicles. SharpV combines two high-definition cameras with onboard processing and illumination in a ruggedized, environmentally sealed unit. Both lenses are varifocal for ease of installation and the camera is powered via PoE+.

SharpX

SharpX is the camera component of the SharpX system. The SharpX camera unit integrates a pulsed LED illuminator that works in total darkness (0 lux), a monochrome ALPR camera (1024 x 946 @ 30 fps), and a color context camera (640 x 480 @ 30 fps). The ALPR data captured by the SharpX camera unit is processed by a separate hardware component called the AutoVu™ ALPR Processing Unit.

SharpZ3

SharpZ3 is a proprietary mobile ALPR system designed by Genetec Inc. that integrates license plate cameras and a trunk unit that is responsible for ALPR processing as well as communication with the Genetec Patroller™ software running on the in-vehicle computer.

SharpZ3 ALPR module

ALPR modules are available for the SharpZ3 trunk unit which can support either two or four SharpZ3 cameras.

SharpZ3 auxiliary camera bracket

To mount an AutoVu™ auxiliary PoE camera beside a SharpZ3 camera, you can install a SharpZ3 auxiliary camera bracket on the SharpZ3 hardmount.

SharpZ3 base unit

The SharpZ3 base unit is the processing component of the SharpZ3 system. The base unit includes the ALPR module and up to three expansion modules that are used to add features to the system such as precise navigation, PoE ports for wheel imaging cameras, and so on.

SharpZ3 camera unit

SharpZ3 camera units are mounted on a patrol vehicle as a part of a SharpZ3 ALPR system. Each camera unit contains two LPR cameras, one context camera, and infrared illuminators.

SharpZ3 expansion module

Up to three expansion modules can be added to the SharpZ3 base unit. The modules add additional functionality to the base system. For example, you can add modules for precise navigation, PoE ports for wheel imaging cameras, and so on.

ShotSpotter Gunshot Detection

The Genetec™ ShotSpotter Gunshot Detection plugin integrates alerts sent by SST ShotSpotter service into Security Center to help police officers and security guards monitor and quickly respond to gunshots that occur in the area.

simple text placeholder

Simple text placeholders are placeholders that can be replaced with any content and added to messages.

simple user procedure

A simple user procedure (or simple SOP) is an ordered list of steps that do not involve multiple-choice questions. Operators might be allowed to resolve the incident without validating all the steps, or to complete the steps out of sequence, depending on the configuration.
Also known as: simple SOP

single sign-on

Single sign-on (SSO) is the use of a single user authentication for multiple IT systems or even organizations.

single sign-on (SSO)

Acronym: SSO

SIP client

A SIP client is a program with softphone functionality that users can install on their computers or mobile devices to make and receive voice or video calls from other SIP clients. A SIP client requires a SIP account, and typically includes a user interface from which users can manage calls and also view call-related video streams, if such a feature is supported. Examples of SIP clients are SIP phones, softphones, and SIP intercoms. Once Sipelia™ Client is installed and configured, Security Desk is also an example of a SIP client.
Also known as: softphone

SIP endpoint

A SIP endpoint is the device or system that is at each end of a SIP call session. Examples of endpoints are hard-wired phones, voice mail systems, and intercoms. A SIP client such as a softphone, is another example of an endpoint. Once Sipelia™ Client is installed and configured, Security Desk is considered both an endpoint and a SIP client.
Also known as: user agent

SIP entity

A SIP entity is a Security Center entity that has SIP-related capabilities. In Security Center, examples of SIP entities are users, ring groups, and SIP devices such as SIP intercoms.

SIP extension

A SIP extension is a numeric value assigned to a SIP device so that the device can make and receive SIP calls. Typically, a SIP extension is also used to register the SIP device (to which it is assigned) to a SIP server. To be able to communicate with other SIP endpoints, every SIP entity (user, ring group, or intercom) in Security Center must have a unique SIP extension assigned to it.

SIP intercom

A SIP intercom is an intelligent SIP endpoint that provides two-way phone connectivity in a SIP environment. In Security Center, a SIP intercom is one of the established SIP entities, and it is the only SIP entity that is an actual device. The other SIP entities are Security Center users and ring groups.

SIP trunk

A SIP trunk is a SIP server that allows users to connect their existing SIP servers to other servers, thus extending their VoIP capabilities and allowing them to migrate their old PBX systems to a unified VoIP system. With an integrated dial plan, SIP trunks make it possible for SIP extensions that reside on different SIP servers to communicate with one another.

Sipelia™

Sipelia™ is a core module of Security Center. Using this module, Security Center users can make, receive, and manage SIP-based voice and video calls over a network. Running on the open source Session Initiation Protocol (SIP), Sipelia also integrates existing video and access control platforms with intercom systems, and allows users to log call activities.

Sipelia™ as a service

Sipelia™ as a service is a cloud-based service. It provides an alternative way to deploy and maintain Sipelia™. Sipelia™ as a service functions the same as our on-premises solution but requires some basic configuration to get your system set up and ready to register your VoIP device.

Sipelia™ Client

Sipelia™ Client is the softphone component of Sipelia™. As a result, it installs the various user interface features of the Sipelia™ module, such as the call dialog box and conversation window. Sipelia™ Client must be installed on every Security Desk workstation that is running Sipelia™ software, thus turning Security Desk into a SIP client (or softphone).

