Genetec™ Glossary - Genetec™ Glossary

series
Genetec™ Glossary
revised_modified
2021-04-29
category_custom
Glossary

"A" terms

absolute time

In Genetec Clearance™, absolute time refers to the actual recording start and end times of the video evidence. For example, 08:35:00 AM - 08:40:00 AM.

Access control

The Access control task is an administration task that you can use to configure access control roles, units, access rules, cardholders, credentials, and related entities and settings.

access control (physical access)

Access control (physical access) is the management of access to physical assets such as doors and group of doors.

Access control health history

The Access control health history task is a maintenance task that reports on events related to the health of access control entities. Unlike the events in the Health history report, the events in the Access control health history report are not generated by the Health Monitor role, identified by an event number, or categorized by severity.

access control unit

An access control unit entity represents an intelligent access control device, such as a Synergis™ appliance or an HID network controller, that communicates directly with the Access Manager over an IP network. An access control unit operates autonomously when it is disconnected from the Access Manager.
Also known as: door controller

Access control unit events

The Access control unit events task is a maintenance task that reports on events pertaining to selected access control units.

Access Manager

The Access Manager role manages and monitors access control units on the system.

access point

An access point is any entry (or exit) point to a physical area where access can be monitored and governed by access rules. An access point is typically a door side.

access policy

The access policy of a case or file in Genetec Clearance™ determines which users or groups have access rights to the case or file.

access request workflow

An access request workflow is a series of activities associated with an access request. These activities are performed by the system or authorized people during the life cycle of an access request. The activities can change the access request state and properties, affect other entities in the system, or wait for a condition to become true.

access reviews report

In Genetec ClearID™, an access reviews report is a list of access reviews for all sites associated with the Genetec ClearID™ account. The report includes information about area or role access reviews and the current review status (created, started, completed, canceled, or expired).

access right

An access right is the basic right users must have over any part of the system before they can do anything with it. Other rights, such as viewing and modifying entity configurations, are granted through privileges. In the context of a Synergis™ system, an access right is the right granted to a cardholder to pass through an access point at a given date and time.

access rule

An access rule entity defines a list of cardholders to whom access is either granted or denied based on a schedule. Access rules can be applied to secured areas and doors for entries and exits, or to intrusion detection areas for arming and disarming.

Access rule configuration

The Access rule configuration task is a maintenance task that reports on entities and access points affected by a given access rule.

Access troubleshooter

Access troubleshooter is a tool that helps you detect and diagnose access configuration problems. With this tool, you can find out about the following:
  • Who is allowed to pass through an access point at a given date and time
  • Which access points a cardholder is allowed to use at a given date and time
  • Why a given cardholder can or cannot use an access point at a given date and time

account

An account in Genetec Clearance™ is the organizational account.

Account Administrator

The Account Administrator in Genetec Clearance™ is a predefined user group with full access to the site, whose members typically act as site administrators. Only members of the Account Administrator group have access to the Configurations menu, from which they can create and manage users, groups, departments, categories, and access policies.

action

An action is a user-programmable function that can be triggered as an automatic response to an event, such as door held open for too long or object left unattended, or that can be executed according to a specific time table.

active alarm

An active alarm is an alarm that has not yet been acknowledged.

active authentication

Active authentication is when the client application captures the user credentials and sends them through a secure channel to a trusted identity provider for authentication.

Active Directory

Active Directory is a directory service created by Microsoft, and a type of role that imports users and cardholders from an Active Directory and keeps them synchronized.

Active Directory (AD)

Acronym: AD

Active Directory Federation Services

Active Directory Federation Services (ADFS) is a component of the Microsoft® Windows® operating system that issues and transforms claims, and implements federated identity.

Active Directory Federation Services (ADFS)

Acronym: ADFS

Active manual actions

The Active manual actions task is an operation task in Security Desk that you can use to view and cancel any active causes on CCURE doors and CCURE alarms.

Activity trails

The Activity trails task is a maintenance task that reports on the user activity related to video, access control, and ALPR functionality. This task can provide information such as who played back which video recordings, who used the Hotlist and permit editor, who enabled hotlist filtering, and much more.

add-on

An add-on is a software package that adds tasks, tools, or specific configuration settings to Security Center systems.

advanced correlation

Advanced correlation in Genetec Citigraf™ uses correlation rules to find relevant information about an alert.

Advanced Enrollment

The Advanced Enrollment plugin integrates ID card printers and encoders into Security Center. Using this plugin, you can print ID badges that can be read by QR code and barcode scanners, magstripe readers or contactless card readers. You can create ID badge templates to print and encode cards for an individual cardholder or batches of cardholders. You can also import personnel data from a third-party system to create cardholders and credentials.

Advanced Systems Format

The Advanced Systems Format (ASF) is a video streaming format from Microsoft. The ASF format can only be played in media players that support this format, such as Windows Media Player.

Advanced Systems Format (ASF)

Acronym: ASF

agent

An agent is a subprocess created by a Security Center role to run simultaneously on multiple servers for the purpose of sharing its load.

alarm

An alarm entity describes a particular type of trouble situation that requires immediate attention and how it can be handled in Security Center. For example, an alarm can indicate which entities (usually cameras and doors) best describe the situation, who must be notified, how it must be displayed to the user, and so on.

alarm acknowledgement

An alarm acknowledgement is a user's response to an alarm. In Security Center, the default and the alternative acknowledgement are the two variants of alarm acknowledgements. Each variant is associated to a different event so that specific actions can be programmed based on the alarm response selected by the user.

Alarm monitoring

The Alarm monitoring task is an operation task that you can use to monitor and respond to alarms (acknowledge, forward, snooze, and so on) in real time, and to review past alarms.

alarm receiver

An alarm receiver is a device that receives events from many different intrusion panels, either over a telephone line, a private IP network, or the Internet.

Alarm report

The Alarm report task is an investigation task that you can use to search and view current and past alarms.

Alarms

The Alarms task is an administration task that you can use to configure alarms and monitor groups.

alert

Alerts are notifications about time-sensitive events related to public safety, occurring at specific locations.

Alert details

The Alert details task is an operation task that displays detailed information about a specific alert or location you click on the map.

alert tray

The alert tray lists the most recent alerts you can see in Security Desk, based on the alert viewing criteria you set (time, priority, and district). Changing the alert viewing criteria automatically updates the number of active alerts displayed in the notification tray and the alerts displayed in the Maps task.

all open rule

When applied to areas, doors, and elevators, the all open rule grants access to all cardholders at all times.

allowed user

An allowed user of a Genetec Mission Control™ profile is a user to whom the profile can be assigned, as long as the user is connected to Security Center through Security Desk.

ALPR

The ALPR task is an administration task that you can use to configure roles, units, hotlists, permits, and overtime rules for ALPR, and related entities and settings.

ALPR camera

An Automatic License Plate Recognition (ALPR) camera is a camera connected to an ALPR unit that produces high resolution close-up images of license plates.

ALPR context

An ALPR context is an ALPR optimization that improves license plate recognition performance for license plates from a specific region (for example, New York) or from a group of regions (for example, Northeast states).

ALPR Frequency Monitor

The Stakeout - ALPR Frequency Monitor plugin tracks how often vehicles are detected by fixed Sharp cameras. The system can alert Security Desk users if vehicles without whitelisted license plates have exceed the configured threshold.

ALPR Manager

The ALPR Manager role manages and controls the patrol vehicle software (Genetec Patroller™), Sharp cameras, and parking zones. The ALPR Manager stores the ALPR data (reads, hits, timestamps, GPS coordinates, and so on) collected by the devices.

ALPR rule

ALPR rule is a method used by Security Center and AutoVu™ for processing a license plate read. An ALPR rule can be a hit rule or a parking facility.