Sipelia™ Mobile

The Sipelia™ Mobile component is a separate plugin that offers Sipelia functionality in the Genetec™ Mobile application. You can now make, receive, and manage voice and video calls from your smartphone. This enables you to respond to critical situations while away from your workstation, reducing response times.

Sipelia™ Server

Sipelia™ Server is the SIP server component of Sipelia. It receives and administers information about the different SIP endpoints, and essentially facilitates the communication between two or more endpoints that are communicating in a SIP environment. Sipelia Server also collates and stores important data, such as contact list information, SIP server settings, and call session recordings. Sipelia Server must be run by a Security Center plugin role, and therefore, must be installed on every Security Center server on which you intend to host the plugin role.

site

A site is a virtual branch of a Stratocast™ account (client or integrator), which represents an actual geographical location. By creating two Stratocast™ accounts and registering the same usernames to both accounts, you create two sites that can be accessed by each of those usernames.

site

In Genetec ClearID™, a site is a logical entity. Sites include one or more areas. Each site and area can have a different owner.

site activity report

In Genetec ClearID™, a site activity report is an audit trail of activities or events for a specific site. The report includes timestamp information, activity type, area, who activity was performed by, and a details section including reason information.

site and area owners report

In Genetec ClearID™, a site and area owners report is a list that provides a global view of all identities and their permissions. Only identities who are a site owner, area approver, area owner, or watchlist manager are displayed in this report. The report includes site, area, identity, permissions, delegated from, identity status, and web portal access information.

site owner

In Genetec ClearID™, a site owner is an identity that has authority over areas associated with a specific site. The site owner can assign or modify area owners and can configure specific area settings that are exclusive to site owners. They are also responsible for site access reviews.

SNMP traps

SNMP traps are event messages sent by the SNMP device to the Industrial IoT plugin role.

soft antipassback

Soft antipassback only logs the passback events in the database. It does not restrict the door from being unlocked due to the passback event.

Software Development Kit

The Software Development Kit (SDK) is what end-users use to develop custom applications or custom application extensions for Security Center.

Software Development Kit (SDK)

Acronym: SDK

standalone mode

Standalone mode is an operation mode where the interface module makes autonomous decisions based on the access control settings previously downloaded from the Synergis™ unit. When the module is online, activity reporting occurs live. When the module is offline, activity reporting occurs on schedule, or when the connection to the unit is available. Not all interface modules can operate in standalone mode.

standard operating procedure

A standard operating procedure (SOP) or user procedure is a series of steps that the operator must follow before changing an incident state to Resolved. Each step can range from a simple task, such as Call 911, to a complex task that requires support documents to accomplish. All actions taken by the operator are logged by the system in the incident history for audit purposes.

standard operating procedure (SOP)

Acronym: SOP

Also known as: user procedure

standard schedule

A standard schedule is a schedule entity that can be used in all situations. Its only limitation is that it does not support daytime or nighttime coverage.

static permit

In a system that uses the Pay-by-Plate Sync plugin, a static permit holds a list of vehicle license plates that is not updated by a third-party permit provider. For example, a list of employee vehicles that are authorized to park in the lot are manually maintained as a static list.

Stratocast™

Stratocast™ is a cloud-based video monitoring system that makes the adoption of network video security solutions easy. With Stratocast™, you can connect to your business wherever you go. Using the Microsoft Windows Azure cloud-computing platform, Stratocast™ eliminates the need for on-site servers. As a result, installation time is reduced and you can begin monitoring your premises quickly.

Stratocast™ account

A Stratocast™ account is a collection of user-related and geographical information for a given company in a given location, and the arrangement with which that company can use the services offered by Stratocast™. There are two types of accounts: integrator accounts and client accounts.

Stratocast™ mobile apps

Stratocast™ mobile apps are the mobile version of Stratocast™ that you can use to connect to your system remotely over WiFi or cellular networks. With the Stratocast™ mobile apps, you can monitor your premises directly from your mobile devices.

stereoscopy

SharpZ3 camera units contain two ALPR camera lenses. When SharpOS analyzes the images together, it can distinguish depth in the field of view and can therefore estimate vehicle position and orientation.

sterile area (airport)

A sterile area is an area of the airport where passengers boarding an aircraft must undergo screening of their person and property. It is generally controlled by the Transportation Security Administration (TSA) and supervised by aircraft operators or airline personnel.

Stratocast™ Control Protocol

The Stratocast™ Control Protocol (SCP) is a lightweight HTTP command and control protocol designed to integrate virtually any device from any manufacturer (except for Axis) into Stratocast™ and must be implemented in the firmware of the device. The protocol is used to enroll devices in Stratocast™ and to control some specific cloud functions.

Stratocast™ Control Protocol (SCP)

Acronym: SCP

Streamvault factory reset utility

The Streamvault factory reset utility is a tool that allows you to reimage a Streamvault appliance to factory settings. The tool helps you create a bootable USB key with the required Streamvault software image.

Streamvault™ hardware

Streamvault™ hardware is a report task in Security Center that you can use to view a list of health issues affecting your Streamvault™ appliances.