ALPR unit

An ALPR unit is a device that captures license plate numbers. An ALPR unit typically includes a context camera and at least one ALPR camera.

analog monitor

An analog monitor entity represents a monitor that displays video from an analog source, such as a video decoder or an analog camera. This term is used in Security Center to refer to monitors that are not controlled by a computer.

antipassback

Antipassback is an access restriction placed on a secured area that prevents a cardholder from entering an area that they have not yet exited from, and vice versa.

architecture version

An architecture version is a software version that introduces significant changes to the architecture or user experience of the platform. Architecture upgrades require changes to system design and configuration settings, data migration, and retraining of users. Architecture versions are not compatible with previous versions. A license update is required to upgrade to a new architecture version. An architecture version is indicated by a version number with zeros at the second, third and fourth positions: X.0.0.0. For more information, see our Product Lifecycle page on GTAP.

Archive storage details

The Archive storage details task is a maintenance task that reports on the video files (file name, start and end time, file size, protection status, and so on) used to store video archive. Using this task, you can also change the protection status of these video files.

archive transfer

Archive transfer is the process of transferring your video data from one location to another. The video is recorded and stored on the video unit itself or on an Archiver storage disk, and then the recordings are transferred to another location.

Archive transfer

(Obsolete as of Security Center 5.8 GA) The Archive transfer task is an administration task that allows you to configure settings for retrieving recordings from a video unit, duplicating archives from one Archiver to another, or backing up archives to a specific location. Starting from Security Center 5.8 GA, Archive transfer is a page inside the Video administration task.

Archiver

The Archiver role is responsible for the discovery, status polling, and control of video units. The Archiver also manages the video archive and performs motion detection if it is not done on the unit itself.

Archiver events

The Archiver events task is a maintenance task that reports on events pertaining to selected Archiver roles.

Archiver statistics

Archiver statistics is a maintenance task that reports on the operation statistics (number of archiving cameras, storage usage, bandwidth usage, and so on) of the selected archiving roles (Archiver and Auxiliary Archiver) in your system.

Archives

The Archives task is an investigation task that you can use to find and view video archives by camera and time range.

archiving role

An archiving role is an instance of either the Archiver role or Auxiliary Archiver role.

area

In Security Center, an area entity represents a concept or a physical location (room, floor, building, site, and so on) used for grouping other entities in the system.

area

In Genetec ClearID™, an area is a logical entity that defines the relationship between Synergis™ doors and area owners. Areas are managed by the area owner.

Area activities

The Area activities task is an investigation task that reports on access control events pertaining to selected areas.

area approver

In Genetec ClearID™, an area approver is an identity that has approval authority over an area. The approver can approve or deny access requests for an area. They are also responsible for area access review approvals.

area owner

In Genetec ClearID™, an area owner is an identity that has authority over an area. The owner can define the policy for an area and assign area approvers.

Area presence

The Area presence is and investigation task that provides a snapshot of all cardholders and visitors currently present in a selected area.

area view

The area view is a view that organizes the commonly used entities such as doors, cameras, tile plugins, intrusion detection areas, zones, and so on, by areas. This view is primarily created for the day to day work of the security operators.

Area view

The Area view task is an administration task that you can use to configure areas, doors, cameras, tile plugins, intrusion detection areas, zones, and other entities found in the area view.

armed tile

An armed tile is a tile in Security Desk that displays new alarms that are triggered. In the Alarm monitoring task all tiles are armed, while in the Monitoring task, tiles must be armed by a user.

asset

An asset entity represents any valuable object with an RFID tag attached, thus allowing it to be tracked by an asset management software.

asynchronous video

Asynchronous video is simultaneous playback video from more than one camera that are not synchronized in time.

attributes

In Genetec ClearID™, attributes are the traits or characteristics that make up an identity. Examples of attributes include department, location, role, seniority, pay grade, training certifications, and security clearance.

audio decoder

An audio decoder is a device or software that decodes compressed audio streams for playback. Synonym of speaker.

audio encoder

An audio encoder is a device or software that encodes audio streams using a compression algorithm. Synonym of microphone.

Audit trails

The Audit trails task is a maintenance task that reports on the configuration changes of the selected entities in the system. The report also indicates the user who made the changes.

authentication

The process of verifying that an entity is what it claims to be. The entity could be a user, a server, or a client application.

Authentication Service

The Authentication Service role connects Security Center to an external identity provider for third-party authentication.

Instances of the Authentication Service role are protocol-specific. One of the following protocols is selected at role creation:

  • OpenID
  • SAML2
  • WS-Trust or WS-Federation

Multiple Authentication Service roles can be created, but each must monitor a unique list of domains.

authorization

The process of establishing the rights an entity has over the features and resources of a system.

authorized user

An authorized user is a user who can see (has the right to access) the entities contained in a partition. Users can only exercise their privileges on entities they can see.

automatic enrollment

Automatic enrollment is when new IP units on a network are automatically discovered by and added to Security Center. The role that is responsible for the units broadcasts a discovery request on a specific port, and the units listening on that port respond with a message that contains the connection information about themselves. The role then uses the information to configure the connection to the unit and enable communication.

automatic license plate recognition

Automatic license plate recognition (ALPR) is an image processing technology used to read license plate numbers. ALPR converts license plate numbers cropped from camera images into a database searchable format.

automatic license plate recognition (ALPR)

Acronym: ALPR

automation

Automation is a series of activities associated to an incident type. These activities are performed by the system during the life cycle of an incident. The activities can change the incident state and properties, affect other entities in the system, or simply wait for a condition to become true. The automation workflow helps automate simple tasks, such as exporting the incident when it is resolved, so operators can focus on more complex ones. (Replaces the term incident workflow)

automation rule

An automation rule is a rule that is triggered by an Automation event and that triggers a group of actions when a set of conditions related to a record type is met.

AutoVu™

The AutoVu™ automatic license plate recognition (ALPR) system automates license plate reading and identification, making it easier for law enforcement and for municipal and commercial organizations to locate vehicles of interest and enforce parking restrictions. Designed for both fixed and mobile installations, the AutoVu™ system is ideal for a variety of applications and entities, including law enforcement, municipal, and commercial organizations.

AutoVu™ ALPR Processing Unit

AutoVu™ ALPR Processing Unit is the processing component of the SharpX system. The ALPR Processing Unit is available with two or four camera ports, with one dedicated processor per camera (if using SharpX) or per two cameras (if using SharpX VGA). This ensures maximum, per-camera, processing performance. The ALPR Processing Unit is sometimes referred to as the trunk unit because it is typically installed in a vehicle's trunk.
Also known as: trunk unit

AutoVu™ Free-Flow Credential Report

The AutoVu™ Free-Flow Credential Report plugin generates a real-time inventory of the parking zone occupancy along with the cardholder information. You can create a report for the current parking zone occupancy, or for a specific time in the past based on the selected time filter.

AutoVu™ Managed Services

With AutoVu™ Managed Services (AMS), your automatic license plate recognition (ALPR) system is hosted in the cloud and experts from Genetec Inc. configure and maintain it. This reduces the need for on-site IT infrastructure and support.

AutoVu™ Managed Services (AMS)

Acronym: AMS

AutoVu MLC™

AutoVu MLC™ (Machine Learning Core) replaces traditional rule-based ALPR technology with machine learning-based algorithms to reduce common ALPR misreads and false positives. It is a proprietary technology of Genetec Inc. used in AutoVu™ Sharp hardware for license plate recognition.

AutoVu™ third-party data exporter

The AutoVu™ third-party data exporter is a feature that uses either an HTTPS or a SFTP connection protocol to securely export ALPR events, for example reads and hits, to external endpoints.

Auxiliary Archiver

The Auxiliary Archiver role supplements the video archive produced by the Archiver role. Unlike the Archiver role, the Auxiliary Archiver role is not bound to any particular discovery port, therefore, it can archive any camera in the system, including cameras federated from other Security Center systems. The Auxiliary Archiver role cannot operate independently; it requires the Archiver role to communicate with video units.

auxiliary PoE camera

For a more detailed view of the area surrounding a license plate read location, you can install AutoVu™ auxiliary PoE cameras on the parking enforcement patrol vehicle.

AVL area entry and exit report

The AVL area entry and exit report task is an investigation task installed with the Security Center Fleet Monitoring plugin. Use this task to visually report vehicle metrics, such as how many times a vehicle entered or exited a defined area over time.