Streamvault™ hardware monitor

The Streamvault™ hardware monitor entity is used to monitor the health of your Streamvault™ appliances and ensure you receive notifications when problems occur. One Streamvault™ hardware monitor per Streamvault™ appliance is required.

Streamvault™ manager

The Streamvault™ manager entity is used to control the alert configurations for a group of Streamvault™ Agent entities. Only one Streamvault™ manager is allowed per system.

strict antipassback

A strict antipassback is an antipassback option. When enabled, a passback event is generated when a cardholder attempts to leave an area that they were never granted access to. When disabled, Security Center only generates passback events for cardholders entering an area that they never exited.

subscription

In Genetec ClearID™, a subscription is a renewable license that assigns a set of privileges to a Genetec ClearID™ account for a defined period. It includes logging on to the portal, configuring several Security Center workstations and users, and using a set of features, as defined by the subscription license.

supervised mode

Supervised mode is an online operation mode of the interface module where the interface module makes decisions based on the access control settings previously downloaded from the Synergis™ unit. The interface module reports its activities in real time to the unit, and allows the unit to override a decision if it contradicts the current settings in the unit. Not all interface modules can operate in supervised mode.

SV appliance

Streamvault™ is a turnkey appliance that comes with an embedded operating system and Security Center pre-installed. You can use Streamvault™ appliances to quickly deploy a unified or standalone video surveillance and access control system.

SV Control Panel

SV Control Panel is a user interface application that you can use to configure your Streamvault™ appliance to work with Security Center access control and video surveillance.

SV-1000E

The SV-1000E is a cost-effective rackmount security appliance designed for mid-sized security systems. It helps you move to a unified security system combining video surveillance, access control, automatic license plate recognition, communications, intrusion and analytics in a single appliance. The SV-1000E comes with Security Center, and the SV Control Panel pre-installed.

SV-100E

The SV-100E is a subcompact all-in-one appliance that comes with Microsoft Windows, Security Center, and the SV Control Panel pre-installed. The SV-100E is for small-scale, single server installations, and can support both cameras and access control readers.

SV-2000E

The SV-2000E is a rackmount security appliance that lets you easily deploy a unified system combining video surveillance, access control, automatic license plate recognition and communications. The SV-2000E comes with Security Center, and the SV Control Panel pre-installed.

SV-300E

The SV-300E is a compact, all-in-one turnkey appliance that comes with Microsoft Windows, Security Center, and the SV Control Panel preinstalled. With built-in analog encoder capture cards, you can use the appliance to quickly deploy a standalone video surveillance or access control system, or a unified system.

SV-350E

The SV-350E is an all-in-one, turnkey security appliance that helps you move to a unified system combining video surveillance, access control, intrusion detection, and communications. It comes with Microsoft Windows, Security Center, and the SV Control Panel pre-installed. It offers RAID 5 for critical video storage.

SV-4000E

The SV-4000E is a rackmount security appliance that delivers enterprise-grade performance and reliability. Its certified hardware configurations and out-of-the-box hardening against cyber threats simplifies the design and deployment of a new security system. The SV-4000E comes with Security Center, and the SV Control Panel pre-installed.

SV-7000E

The SV-7000E is a rackmount security appliance designed for applications combining a large number of high resolution cameras, users and events. The SV-7000E comes with Security Center, and the SV Control Panel pre-installed.

SVA-100E

The SVA-100E is a compact appliance you can use to easily enhance your security system with KiwiVision™ video analytics. The design is optimized for you to apply more analytics streams to your video surveillance system, whether that is a single or multiple analytic stream, per camera.

SVW-300E

The SVW-300E workstation is a turnkey solution designed for monitoring small and medium-sized security systems with support for multiple displays. The SVW-300E comes with Security Center pre-installed.

SVW-500E

The SVW-500E workstation is a high-performance solution designed for users who need the ability to view cameras with a very high-resolution on 4K monitors and video walls. The SVW-500E comes with Security Center pre-installed.

symmetric encryption

Symmetric encryption is a type of encryption where the same key is used for both encryption and decryption.

synchronous video

A synchronous video is a simultaneous live video or playback video from more than one camera that are synchronized in time.

Synergis™

Security Center Synergis™ is the IP access control system (ACS) that heightens your organization’s physical security and increases your readiness to respond to threats. Synergis™ supports an ever-growing portfolio of third-party door control hardware and electronic locks. Using Synergis™, you can leverage your existing investment in network and security equipment.

Synergis™ appliance

A Synergis™ appliance is an IP-ready security appliance manufactured by Genetec Inc. that is dedicated to access control functions. All Synergis™ appliances come pre-installed with Synergis™ Softwire and are enrolled as access control units in Security Center.

Synergis™ Appliance Portal

The Synergis™ Appliance Portal is the web-based administration tool used to configure and administer the Synergis™ appliance and upgrade its firmware.

Synergis™ Cloud Link

Synergis™ Cloud Link is an intelligent PoE-enabled IoT gateway designed to address the demand for a non-proprietary access control solution. Synergis™ Cloud Link provides native support for a wide variety of intelligent controllers and electronic locks.

Synergis™ IX

Synergis™ IX (pronounced "eye-ex") is a family of hybrid controllers and downstream modules used to manage both access control points and intrusion points. The Synergis™ IX product line is only available to the Australian and New Zealand markets.

Synergis™ IX backup

The Synergis™ IX backup task simplifies replacement and reconfiguration of Synergis™ IX controllers. You can create and manage all your controller configuration backups in one place.

Synergis™ IX intrusion detection area mapping

The Synergis™ IX intrusion detection area mapping task is an administration task that detects missing or incorrect mappings to Security Center areas. Using this task, you can correct all faulty settings from a single page.

Synergis™ IX Portal

Synergis™ IX Portal is the web-based administration tool that you use to configure and administer the Synergis™ IX controller and upgrade Synergis™ IX expanders.

Synergis™ key store

The Synergis™ key store is a database that holds transparent reader keys, ReaderKc and ReaderKs keys for STid readers, and the SAM LockUnlock key for Synergis™ units with the optional expansion module. Keys in the database cannot be viewed or read, but can be verified using key hashes.

Synergis™ Master Controller

Synergis™ Master Controller (SMC) is an access control appliance of Genetec Inc. that supports various third-party interface modules over IP and RS-485. SMC is seamlessly integrated with Security Center and can make access control decisions independently of the Access Manager.

Synergis™ Master Controller (SMC)

Acronym: SMC

Synergis™ Softwire

Synergis™ Softwire is the access control software developed by Genetec Inc. to run on various IP-ready security appliances. Synergis™ Softwire lets these appliances communicate with third-party interface modules. A security appliance running Synergis™ Softwire is enrolled as an access control unit in Security Center.

Synergis™ unit

A Synergis™ unit is a Synergis™ appliance that is enrolled as an access control unit in Security Center.

System

The System task is an administration task that you can use to configure roles, macros, schedules, and other system entities and settings.

System Availability Monitor

With System Availability Monitor (SAM) running, you can collect health information and view the health status of your Security Center systems to prevent and proactively resolve technical issues.

System Availability Monitor (SAM)

Acronym: SAM

System Availability Monitor Agent

The System Availability Monitor Agent (SAMA) is the component of SAM that is installed on every Security Center main server. SAMA collects health information from Security Center and sends health information to the Health Monitoring Services in the cloud.

System Availability Monitor Agent (SAMA)

Acronym: SAMA

system event

A system event is a predefined event that indicates the occurrence of an activity or incident. System events are defined by the system and cannot be renamed or deleted.

System for Cross-Domain Identity Management

In Clearance™, the System for Cross-domain Identity Management (SCIM) protocol is used to synchronize users and groups from an identity management system into cloud-based products.

System for Cross-Domain Identity Management (SCIM)

Acronym: SCIM

System status

The System status task is a maintenance task that you can use to monitor the status of all entities of a given type in real time and to interact with them.

"T" terms

Tag activities

The Tag activities task is an investigation task in Security Desk. You can use it to review and analyze the movements of tagged items through an inventory or shipping system. The reports can be filtered by full code, partial code, or by time stamp, and can include video feeds.

TagTracker

The TagTracker plugin integrates bar code scanners into Security Center so that users can monitor assets in Security Desk and generate reports that can include associated video feeds.

tailgating

Tailgating designates one of the following: tailgating (access control) or tailgating (analytics).

tailgating (analytics)

In KiwiVision™ video analytics, tailgating occurs when a person enters an area behind another person within a defined time frame.

task

A task is a customizable user interface designed to handle a specific aspect of your work. For example, you can employ a monitoring task to observe real-time system events, an investigation task to identify suspicious activity, or an administration task to configure system settings.

task cycling

A task cycling is a Security Desk feature that automatically cycles through all tasks in the active task list following a fixed dwell time.

task workspace

A task workspace is an area in the Security Center client application window reserved for the current task. The workspace is typically divided into the following panes: canvas, report pane, controls, and area view.

taskbar

A taskbar is a user interface element of the Security Center client application window, composed of the Home tab and the active task list. The taskbar can be configured to be displayed on any edge of the application window.

temporary access rule

A temporary access rule is an access rule that has an activation and an expiration time. Temporary access rules are suited for situations where permanent cardholders need to have temporary or seasonal access to restricted areas. These access rules are automatically deleted seven days after they expire to avoid cluttering the system.

test message

Test messages are maintenance tools used to simplify the maintenance process so that sign repair teams do not need to configure messages themselves.

third-party authentication

Third-party authentication uses a trusted, external identity provider to validate user credentials before granting access to one or more IT systems. The authentication process returns identifying information, such as a username and group membership, that is used to authorize or deny the requested access.

threat level

A threat level warns system users of changing security conditions, such as a fire or a shooting, in a specific area or the entire system. Specific handling procedures can be automatically applied when a threat level is raised or canceled.

tile

A tile is an individual window within the canvas, used to display a single entity. The entity displayed is typically the video from a camera, a map, or anything of a graphical nature. The look and feel of the tile depends on the displayed entity.

tile ID

The tile ID is the number displayed at the upper left corner of the tile. This number uniquely identifies each tile within the canvas.

tile mode

Tile mode is the main Security Desk canvas operating mode that presents information in separate tiles.

tile pattern

The tile pattern is the arrangement of tiles within the canvas.

tile plugin

A tile plugin is a software component that runs inside a Security Desk tile. By default, it is represented by a green puzzle piece in the area view.