AVL data offload

The AVL data offload task is an operation task installed with the Security Center Fleet Monitoring plugin. Use this task to offload data and video data from AVL units to an external Archiver.

AVL data offload report

The AVL data offload report task is an investigation task installed with the Security Center Fleet Monitoring plugin. Use this task to view details on past AVL data offloads.

AVL data offload status

The AVL data offload status task is an investigation task installed with the Security Center Fleet Monitoring plugin. You can use this task to view the status of queued, in-progress, and recently completed data offload requests.

AVL video offload status report

The AVL video offload status report task is an investigation task in Security Center. You can use this task to generate reports on the size of video offloaded from selected AVL units per four-hour period.

"B" terms

BACnet

BACnet is a communication protocol used for building automation and control (BAC). Using the BACnet plugin, you can integrate your network of BAC devices and sensors into Security Center.

BACstac Protocol

BACstac Protocol is a Windows service installed by the BACnet plugin. This protocol is required for the plugin to communicate with BACnet devices.

Badge designer

The Badge designer is the tool that you can use to design and modify badge templates.

badge template

A badge template is an entity used to configure a printing template for badges.

bar code scanner

A bar code scanner or reader is an optical scanner that reads bar codes and pushes the data to a computer over a serial or TCP connection.

basic correlation

Basic correlation in Genetec Citigraf™ is the search for information related to an alert, based on two criteria: time window prior to the alert time, and radius around the alert location.

block face (2 sides)

A block face (2 sides) is a parking regulation characterizing an overtime rule. A block face is the length of a street between two intersections. A vehicle is in violation if it is seen parked within the same block over a specified period of time. Moving the vehicle from one side of the street to the other does not make a difference.

body-worn camera

A body-worn camera (BWC), also known as a wearable camera, is a video recording system that is typically used by law enforcement to record their interactions with the public or gather video evidence at crime scenes.
Acronym: BWC

body-worn camera station

A body-worn camera station is a physical device or software used to automatically upload media from a body-worn camera to Genetec Clearance™ or the Wearable Camera Manager role in Security Center, depending on which .json file is used.

bookmark

A bookmark is an indicator of an event or incident that is used to mark a specific point in time in a recorded video sequence. A bookmark also contains a short text description that can be used to search for and review the video sequences at a later time.

Bookmarks

The Bookmarks task is an investigation task that searches for bookmarks related to selected cameras within a specified time range.

Bosch Map 5000 intrusion panel

The Bosch Map 5000 intrusion panel extension receives events from a Bosch Map 5000 intrusion alarm system and saves them in the Security Center database for future investigations. The extension can raise alarms on intrusion panel events and state changes, display events on maps, allows operators to view video that is linked to intrusion areas, events, and alarms for video verification, which helps to reduce false alarms.

Breakout box

The breakout box is the proprietary connector box of Genetec Inc. for AutoVu™ mobile solutions that use Sharp cameras. The breakout box provides power and network connectivity to the Sharp units and the in-vehicle computer.

broadcast

Broadcast is the communication between a single sender and all receivers on a network.

BuyTime

BuyTime is a plugin you can use to postpone the scheduled arming of intrusion detection areas in Security Center.

"C" terms

CAD call

CAD calls are emergency phone calls (such as 911 in North America) received by a call dispatch center and managed by a CAD system.

computer-aided dispatch (CAD) call

CAD calls

The CAD calls (in plural) task is an investigation task that reports on the raw data received from an external CAD system.

call dialog box

The call dialog box is a Sipelia-related dialog box that appears from the notification tray within Security Desk once an incoming call comes in from a SIP endpoint. In the call dialog box, users can manage their calls and their list of contacts and favorites, and set their availability status.

Call report

The Call report task is an investigation task. You can use it to review call sessions and generate reports. Among the possible actions that can be performed in this task, users can view the call logs for all sessions, watch playback video of all recorded call sessions, and see the bookmarks that have been added to video sequences of associated cameras.

call session

A call session is the sequence of events or activities that occur from the time a SIP call is started to the time that it ends, including all call transfers. For example, if a call is transferred twice, the sequence of events that occur in both those transfers are all part of the same call session. In a Security Center system equipped with the Sipelia™ module, call sessions can be reviewed and exported through the Call report task within Security Desk.

camera (Security Center)

A camera entity represents a single video source in the system. The video source can either be an IP camera, or an analog camera that connects to the video encoder of a video unit. Multiple video streams can be generated from the same video source.

camera (Stratocast)

A camera is a video unit that represents a single video source in the system. The video source can be an IP camera, or an analog camera that is connected to a video encoder.

camera blocking

Camera blocking is an Omnicast™ feature that lets you restrict the viewing of video (live or playback) from certain cameras to users with a minimum user level.

Camera configuration

The Camera configuration task is a maintenance task that reports on the properties and settings of local cameras in your system (manufacturer, resolution, frame rate, stream usage, and so on).

Camera events

The Camera events task is an investigation task that reports on events pertaining to selected cameras within a specified time range.

Camera Integrity Monitor

The Camera Integrity Monitor role samples video images from cameras at regular intervals, detects abnormal variations that indicate that cameras might have been tampered with, and generates Camera tampering events.

camera integrity monitoring

In Security Center, camera integrity monitoring is software that detects any form of tampering with the camera, such as moving the camera, obstructing the camera view, changing the camera focus, and so on. The software automatically generates events to alert the security team to remedy the situation.

camera sequence

A camera sequence is an entity that defines a list of cameras that are displayed one after another in a rotating fashion within a single tile in Security Desk.

canvas

Canvas is one of the panes found in the Security Desk's task workspace. The canvas is used to display multimedia information, such as videos, maps, and pictures. It is further divided into three panels: the tiles, the dashboard, and the properties.

capture rate

The capture rate measures the speed at which a license plate recognition system can take a photo of a passing vehicle and detect the license plate in the image.

Card and PIN

Card and PIN is an access point mode that requires a cardholder to present their card, and then enter a personal identification number (PIN).

cardholder

A cardholder entity represents a person who can enter and exit secured areas by virtue of their credentials (typically access cards) and whose activities can be tracked.

Cardholder access rights

The Cardholder access rights task is a maintenance task that reports on which cardholders and cardholder groups are granted or denied access to selected areas, doors, and elevators.

Cardholder activities

The Cardholder activities task is an investigation task that reports on cardholder activities, such as access denied, first person in, last person out, antipassback violation, and so on.

Cardholder configuration

The Cardholder configuration is a maintenance task that reports on cardholder properties, such as first name, last name, picture, status, custom properties, and so on.

cardholder group

A cardholder group is an entity that defines the common access rights of a group of cardholders.

Cardholder management

The Cardholder management task is an operation task. You can use this task to create, modify, and delete cardholders. With this task, you can also manage a cardholders' credentials, including temporary replacement cards.

case

A case in Genetec Clearance™ is a record of an incident, which can be shared with internal and external organizations. In a case, you can upload digital evidence, such as media and non-media files, and then manage these files outside of the case.

cash register

A cash register entity represents a single cash register (or terminal) in a point of sale system.

category

A category in Genetec Clearance™ is a grouping of similar incident types. For example, you can create categories for shoplifting, employee theft, and fraud, all of which might be crimes investigated by the same department. Categories are used to classify cases.

CCURE manual actions audit trails

The CCURE manual actions audit trails task is an investigation task in Security Desk. You can use this task to search for actions performed in Security Center synchronized CCURE entities, and see which Security Center users performed the action and when.

certificate

Designates one of the following: (1) digital certificate; (2) SDK certificate.

certificate authority

A certificate authority or certification authority (CA) is an entity or organization that signs identity certificates and attests to the validity of their contents.

certificate authority (CA)

Acronym: CA

certified

Used to define a product (specific hardware model, software version, or a combination of both) that has been fully tested by our lab technicians and certified to work with a specific software release of a given Genetec™ product, in accordance with our product documentation.

checkpoint

A checkpoint can be any entity in Security Center; including events, door readers, intrusion detection units, license plate reads, or any device that a cardholder can use to present a credential.