Tiles task

The Tiles task is an operation task used in web applications to monitor and respond to real-time alarms and events related to selected entities.

Time and attendance

The Time and attendance task is an investigation task that reports on who has been inside a selected area and the total duration of their stay within a given time range.

Time To Response or Time To Resolution

Time To Response or Time To Resolution (collectively TTR) are metrics used in Genetec Mission Control™ that refer to how long it takes to respond to incidents, and resolve incidents and dynamic standard operating procedure steps.

Time To Response or Time To Resolution (TTR)

Acronym: TTR

timed antipassback

Timed antipassback is an antipassback option. When Security Center considers a cardholder to be already in an area, a passback event is generated when the cardholder attempts to access the same area again during the time delay defined by Presence timeout. When the time delay has expired, the cardholder can once again pass into the area without generating a passback event.

timeline

A timeline is a graphic illustration of a video sequence, showing where in time, motion and bookmarks are found. Thumbnails can also be added to the timeline to help the user select the segment of interest.

tour

A tour is a collection of checkpoints along a defined route that security guards (cardholders) must reach; usually within a specified time. The guard's progress is recorded by Security Center and can be monitored by staff in the central office from the Tour monitoring task in Security Desk.

Tour audit trails

The Tour audit trails task is the Security Patrol System (SPS) CheckPoint task that you use to investigate which users created, updated, and deleted tours and checkpoints, and when.

Tour history

The Tour history task is the Security Patrol System (SPS) CheckPoint task that you use to investigate when tours were completed, canceled, late, and on time; and what manual actions were performed, by whom, and when.

Tour monitoring

The Tour monitoring task is the Security Patrol System (SPS) CheckPoint task that you use to monitor in real-time the progress of guard tours and personnel sweeps.

Tour statistics

The Tour statistics task is the Security Patrol System (SPS) CheckPoint task that you use to investigate how often tours and checkpoints were completed on time, early or late.

tracking system

A tracking system for the RSA Surveillance plugin is a device or a system of devices used to monitor restricted areas to detect intrusions. There are two types of tracking systems. The first detects perimeter violations using sensors on the perimeter fence. The second detects foreign objects entering and moving through a restricted area using radar, lasers, cameras that have video analytics, and thermal sensors.

traffic link

Traffic links are road segments between two or more nodes in a traffic route.

traffic network

Traffic networks are logical groupings of nodes, links, and routes that are used to monitor vehicle traffic.

traffic route

Traffic routes are logical sequences of one or more traffic links. Travel Times are calculated based on traffic routes.

Traka Asset Management

The Traka Asset Management plugin integrates Traka users, cabinets, and iFobs into Security Center.

Traka cabinet

A Traka cabinet entity represents a physical Traka cabinet, which holds the iFobs and associated keys or assets.

Traka monitoring

The Traka monitoring task is an operation task in Security Desk that shows the current content of the Traka cabinets and lists past activity. You can use this task to see when an asset is in its cabinet, when it is out, and who last had the asset.

Traka report

The Traka report task is an investigation task in Security Desk. You can use it to investigate Traka user activities at the cabinets and assets (iFobs).

Transaction Finder

The Transaction Finder plugin integrates point-of-sale (POS) systems into Security Center. Using this plugin, operators can identify suspicious transactions and view the corresponding video and other evidence that relates to each transaction to figure out if any further investigation is needed.

Transactions

The Transactions task is an investigation task in Security Desk. You can use it to investigate transactions that have taken place in point-of-sale systems or at individual terminals.

transfer group

A transfer group is a persistent archive transfer scenario that lets you run a video transfer without redefining the transfer settings. These transfers can be scheduled or executed on demand. Transfer groups define which cameras or archiving roles are included in the transfer, when the archives are transferred, what data is transferred, and so on.

transient parking

Transient parking is a parking scenario where the driver must purchase parking time as soon as the vehicle enters the parking lot.

Transmission Control Protocol

A connection-oriented set of rules (protocol) that, along with the IP (Internet Protocol), is used to send data over an IP network. The TCP/IP protocol defines how data can be transmitted in a secure manner between networks. TCP/IP is the most widely used communications standard and is the basis for the Internet.

Transmission Control Protocol (TCP)

Acronym: TCP

Transport Layer Security

Transport Layer Security (TLS) is a protocol that provides communications privacy and data integrity between two applications communicating over a network. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL).

Transport Layer Security (TLS)

Acronym: TLS

Travel Times organization

A Travel Times organization is an entity that owns the resources in a Travel Times system. When rights are granted in the system, they are granted per-Travel Times organization.

Trimming

Trimming is the act of shortening a recording and isolating parts that are relevant to your case. When trimming is performed, the original video is preserved and the trimmed version is saved as a copy.

twilight schedule

A twilight schedule is a schedule entity that supports both daytime and nighttime coverages. A twilight schedule cannot be used in all situations. Its primary function is to control video related behaviors.

two-person rule

The two-person rule is the access restriction placed on a door that requires two cardholders (including visitors) to present their credentials within a certain delay of each other in order to gain access.