Checkpoint history

The Checkpoint history task is a Security Patrol System (SPS) CheckPoint task that you use to investigate when checkpoints were badged, skipped, late, extended, and canceled.

City Parking Enforcement

City Parking Enforcement is a Genetec Patroller™ software installation that is configured for the enforcement of parking permit and overtime restrictions.

City Parking Enforcement with Wheel Imaging

City Parking Enforcement with Wheel Imaging is a City Parking Enforcement installation of a Genetec Patroller™ application that also includes wheel imaging. The use of maps is mandatory and the mobile AutoVu™ system must include navigation hardware.

claim

A statement that a trusted third-party makes about a subject, such as a user. For example, a claim can be about a name, identity, key, group, privilege, or capability. Claims are issued by an identity provider. They are given one or more values and then packaged in a security token that is sent to relying applications during third-party authentication.

client administrator

User level that is assigned by either the integrator administrator or integrator user. The client administrator does not have all of the privileges that the integrator user levels have, but the client administrator can allow or restrict client user or remote monitoring user access to the Stratocast™ portal. You can only have one client administrator per client account, but you can register the same username to multiple users.

client user

User level that is assigned by either the integrator administrator, integrator user, or the client administrator. You can only add a maximum of nine client users per client account, not including the client administrator, and they can each be assigned unique usernames or the same username.

client-specific key stream

The client-specific key stream is the encrypted form of the master key stream. The master key stream is encrypted with the public key contained in an encryption certificate, specifically issued for one or more client machines. Only the client machines that have the encryption certificate installed have the required private key to decrypt the encrypted key stream.

Cloud Archives

Cloud Archives is a service from Genetec Inc. that enables organizations to maintain video recordings in the cloud, while continuing to leverage their existing Security Center system.

cloud platform

A cloud platform provides remote computing and storage services through centralized data centers that are accessible via the Internet.

Cloud Playback

The Cloud Playback role is used by Cloud storage to stream video archives from the cloud to clients and federated users connected to the system. Cloud Playback supports the Real Time Streaming Protocol (RTSP) locally and uses TLS to retrieve video sequences from the cloud.

Cloud storage

Cloud storage is a service from Genetec Inc. that extends on premise storage for Security Center Omnicast™ into the cloud. Video archives in Cloud storage benefit from extended retention periods, secure and redundant storage, and seamless retrieval from Security Desk.

collaborative incident

A collaborative incident is an incident type that requires the collaboration of multiple teams to resolve. Each team has specific tasks to follow, which are represented by sub-incidents. The collaborative incident is resolved when all its sub-incidents are resolved.

Commercial Identity Verification

Commercial Identity Verification (CIV) is a credential standard that works within the Personal Identity Verification (PIV) framework, but is tailored for the commercial sector.

Commercial Identity Verification (CIV)

Acronym: CIV

computer-aided dispatch

Computer-aided dispatch (CAD), also called computer-assisted dispatch, is a method of dispatching police vehicles, fire trucks, ambulances, and so on, assisted by computer. CAD systems consist of several modules that provide services at multiple levels in a dispatch center and in the field of public safety. These services include call input, call dispatching, call status maintenance, event notes, field unit status and tracking, and call resolution and disposition.

computer-aided dispatch (CAD)

Acronym: CAD

Config Tool

Config Tool is the Security Center administrative application used to manage all Security Center users and to configure all Security Center entities such as areas, cameras, doors, schedules, cardholders, patrol vehicles, ALPR units, and hardware devices.

Conflict resolution utility

The Conflict resolution utility is a tool that helps you resolve conflicts caused by importing users and cardholders from an Active Directory.

connector

In Genetec ClearID™, a connector is a custom component that allows third-party system integrations to share data with Genetec ClearID™. Connectors are application-dependent.

Contact ID

Contact ID is the communication protocol that the Receiver intrusion detection extension uses to communicate with third-party alarm receivers.

context camera

A context camera is a camera connected to an ALPR unit that produces a wider angle color image of the vehicle whose license plate was read by the ALPR camera.

Continuous Delivery

The Continuous Delivery (CD) release track offers customers an upgrade path with ongoing innovations, introducing new features, bug fixes, performance enhancements, and support for the latest devices through minor versions. The frequency of changes introduced on the CD track may be impractical for some organizations, who opt for the long-term predictability of the LTS track.

Continuous Delivery (CD)

Acronym: CD

contract permit parking

Contract permit parking is a parking scenario where only drivers with monthly permits can park in the parking zone. A whitelist is used to grant permit holders access to the parking zone.

controlled exit

A controlled exit is when credentials are necessary to leave a secured area.

controller module

Controller module is the processing component of Synergis™ Master Controller with IP capability. This module comes pre-loaded with the controller firmware and the web-based administration tool, Synergis™ Appliance Portal.

convenience time

The convenience time is a configurable leeway time before a vehicle starts to be charged after entering the parking zone. For example, if you need to set up a 2-hour free parking period before paid time or parking enforcement takes effect, you would set the convenience time for 2 hours. For parking lots where parking enforcement begins immediately, you would still need to set a short convenience time to allow vehicle owners time to find a parking spot and purchase parking time before parking enforcement begins.

conversation window

The conversation window is a Sipelia™-related window that opens within Security Desk once a SIP call has been accepted by either the caller or the recipient of a call. From the conversation window, Security Center users can manage conversations, forward calls, and view associated video when available.

Copy configuration tool

The Copy configuration tool helps you save configuration time by copying the settings of one entity to many others that partially share the same settings.

correlation

Correlation refers to the relationship that exists between two data sources A and B: when behavior X is observed on A, behavior Y is expected to be observed on B. Genetec Citigraf™ operates on the basis of these correlations to find relevant information to assist the public safety responders.

correlation

Correlation refers to the relationship that exists between two types of events, A and B. A correlation exists between A and B if whenever event A occurs, event B is expected. For example, if whenever there is a large gathering of people, the number of new cases of COVID-19 increases in the following days, we can say that there is a correlation between large gatherings and the increase of the number of new cases of COVID-19.

correlation rule

A correlation rule is a set of user-defined data queries based on a correlation hypothesis. When alerts are received in Genetec Citigraf™, the correlation rules are automatically matched against the available data sources to validate the hypothesis. When a match is found (called a hit), a new alert is generated.

Correlation Rules Engine

The Correlation Rules Engine role (rules engine in short) is the role dedicated to the processing of correlation rules in Genetec Citigraf™.

covert hit

A covert hit is a read (captured license plate) that is matched to a covert hotlist. Covert hits are not displayed on the Genetec Patroller™ screen, but can be displayed in Security Desk by a user with proper privileges.

covert hotlist

Covert hotlists allow you to ensure the discretion of an ongoing investigation or special operation. When a hit is identified, only the authorized officer at the Security Center station is notified, while the officer in the patrol vehicle is not alerted. This enables enforcement officials to assign multiple objectives to the vehicle and back-end systems, while not interrupting the priorities of officers on duty.

credential

A credential entity represents a proximity card, a biometrics template, or a PIN required to gain access to a secured area. A credential can only be assigned to one cardholder at a time.

Credential activities

The Credential activities task is an investigation task that reports on credential related activities, such as access denied due to expired, inactive, lost, or stolen credentialsl, and so on.

credential code

A credential code is a textual representation of the credential, typically indicating the Facility code and the Card number. For credentials using custom card formats, the user can choose what to include in the credential code.

Credential configuration

The Credential configuration task is a maintenance task that reports on credential properties, such as status, assigned cardholder, card format, credential code, custom properties, and so on.

Credential management

The Credential management task is an operation task. You can use this task to create, modify, and delete credentials. With this task, you can also print badges and enroll large numbers of card credentials into the system, either by scanning them at a designated card reader or by entering a range of values.

Credential request history

The Credential request history task is an investigation task that reports on which users requested, canceled, or printed cardholder credentials.

cumulative security rollup

A cumulative security rollup is a periodic release that contains the latest security fixes and updates for Synergis™ units.

Cumulative Update

A Cumulative Update (CU) is a release patch to include the cumulative hotfixes for a product release.