"U" terms

Unified report

The Unified report is an investigation task that you can use to query the record types available to you.

unit

A unit is a hardware device that communicates over an IP network that can be directly controlled by a Security Center role. We distinguish four types of units in Security Center:
  • Access control units, managed by the Access Manager role
  • Video units, managed by the Archiver role
  • ALPR units, managed by the ALPR Manager role
  • Intrusion detection units, managed by the Intrusion Manager role

Unit Assistant

The Unit Assistant is the central role that manages system-wide security operations, such as updating unit passwords and renewing unit certificates, on supported access control and video units.

Unit discovery tool

Starting with Security Center 5.4 GA the Unit discovery tool has been replaced by the Unit enrollment tool.

Unit enrollment

Unit enrollment is a tool that you can use to discover IP units (video and access control) connected to your network, based on their manufacturer and network properties (discovery port, IP address range, password, and so on). After you discovered a unit, you can add it to your system.

Unit replacement

Unit replacement is a tool that you can use to replace a failed hardware device with a compatible one, while ensuring that the data associated to the old unit gets transferred to the new one. For an access control unit, the configuration of the old unit is copied to the new unit. For a video unit, the video archive associated to the old unit is now associated to the new unit, but the unit configuration is not copied.

unit synchronization

Unit synchronization is the process of downloading the latest Security Center settings to an access control unit. These settings, such as access rules, cardholders, credentials, unlock schedules, and so on, are required so that the unit can make accurate and autonomous decisions in the absence of the Access Manager.

University Parking Enforcement

University Parking Enforcement is a Genetec Patroller™ software installation that is configured for university parking enforcement: the enforcement of scheduled parking permits or overtime restrictions. The use of maps is mandatory. Hotlist functionality is also included.

unlock schedule

An unlock schedule defines the periods of time when free access is granted through an access point (door side or elevator floor).

unreconciled read

An unreconciled read is an MLPI license plate read that has not been committed to an inventory.

user

A user entity is an account with access to the system. System administrators create user entities and configure their rights and privileges on the system.

user

A user identifies a person in a Clearance™ account. You configure what cases and files a user can access through access policies, and what features they can use through security and video request policies.

user activity report

In Genetec ClearID™, a user activity report is an audit trail of all activities related to users. The report includes timestamp information, activity type, who activity was performed by, and a details section including reason information.

user code padding

User code padding is a DMP Intrusion Panel extension feature that adds leading zeroes to user codes that are shorter than the specified minimum length.

user group

A user group is an entity that defines a group of users who share common properties and privileges. By becoming member of a group, a user automatically inherits all the properties of the group. A user can be a member of multiple user groups. User groups can also be nested.

user level (Security Center)

A user level is a numeric value assigned to users to restrict their ability to perform certain operations, such as controlling a camera PTZ, viewing the video feed from a camera, or staying logged on when a threat level is set. Level 1 is the highest user level, with the most privileges.

user level (Stratocast)

A user level is an access requirement that defines a user's ability to perform certain tasks once logged on to Stratocast™.

User management

The User management task is an administration task that you can use to configure users, user groups, and partitions.

user procedure

Replaces the term "incident procedure". See "standard operating procedure".

username

A username is an access credential that is comprised of a valid email address from one of the supported identity providers. A username can be registered to multiple Stratocast™ accounts (multi-account username), and must be activated by the user only once before logging on to any of the accounts that the username is registered to.

UTC Advisor Master and Advanced

The UTC Advisor Master and Advanced extension integrates United Technology Corporation (UTC)'s Advisor Master (formerly ATS Classic) and Advisor Advanced intrusion panels into Security Center. With this extension installed, operators can map UTC panel users to Security Center cardholders, respond to events and alarms from the panels, and send commands to the panels directly from Security Desk.

"V" terms

validated step

A validated step in an standard operating procedure (SOP) is a step that is either completed or skipped with a justification.

validation key

A validation key is a serial number uniquely identifying a computer that must be provided to obtain the license key.

Vault

The Vault is a tool that displays your saved snapshots and exported G64, G64x, and GEK (encrypted) video files. From the Vault, you can view the video files, encrypt and decrypt files, convert files to ASF, or package files with the Genetec™ Video Player.

vehicle identification number

A vehicle identification number (VIN) is an identification number that a manufacturer assigns to vehicles. This is usually visible from outside the vehicle as a small plate on the dashboard. A VIN can be included as additional information with license plate entries in a hotlist or permit list, to further validate a hit and ensure that it is the correct vehicle.

vehicle identification number (VIN)

Acronym: VIN

Vehicle inventory

The Vehicle inventory task provides a big-picture view of your fleet. You can see a list of all automatic video locating (AVL) units in your system, check health data and metadata, and search for vehicles based on specific filters.

Vehicle metadata report

The Vehicle metadata report task is an investigation task in Security Desk. You can use it to generate reports on local GPS unit and camera metadata key and value pair matches.

Vehicle route playback

The Vehicle route playback task is an investigation task in Security Desk. You can use it to view an AVL unit’s past location and associated camera feeds for a specified time frame.

Video

The Video task is an administration task that you can use to configure video management roles, units, analog monitors, and cameras.

video analytics

Video analytics is the software technology that is used to analyze video for specific information about its content. Examples of video analytics include counting the number of people crossing a line, detection of unattended objects, or the direction of people walking or running.

video analytics scenario

A video analytics scenario is an analytics configuration that is applied to video streams and that defines what information in the video is analyzed.

video archive

A video archive is a collection of video, audio, and metadata streams managed by an Archiver or Auxilliary Archiver role. These collections are catalogued in the archive database that includes camera events linked to the recordings.

video decoder

A video decoder is a device that converts a digital video stream into analog signals (NTSC or PAL) for display on an analog monitor. The video decoder is one of the many devices found on a video decoding unit.

video encoder (Security Center)

A video encoder is a device that converts an analog video source to a digital format by using a standard compression algorithm, such as H.264, MPEG-4, MPEG-2, or M-JPEG. The video encoder is one of the many devices found on a video encoding unit.

video encoder (Stratocast)

A video encoder is a video unit that converts an analog video source to a digital format by using a standard compression algorithm, such as H.264, MPEG-4, MPEG-2, or M-JPEG. Using a video encoder with multi-channel inputs, you can digitize the analog video of multiple cameras at the same time.

video file

A video file is a file created by an archiving role (Archiver or Auxiliary Archiver) to store archived video. The file extension is G64 or G64x. You need Security Desk or the Genetec™ Video Player to view video files.

Video file explorer

The Video file explorer is an investigation task that you can use to browse through your file system for video files (G64 and G64x), and to play, convert to ASF, and verify the authenticity of these files.

video protection

Video can be protected against deletion. Protection is applied on all video files needed to store the protected video sequence. Because no video file can be partially protected, the actual length of the protected video sequence depends on the granularity of the video files.

video request

A video request is a request from an authorized user to a camera owner, to share recordings for an investigation in Genetec Clearance™.

video request policy

A security policy in Clearance™ defines which users and groups have access to a particular feature related to the video request module.

video sequence

A video sequence is any recorded video stream of a certain duration.

video stream

A video stream is an entity representing a specific video quality configuration (data format, image resolution, bit rate, frame rate, and so on) on a camera.

video unit

A video unit is a video encoding or decoding device that is capable of communicating over an IP network and that can incorporate one or more video encoders. The high-end encoding models also include their own recording and video analytics capabilities. Cameras (IP or analog), video encoders, and video decoders are all examples of video units.

video watermarking

Video watermarking adds visible text to live, playback, and exported video processed by Security Center. This text includes identifying information that is intended to deter unauthorized users from leaking video recordings.

(Obsolete) Beginning in Security Center 5.9.0.0, video watermarking no longer refers to the use of digital signatures for tampering protection. Tampering protection is now called digital signature.

virtual alarm

A virtual alarm is an alarm on an intrusion detection area that is activated through a virtual input.

virtual door

A virtual door is a door entity that does not correspond to a real door. It is created in the context of intrusion detection configuration to synchronize the intrusion access rules with Synergis™ IX controllers when no physical door exists. Only one virtual door is necessary per Synergis IX controller.

virtual input

A virtual input is an input on an intrusion detection unit that is physically wired to an output so that Security Center can trigger it through the Trigger output action.

virtual zone

A virtual zone is a zone entity where the I/O linking is done by software. The input and output devices can belong to different units of different types. A virtual zone is controlled by the Zone Manager and only works when all the units are online. It can be armed and disarmed from Security Desk.

Visit details

The Visit details task is an investigation task that reports on the stay (check-in and check-out time) of current and past visitors.

visit request workflow

A visit request workflow is a series of activities associated with a visit request. These activities are performed by the system during the life cycle of a visit request. The activities can change the visit request state and properties, affect other entities in the system, or wait for a condition to become true.

Visitor activities

The Visitor activities task is an investigation task that reports on visitor activities (access denied, first person in, last person out, antipassback violation, and so on).

visitor escort rule

The visitor escort rule is the additional access restriction placed on a secured area that requires visitors to be escorted by a cardholder during their stay. Visitors who have a host are not granted access through access points until both they and their assigned host (cardholder) present their credentials within a certain delay.

Visitor management

The Visitor management task is the operation task that you can use to check in, check out, and modify visitors, as well as manage their credentials, including temporary replacement cards.

visitors report

In Genetec ClearID™, a visitors report is a list of current or upcoming visits, or visits that occurred in the past for a specific site. The report includes information about visitor name, event requester, event name, expected arrival, check-in, check-out, and watchlist status.

visual reporting

Visual reporting is dynamic charts or graphs in Security Desk that deliver insights that you act on. You can perform searches and investigate situations using these visual and user-friendly reports. The visual report data can be analyzed to help identify activity patterns and enhance your understanding.

visual tracking

Visual tracking is a Security Center feature that lets you follow an individual in live or playback mode through areas of your facility that are monitored by cameras.

visual watermarking

Visual watermarks add a transparent overlay to videos and images in Clearance™. The overlay displays identifying information about the user that is currently logged in, organization details, and timestamps indicating when the user viewed or shared the video or image. The visual watermark deters the unauthorized use or distribution of content. Visual watermarking can only be removed by users who have the hide visual watermark permission.

VoIP inventory

The VoIP inventory task is a maintenance task that reports on the SIP entities and all of the Security Center users with SIP accounts in your system.

VSIP port

The VSIP port is the name given to the discovery port of Verint units. A given Archiver can be configured to listen to multiple VSIP ports.