Cumulative Update (CU)

Acronym: CU

custom event

A custom event is an event added after the initial system installation. Events defined at system installation are called system events. Custom events can be user-defined or automatically added through plugin installations. Unlike system events, custom events can be renamed and deleted.

custom field

A custom field is a user-defined property that is associated with an entity type and is used to store additional information that is useful to your organization.

cyphertext

In cryptography, cyphertext is the encrypted data.

"D" terms

Daily usage per Patroller

The Daily usage per Patroller task is an investigation task that reports on the daily usage statistics of a selected patrol vehicle (operating time, longest stop, total number of stops, longest shutdown, and so on) for a given date range.

Dashboards

The Dashboards task is an operation task that provides a blank canvas on which you can pin widgets, including Security Center tiles, reports, and charts. These widgets track key indicators, and provide an overview of the activity and events recorded by the system.

data center

A secure, off-site facility that acts as a centralized repository for computer and server systems, telecommunication equipment, and related storage systems. In Stratocast™, the country that you select when creating or modifying your client accounts is used to choose the closest data center, and helps to establish an efficient connection between your client and Stratocast™.

data ingestion

Data ingestion is the means through which you can import data from external sources into Security Center without having to develop any code.

data source

A data source in Genetec Citigraf™ is an external data provider that can be queried for specific types of information. The integration of the external data provider to Security Center is handled by a plugin role. Typical data sources used in Genetec Citigraf™ are computer-aided dispatch (CAD) systems, geographic information systems (GIS), record management systems (RMS), and so on.

database server

A database server is an application that manages databases and handles data requests made by client applications. Security Center uses Microsoft SQL Server as its database server.

day-and-night camera

A day-and-night camera is a camera that can be used to record during the day and at night, because it adapts to the amount of ambient light in a given scene. As a result, users can easily make out the images in a scene, regardless of the amount of light that is present.

debounce

A debounce is the amount of time an input can be in a changed state (for example, from active to inactive) before the state change is reported. Electrical switches often cause temporarily unstable signals when changing states, possibly confusing the logical circuitry. Debouncing is used to filter out unstable signals by ignoring all state changes that are shorter than a certain period (in milliseconds).

decision support system

A decision support system (DSS) is an information system that supports business or organizational decision-making activities.

decision support system (DSS)

Acronym: DSS

default expiration delay

The default expiration delay is used for permits supplied by Pay-by-Plate Sync that do not include an expiration. In this case, AutoVu™ Free-Flow checks with the parking permit provider to see if the permit is still valid. Increasing this value reduces the frequency of the permit checks. For example, if the parking lot charges for parking in increments of 15 minutes, and you also set the default expiration delay to 15 minutes, the system validates the permit with the parking provider every 15 minutes.

degraded mode

Degraded mode is an offline operation mode of the interface module when the connection to the Synergis™ unit is lost. The interface module grants access to all credentials matching a specified facility code. Only HID VertX interface modules can operate in degraded mode.

delegation

In Genetec ClearID™, delegation is the process of transferring Genetec ClearID™ tasks for site owners, area owners, area approvers, role owners, role managers, supervisors, and visit event approvers to someone else in your organization. For example, during a planned vacation, sabbatical, and so on.

department

A department in Genetec Clearance™ is a division or unit of your organization that you can assign cases to. A department consists of users and groups, each of which is given access to cases or files.

dependent mode

Dependent mode is an online operation mode of the interface module where the Synergis™ unit makes all access control decisions. Not all interface modules can operate in dependent mode.

Destination Entry Computer

A Destination Entry Computer (DEC), also known as a terminal, is a point of entry in a destination dispatch system. A cardholder gains access to an elevator from a DEC, which is located at an elevator landing.

Destination Entry Computer (DEC)

Acronym: DEC

Destination entry devices

A destination entry device refers to the devices in an Otis CompassPlus™ Destination Management system related to entry; including the Destination Entry Computers (DEC) and the Destination Entry Redirectors (DER).

Destination entry devices (DED)

Acronym: DED

Destination Entry Redirector

The Destination Entry Redirector (DER) is a redirector that manages the network routes of the Otis CompassPlus™ Destination Management system.

Destination Entry Redirector (DER)

Acronym: DER

Destination Entry Server

A Destination Entry Server (DES) is a server that controls a group of Destination Entry Computers (DECs) in the Otis CompassPlus™ Destination Management system. For failover purposes, the CompassPlus™ system might also have standby servers.

Destination Entry Server (DES)

Acronym: DES

detected image

A detected image is a picture of a person's face that is captured on a video stream that is being analyzed for facial recognition. The ability to capture an image and identify the person is gained by sending video streams from Security Center cameras to third-party facial recognition systems for analysis through the Facial Recognition Framework plugin.

device

In Stratocast™, a device can be either a video unit (camera or video encoder) or a NAS (network attached storage) volume. You can add a device from the Devices page of the client account.

dewarping

Dewarping is the transformation used to straighten a digital image taken with a fisheye lens.

deister proxSafe

The deister proxSafe plugin integrates deister proxSafe key management systems into Security Center. You can use this plugin to manage proxSafe cardholders and assets in Security Center and monitor proxSafe events in Security Desk.

Diagnostic data collector

The Diagnostic data collector is a tool that you can use to collect and package system information to send to Genetec™ Technical Assistance Center for troubleshooting purposes.

dial plan

A dial plan is a collection of rules that defines how calls are routed locally or between two SIP trunks. Dial plans ensure that calls are routed and rerouted correctly, and they also allow administrators to block calls to certain geographic locations or ensure the privacy of the callers.

digital certificate

A digital certificate, also known as an identity certificate or encryption certificate, is an electronic "passport" that allows a person, computer, or organization to exchange information securely over the Internet using the public key infrastructure (PKI).

digital signature

A digital signature is cryptographic metadata added to video frames by the Archiver or Auxiliary Archiver to ensure their authenticity. If a video sequence is manipulated by adding, deleting, or modifying frames, the signature of the modified content will differ from the original, indicating that the video sequence has been tampered with.

Directory

The Directory role identifies a Security Center system. It manages all entity configurations and system-wide settings. Only a single instance of this role is permitted on your system. The server hosting the Directory role is called the main server, and must be set up first. All other servers you add in Security Center are called expansion servers, and must connect to the main server to be part of the same system.

Directory authentication

Directory authentication is a Security Center option that forces all client and server applications on a given machine to validate the identity certificate of the Directory before connecting to it. This measure prevents man-in-the-middle attacks.

Directory gateway

Directory gateways allow Security Center applications located on a non-secured network to connect to the main server that is behind a firewall. A Directory gateway is a Security Center server that acts as a proxy for the main server. A server cannot be both a Directory server and a Directory gateway; the former must connect to the Directory database, while the latter must not, for security reasons.

Directory Manager

The Directory Manager role manages the Directory failover and load balancing to produce the high availability characteristics in Security Center.

Directory server

A Directory server is any one of the multiple servers simultaneously running the Directory role in a high availability configuration.

discovery port

A discovery port is a port used by certain Security Center roles (Access Manager, Archiver, ALPR Manager) to find the units they are responsible for on the LAN. No two discovery ports can be the same on one system.

district

A district is a parking regulation characterizing an overtime rule. A district is a geographical area within a city. A vehicle is in violation if it is seen within the boundaries of the district over a specified period of time.

DMP

The DMP Intrusion Panel extension integrates DMP panels in Security Center so that users can monitor intrusions in DMP areas.

DMS message history

The DMS message history task is a Security Center Digital Sign Management investigation task in Security Desk that shows the changes to messages activated on a sign.

door

A door entity represents a physical barrier. Often, this is an actual door but it could also be a gate, a turnstile, or any other controllable barrier. Each door has two sides, named In and Out by default. Each side is an access point (entrance or exit) to a secured area.