"W" terms

Warning (severity level)

The Warning severity level indicates that the system event is not critical. Although immediate attention is not required, it is recommended to correct the issue as soon as possible.

Watchdog

Genetec™ Watchdog is a Security Center service installed alongside the Genetec™ Server service on every server computer. Genetec™ Watchdog monitors the Genetec™ Server service, and restarts it if abnormal conditions are detected.

watchlist

In Genetec ClearID™, watchlists are used to screen visitors at an individual or company level. You can configure the watchlist to perform allow, block, or notify actions at a site or global level.

watchlist manager

In Genetec ClearID™, a watchlist manager is an identity that is responsible for watchlists. A watchlist manager can create or modify watchlists and add individuals or companies to a watchlist. They are also responsible for configuring watchlists as a site-specific watchlist or a global watchlist.

watchlist workflow

A watchlist workflow is a series of activities associated with screening visitors who are invited to a site. These activities are performed by the system during the life cycle of a visit request if watchlists are enabled for the account. The activities can change the visit request state and properties, affect other entities in the system, or wait for a condition to become true.

Wearable camera evidence

The Wearable camera evidence task is a maintenance task that reports on the upload and conversion status of the evidence files offloaded from body-worn camera (BWC) devices.

Wearable Camera Manager

The Wearable Camera Manager role is used to configure and manage body-worn camera (BWC) devices in Security Center, including configuring camera stations, adding officers (wearable camera users), uploading content to an Archiver, and setting the retention period for uploaded evidence.

Web App Server

The Web App Server role is used to configure the Genetec™ Web App, a web application that gives users remote access to Security Center. Each role created defines a unique web address (URL) that users enter in their web browser to log on to the Genetec™ Web App and access information from Security Center.

web client

The client component of a software system that provides access to the system's features from a web browser on the user's machine.

Web Client

Security Center Web Client is a web application that gives users remote access to Security Center so that they can monitor videos, investigate events related to various system entities, search for and investigate alarms, and manage cardholders, visitors, and credentials. Users can log on to Web Client from any computer that has a supported web browser installed.

Web Client Server

The Web Client Server role is used to configure Security Center Web Client, a web application that gives users remote access to Security Center. Each role created defines a unique web address (URL) that users enter in their web browser to log on to the Security Center Web Client and access information from Security Center.

Web Map Service

Web Map Service (WMS) is a standard protocol for serving georeferenced map images over the Internet that are generated by a map server using data from a GIS database.

Web Map Service (WMS)

Acronym: WMS

Web Server

The Web Server role is used to configure the Genetec™ Web App and the Web Client, two web applications that give users remote access to Security Center. Each role created defines a unique web address (URL) that users enter in their web browser to log on to the Genetec™ Web App or Web Client and access information from Security Center.

Web-based SDK

The Web-based SDK role exposes the Security Center SDK methods and objects as web services to support cross-platform development.

web-based authentication

Web-based authentication (also known as passive authentication) is when the client application redirects the user to a web form managed by a trusted identity provider. The identity provider can request any number of credentials (passwords, security tokens, biometric verifications, and so on) to create a multi-layer defense against unauthorized access. This is also known as multi-factor authentication.

wheel imaging

Wheel imaging is a virtual tire-chalking technology that takes images of the wheels of vehicles to prove whether they have moved between two license plate reads.

whitelist

A whitelist is a hotlist that is created to grant a group of license plates access to a parking lot. A whitelist can be compared to an access rule where the secured area is the parking lot. Instead of listing the cardholders, the whitelist applies to license plate credentials.

widget

A widget is a component of the graphical user interface (GUI) with which the user interacts.

Windows Communication Foundation

Windows Communication Foundation (WCF) is a communication architecture used to enable applications, in one machine or for multiple machines connected by a network, to communicate. Genetec Patroller™ uses WCF to communicate wirelessly with Security Center.

Windows Communication Foundation (WCF)

Acronym: WCF

workflow

In Genetec ClearID™, a workflow is a process used to initiate a request that requires multiple steps, including the authorization of different stakeholders. For example, access requests or site visit requests.

workstation

A workstation entity represents a Security Desk workstation in the system that grants additional access rights and privileges to selected users when they log on to the system through it.

"X" terms

X.509 certificate

X.509 certificate and digital certificate are synonyms. In Security Center, these two terms are used interchangeably.

XFEvent

In the CCURE 9000 system, an XFEvent is a work flow that can be configured to respond to different causes by triggering an alarm, an event, or a chain of events.

XFEvent management

The XFEvent management task is an operation task in Security Desk that you can use to see the current state of all XFEvents imported from CCURE 9000. For a selected event, you can apply manual actions, view causes, and show instructions.

"Z" terms

zone

A zone is an entity that monitors a set of inputs and triggers events based on their combined states. These events can be used to control output relays.

Zone activities

The Zone activities task is an investigation task that reports on zone related activities (zone armed, zone disarmed, lock released, lock secured, and so on).

Zone Manager

The Zone Manager role manages virtual zones and triggers events or output relays based on the inputs configured for each zone. It also logs the zone events in a database for zone activity reports.

Zone occupancy

The Zone occupancy task is an investigation task that reports on the number of vehicles parked in a selected parking area, and the percentage of occupancy.