Door activities

The Door activities task is an investigation task that generates reports on door-related activities, such as access denied, door forced open, door open too long, hardware tamper, and so on.

door contact

A door contact monitors the state of a door, whether it is open or closed. It can also be used to detect an improper state, such as door open too long.

door side

Every door has two sides, named In and Out by default. Each side is an access point to an area. For example, passing through one side leads into an area, and passing through the other side leads out of that area. For the purposes of access management, the credentials that are required to pass through a door in one direction are not necessarily the same that are required to pass through in the opposite direction.

door template

A door template defines the wiring for a specific door configuration, which simplifies and accelerates the door creation process by eliminating the need to manually map the physical wiring for a door entity.

Door troubleshooter

The Door troubleshooter task is a maintenance task that lists all the cardholders who have access to a particular door side or elevator floor at a specific date and time.

double-badge activation

With double-badge activation, an authorized cardholder can unlock a door and trigger actions by badging twice. The door remains unlocked and the action remains active until the next double-badge event.

Driver Development Kit

Driver Development Kit is a SDK for creating device drivers.

Driver Development Kit (DDK)

Acronym: DDK

dual recording

Dual recording is the process of recording and storing recorded videos in the cloud and on an SD card of supported devices simultaneously.

duress

A duress is a special code used to disarm an alarm system. This code quietly alerts the monitoring station that the alarm system was disarmed under threat.

Duress PIN

The Duress PIN function lets a cardholder who is being coerced into unlocking a door trigger a Duress PIN entered event without alerting the intruder, which ensures the cardholder's safety.

dynamic permit

In a system that uses the Pay-by-Plate Sync plugin, a dynamic permit holds a list of vehicles that is updated by a third-party permit provider. For example, in a system where vehicle owners pay for parking at a kiosk or using a mobile phone app, the list of vehicles are dynamically managed by a third-party permit provider.

dynamic user procedure

A dynamic user procedure (or dynamic SOP) is a standard operating procedure where the step sequence depends on the response provided by the operator at each step. The dynamic SOP is represented by a flowchart in Config Tool.
Also known as: dynamic SOP

"E" terms

edge recording

Edge recording is the process of recording and storing recorded videos on the peripheral device, thus removing the need for a centralized recording server or unit. With edge recording, you can store video directly on the camera’s internal storage device (SD card) or on a network attached storage volume (NAS volume).

eDiscovery

In Genetec Clearance™, eDiscovery is the process where electronic data is sought, secured, located, explored, and retrieved with the intention of using it as evidence in a civil or criminal case.

eDiscovery receipt

In Genetec Clearance™, an eDiscovery receipt is an audit-compliant digital proof of receipt report (in PDF format) for evidence being shared between two parties. For example, between the District Attorney's office and the Attorney of the defendant. The report includes evidence shared, how it was sent, and a list of items shared.

electric door strike

An electric door strike is an electric device that releases the door latch when current is applied.

elevator

An elevator is an entity that provides access control properties to elevators. For an elevator, each floor is considered an access point.

Elevator activities

The Elevator activities task is an investigation task that reports on elevator related activities, such as access denied, floor accessed, unit is offline, hardware tamper, and so on.

encryption certificate

An encryption certificate, also known as a digital certificate or public key certificate, is an electronic document that contains a public and private key pair used in Security Center for fusion stream encryption. Information encrypted with the public key can only be decrypted with the matching private key.

enforce

To enforce is to take action following a confirmed hit. For example, a parking officer can enforce a scofflaw violation (unpaid parking tickets) by placing a wheel boot on the vehicle.

Engage IP integration

In Allegion ENGAGE IP integration, Allegion Schlage LE, NDE, and Control locks (FE410 and BE467F) communicate with the Synergis™ unit through the ENGAGE Gateway over IP.

enrolled image

An enrolled image is a picture of a person's face that you add to their cardholder profile (in addition to the cardholder photo) for facial recognition purposes. The ability to add enrolled images to a cardholder profile is added with the Facial Recognition Framework plugin.

entity

Entities are the basic building blocks of Security Center. Everything that requires configuration is represented by an entity. An entity can represent a physical device, such as a camera or a door, or an abstract concept, such as an alarm, a schedule, a user, a role, a plugin, or an add-on.

entity tree

An entity tree is the graphical representation of Security Center entities in a tree structure, illustrating the hierarchical nature of their relationships.

Error (severity level)

The Error severity level indicates that the system event is critical. To have your system continue running smoothly and not incur the loss of information, immediate attention is required. System events and their corresponding severity levels appear on the Health monitoring page and in the health dashboard.

essential worker

An essential worker is an individual who does not need to be counted in the mustering list because they are part of the team ensuring everyone's safety. For example, a security guard, a mustering captain, or the driver of a truck retrieving people from around campus.

Evacuation Assistant

Evacuation Assistant helps you manage and monitor emergency evacuations to ensure the safety of individuals by tracking who has or has not reached their designated mustering points. Evacuation Assistant is integrated into Security Center through a plugin role. You can track evacuations in real time using the portal available through this role.

event

An event indicates the occurrence of an activity or incident, such as access denied to a cardholder or motion detected on a camera. Events are automatically logged in Security Center. Every event has an entity as its main focus, called the event source.

event-to-action

An event-to-action links an action to an event. For example, you can configure Security Center to trigger an alarm when a door is forced open.

Exchangeable Image File

Exchangeable Image File (EXIF) encodes additional information in an image file, such as when and where the image was taken. This additional information provides chain of custody information that can be can be used by internal or external authorities in the analysis of a case and in a court of law where admissible.

Exchangeable Image File (EXIF)

Acronym: EXIF

expansion server

An expansion server is any server machine in a Security Center system that does not host the Directory role. The purpose of the expansion server is to add to the processing power of the system.

extension

An extension refers to a group of manufacturer-specific settings found in the Extensions configuration page of a role, such as Archiver, Access Manager, or Intrusion Manager. Most extensions are built-in to Security Center, but some require the installation of an add-on; in those situations, the extension also refers to this add-on.

"F" terms

F2F protocol

The F2F protocol is a proprietary Casi Rusco reader protocol. F2F is a one-wire protocol, as opposed to two wires in the cases of Wiegand or OSDP.

Face Detection Activities

The Face Detection Activities task is an investigation task installed as part of the Facial Recognition Framework plugin. You can use it to investigate facial detection events that occur in third-party facial recognition systems that are integrated with Security Center.

Face Recognition Activities

The Face Recognition Activities task is an investigation task installed as part of the Facial Recognition Framework plugin. You can use it to investigate facial recognition events that occur in third-party facial recognition systems that are integrated with Security Center.

Facial Recognition Framework

The Facial Recognition Framework plugin integrates third-party facial recognition systems with Security Center so you can monitor and investigate facial recognition and face detection events in Security Desk.

failover

Failover is a backup operational mode in which a role (system function) is automatically transferred from its primary server to a secondary server that is on standby. This transfer between servers occurs only if the primary server becomes unavailable, either through failure or through scheduled downtime.

false positive read

False positive plate reads can occur when a license plate recognition system mistakes other objects in an image for license plates. For example, lettering on a vehicle or street signs can sometimes create false positive plate reads.

Federal Agency Smart Credential Number

A Federal Agency Smart Credential Number (FASC-N) is an identifier used in the Personal Identity Verification (PIV) credentials issued by US Federal Agencies. FASC-N credential bit lengths vary based on reader configuration; Security Center natively recognizes 75-bit and 200-bit formats.

Federal Agency Smart Credential Number (FASC-N)

Acronym: FASC-N

Federal Information Processing Standard

Federal Information Processing Standards (FIPS) are publicly announced standards developed by the United States federal government for use in computer systems by non-military government agencies and government contractors.

Federal Information Processing Standard (FIPS)

Acronym: FIPS

federated entity

A federated entity is any entity that is imported from an independent system through one of the Federation™ roles.

federated identity

A federated identity is a security token that is generated outside of your own realm that you accept. Federated identity enables single sign-on, allowing users to sign on to applications in different realms without needing to enter realm-specific credentials.

federated reads matching

Federated reads matching is a feature that allows the live matching of license plate reads from federated sites against hotlists available on the Federation™ host. This feature makes it unnecessary to share hotlists with federated sites to raise hits.

federated system

A federated system is a independent system (Omnicast™ or Security Center) that is unified under your local Security Center through a Federation™ role, so that the local users can view and control its entities as if they belong to their local system.

Federation™

The Federation™ feature joins multiple, independent Genetec™ IP security systems into a single virtual system. With this feature, users on the central Security Center system can view and control entities that belong to remote systems.

Federation™ host

The Federation™ host is the Security Center system that runs Federation™ roles. Users on the Federation™ host can view and control entities that belong to federated systems directly from their local system.

file

A file in Genetec Clearance™ is a piece of digital evidence, such as a video, media, or other type of file. Files are added to cases as reference material.

first-person-in rule

The first-person-in rule is the additional access restriction placed on a secured area that prevents anyone from entering the area until a supervisor is on site. The restriction can be enforced when there is free access (on door unlock schedules) and when there is controlled access (on access rules).

Fleet health monitoring

The Fleet health monitoring task is an operation task installed with the Security Center Fleet Monitoring plugin. Use this task to check your cameras and AVL units for faults and view details of any faults that have occurred.

Flowbird GO

The Flowbird GO plugin is an ALPR plugin. Using this plugin, you can automatically export license plate reads with related lane information to a Flowbird GO API from Security Center.

Forensic search

The Forensic search task is an investigation task that searches for video sequences based on video analytics events.

four-port RS-485 module

A four-port RS-485 module is a RS-485 communication component of Synergis™ Master Controller with four ports (or channels) named A, B, C, and D. The number of interface modules you can connect to each channel depends on the type of hardware you have.

free access

A free access is an access point state where no credentials are necessary to enter a secured area. The door is unlocked. This is typically used during normal business hours, as a temporary measure during maintenance, or when the access control system is first powered up and is yet to be configured.

free exit

A free exit is an access point state where no credentials are necessary to leave a secured area. The person releases the door by turning the doorknob, or by pressing the REX button, and walks out. An automatic door closer shuts the door so it can be locked after being opened.

fusion stream

Fusion stream is a proprietary data structure of Genetec Inc. for streaming multimedia. Each fusion stream is a bundle of data (video, audio, and metadata) streams and key streams related to a single camera. Fusion streams are generated on specific client requests. The key streams are included only if the data streams are encrypted.

fusion stream encryption

Fusion stream encryption is a proprietary technology of Genetec Inc. used to protect the privacy of your video archives. The Archiver uses a two-level encryption strategy to ensure that only authorized client machines or users with the proper certificates on smart cards can access your private data.

fuzzy matching

Environmental factors such as dirt or snow can partially obstruct license plate characters and increase the likelihood of partial plate reads occurring. In addition, similarly shaped letters and numbers, like “2” and “Z” or, “8”, “B”, and “0”, can also reduce plate read accuracy. Fuzzy matching lets AutoVu™ compare reads not only to exact matches in hotlists, but also to potential or probable matches.

"G" terms

G64

G64 is a Security Center format used by archiving roles (Archiver and Auxiliary Archiver) to store video sequences issued from a single camera. This data format supports audio, bookmarks, metadata overlays, timestamps, motion and event markers, and variable frame rate and resolution.

G64x

G64x is a Security Center format used to store video sequences from multiple cameras that are exported or backed up simultaneously. This data format supports audio, bookmarks, metadata overlays, timestamps, motion and event markers, variable frame rate and resolution, and watermarking.

General Availability

A General Availability (GA) release is a release that is available to all customers of Genetec Inc..

General Availability (GA)

Acronym: GA

Genetec Citigraf™

Genetec Citigraf™ is a decision support system (DSS) that assists public safety departments such as law enforcement, fire, and emergency management, to collaborate, plan for, identify, and respond to situations happening in the city. It unifies public safety operations through situational awareness and the proper dissemination of information. To learn more about Genetec Citigraf™, refer to the Genetec Resource Center.

Genetec Citigraf™ Auto

Genetec Citigraf™ Auto is an add-on module for Genetec Patroller™. It enhances the situational awareness of patrol vehicle operators by showing correlated events from various sources on their portable data terminal.

Genetec Citigraf™ Command

Genetec Citigraf™ Command is an add-on module for Security Center. It allows Security Desk operators to receive public safety alerts and make better decisions by correlating events from various data sources to the situation they are facing, and by showing their respective locations on the map.

Genetec Citigraf™ Insights

Genetec Citigraf™ Insights is the web application for analyzing and deriving intelligence from data correlated from different sources. Using Genetec Citigraf™ Insights, public safety analysts can gauge the effectiveness of city initiatives, and refine their prevention plans, response strategies, and resource management to better prepare for the future.

Genetec Citigraf™ Mobile

Genetec Citigraf™ Mobile is the mobile app designed to bring the intelligence derived from the correlation of various data sources to smartphone and tablet users.

Genetec Clearance™

Genetec Clearance™ is a digital evidence management system that you can use to help accelerate investigations by securely collecting, managing, and sharing evidence from different sources.

Genetec Clearance™ (plugin)

The Genetec Clearance™ plugin is used to export Security Center video recordings and snapshots to Genetec Clearance™. You can also create a registry of Security Center cameras in a Genetec Clearance™ account that you can use to automate exports when video requests are submitted.

Genetec Clearance™ (role)

The Genetec Clearance™ role manages video exports to a Genetec Clearance™ account. This role also handles communications between Security Center and the Genetec Clearance™ web application.

Genetec Clearance™ Capture

Genetec Clearance™ Capture is a Google Chrome extension that is used to capture evidence from websites and social media and upload the evidence directly to your Genetec Clearance™ account.

Genetec Clearance™ Seen

Genetec Clearance™ Seen is a mobile app that officers and security personnel can use to capture videos, images, and audio recordings from their phone, and upload evidence directly to their Genetec Clearance™ account. Evidence can quickly be added to cases and shared with investigators and other parties, all while maintaining its safety and security.

Genetec Clearance™ Uploader

Genetec Clearance™ Uploader is an application used to automatically upload media from body-worn cameras, sync folders, or other devices to Genetec Clearance™, or a Security Center video archive, depending on which .json config file is used.

Genetec Clearance™ Video Request

The Genetec Clearance™ Video Request plugin is a plugin that that you can use to create a registry of Security Center cameras in a Genetec Clearance™ account and to automate exports when video requests are submitted.

Genetec Clearance™ Video Request (role)

The Genetec Clearance™ Video Request role is a Security Center role that is used to select cameras and configure request approvers. The role imports a list of cameras from Security Center to create the registry in Genetec Clearance™.

Genetec ClearID™

Genetec ClearID™ is a self-service Physical Identity and Access Management (PIAM) solution for Synergis™.

Genetec ClearID™

The Genetec ClearID™ plugin integrates Genetec ClearID™ with Security Center and provides the communication connection between Synergis™ and Genetec ClearID™ cloud services. Any actions performed in Genetec ClearID™ are automatically synchronized with Synergis™.

Genetec ClearID™ API

The Genetec ClearID™ API is an Application Programming Interface that developers can use to help customers and partners integrate additional software or perform custom functions.

Genetec ClearID™ Self-Service Kiosk

Genetec ClearID™ Self-Service Kiosk is a mobile app that simplifies the management of visitors enrolled using the Genetec ClearID™ self-service portal. The self-service kiosk is intended for visitor centers or gated facilities where guests check-in by themselves.

Genetec Mission Control™

Genetec Mission Control™ is a collaborative decision management system that provides organizations with new levels of situational intelligence, visualization, and complete incident management capabilities. It allows security personnel to make the right decision when faced with routine tasks or unanticipated situations by ensuring a timely flow of information. To learn more about Genetec Mission Control™, refer to the Genetec™ resource center.

Genetec Mission Control™ Web API

The Genetec Mission Control™ Web API is a suite of development tools with which our partners and customers can enhance their collaborative decision management systems by integrating additional software and custom functionality.

Genetec™ Mobile

Official name of the map-based Security Center mobile application for Android and iOS devices.

Genetec Motoscan™

Designed to help increase parking enforcement efficiency in cities with narrow streets, Genetec Motoscan™ is a lightweight, low-power, yet fully-featured license plate recognition unit that is designed to be easily mounted on a smaller vehicle such as a scooter or small motorcycle.

Genetec Patroller™

Genetec Patroller™ is the software application installed on an in-vehicle computer that analyzes license plate reads from AutoVu™ Sharp camera units. The application can be installed to operate in different modes to suit your specific enforcement needs and can be configured to notify the vehicle operator if immediate action is required.

Genetec™ Protocol

Genetec™ Protocol is a standard protocol developed by Genetec Inc. that third-party video encoder and IP camera manufacturers can use to integrate their products to Security Center Omnicast™.

Genetec™ Server

Genetec™ Server is the Windows service that is at the core of Security Center architecture, and that must be installed on every computer that is part of the Security Center's pool of servers. Every such server is a generic computing resource capable of taking on any role (set of functions) you assign to it.

Genetec™ Update Service

The Genetec™ Update Service (GUS) is automatically installed with most Genetec™ products and enables you to update products when a new release becomes available.

Genetec™ Update Service (GUS)

Acronym: GUS

Genetec™ Video Player

Genetec™ Video Player is a media player that is used to view exported G64 and G64x video files from Security Desk, or on a computer that does not have Security Center installed.

geocoding

Geocoding is the process of finding associated geographic coordinates (latitude and longitude) from a street address.

Geographic Information System

Geographic Information System (GIS) is a system that captures spatial geographical data. Map Manager can connect to third-party vendors that provide GIS services in order to bring maps and all types of geographically referenced data to Security Center.

Geographic Information System (GIS)

Acronym: GIS

georeferencing

Georeferencing is the process of using an object’s geographic coordinates (latitude and longitude) to determine its position on a map.

GeoRSS

The GeoRSS plugin integrates RSS feeds in Security Center. Security Desk operators are notified of current events from external organizations, such as local police departments and emergency surveillance organizations. Feeds that include georeference coordinates are displayed on maps. If a camera is near the event, operators can also view live and recorded video.

GeoRSS events

The GeoRSS events task reports the custom events that were triggered by RSS feeds. This investigative report is only available in Security Desk when the GeoRSS plugin is installed.

ghost camera

A ghost camera is an entity used as a substitute camera. This entity is automatically created by the Archiver when video archives are detected for a camera whose definition has been deleted from the Directory, either accidentally or because the physical device no longer exists. Ghost cameras cannot be configured, and only exist so users can reference the video archive that would otherwise not be associated to any camera.

ghost patroller

A ghost patroller entity is automatically created by the ALPR Manager when the AutoVu™ license includes the XML Import module. In Security Center, all ALPR data must be associated to a Genetec Patroller™ entity or an ALPR unit corresponding to a fixed Sharp camera. When you import ALPR data from an external source through a specific ALPR Manager using the XML Import module, the system uses the ghost entity to represent the ALPR data source. You can formulate queries using the ghost entity as you would with a normal entity.

global antipassback

Global antipassback is a feature that extends the antipassback restrictions to areas controlled by multiple Synergis™ units.

Global Cardholder Synchronizer

The Global Cardholder Synchronizer role ensures the two-way synchronization of shared cardholders and their related entities between the local system (sharing guest) where it resides and the central system (sharing host).

Global Cardholder Synchronizer (GCS)

Acronym: GCS

Global Destination Entry Computer

A Global Destination Entry Computer (DEC), is a point of entry in the Otis CompassPlus™ Destination Management system that can manage the elevator dispatch settings of multiple elevator groups. Global DECs are located at elevator landings where cardholders can access different groups of elevators, such as a lobby. Global DECs send elevator dispatch requests to a Destination Entry Redirector (DER), which forwards the request to the correct elevator group.

global entity

A global entity is an entity that is shared across multiple independent Security Center systems by virtue of its membership to a global partition. Only cardholders, cardholder groups, credentials, and badge templates are eligible for sharing.

global partition

Global partition is a partition that is shared across multiple independent Security Center systems by the partition owner, called the sharing host.

grace period

You can add a grace period to a parking session for purposes of lenient enforcement. Following the expiration of the vehicle’s paid time or convenience time, the grace period gives extra time before a parking session is flagged as a Violation.

group

A group in Genetec Clearance™ is a number of users assembled together so that they can always have the same access policy to a case. Groups can be members of departments or be assigned to cases or files individually. If a group is a member of a department, each user within the group is automatically assigned to cases that are assigned to that department. Users can belong to multiple groups.

"H" terms

hard antipassback

Hard antipassback logs the passback event in the database and prevents the door from being unlocked due to the passback event.

hardening

Hardening is the process of enhancing hardware and software security. When hardening a system, basic and advanced security measures are put in place to achieve a more secure operating environment.

hardware integration package

A hardware integration package, or HIP, is an update that can be applied to Security Center. It enables the management of new functionalities (for example, new video unit types), without requiring an upgrade to the next Security Center release.

hardware integration package (HIP)

Acronym: HIP

Hardware inventory

The Hardware inventory task is a maintenance task that reports on the characteristics (unit model, firmware version, IP address, time zone, and so on) of access control, video, intrusion detection, and ALPR units in your system.

hardware zone

A hardware zone is a zone entity in which the I/O linking is executed by a single access control unit. A hardware zone works independently of the Access Manager, and consequently, cannot be armed or disarmed from Security Desk.

hash function

In cryptography, a hash function uses a mathematical algorithm to take input data and return a fixed-size alphanumeric string. A hash function is designed to be a one-way function, that is, a function which is infeasible to revert.

health dashboard

The health dashboard is a pane on the home page that provides a brief overview of the current health of your system. This dashboard shows a list of the five most recent system events that are active, and also indicates the number of system errors and warnings that are currently active.

Health history

The Health history task is a maintenance task that reports on health issues.

Health Monitor

The Health Monitor role monitors system entities such as servers, roles, units, and client applications for health issues.

Health statistics

The Health statistics task is a maintenance task that gives you an overall view of the health of your system by reporting on the availability of selected system entities such as roles, video units, and doors.

High availability

High availability is a design approach that enables a system to perform at a higher than normal operational level. This often involves failover and load balancing.

hit

A hit is a license plate read that matches a hit rule, such as a hotlist, overtime rule, permit, or permit restriction. A Genetec Patroller™ user can choose to reject or accept a hit. An accepted hit can subsequently be enforced.

hit rule

A hit rule is an ALPR rule used to identify vehicles of interest (called "hits") using license plate reads. The hit rules include the following types: hotlist, overtime rule, permit, and permit restriction.

hitlist

A hitlist entity represents a list of wanted people, where each person is identified through facial recognition analysis. Using the Facial Recognition Framework plugin, hitlists can be imported from third-party facial recognition systems or created in Security Center.

Hits

The Hits task is an investigation task that reports on hits reported within a selected time range and geographic area.

hot action

A hot action is an action mapped to a PC keyboard function key (Ctrl+F1 through Ctrl+F12) in Security Desk for quick access.

hotlist

A hotlist is a list of wanted vehicles, where each vehicle is identified by a license plate number, the issuing state, and the reason why the vehicle is wanted (stolen, wanted felon, Amber alert, VIP, and so on). Optional vehicle information might include the model, the color, and the vehicle identification number (VIN).

Hotlist and permit editor

The Hotlist and permit editor task is an operation task. You can use it to edit an existing hotlist or permit list. A new list cannot be created with this task, but after an existing list has been added to Security Center, you can edit, add, or delete items from the list, and the original text file is updated with the changes.

hotspot

A hotspot is a map object that represents an area on the map which requires special attention. Clicking on a hotspot displays associated fixed and PTZ cameras.

HUB MLPI Integration

With the AutoVu™ HUB MLPI Integration, you can export the latest MLPI data from Security Center to the HUB system.

"I" terms

identity

In Genetec ClearID™, an identity represents a person and defines what they can do across various platforms, security systems, business systems, and functions. Each identity has one or more access control badges (credentials) and is linked to a cardholder in Synergis™. ​For example, these credentials could be a Windows user (Active Directory), an employee (Human Resources and Payroll), a sales person (CRM and Quoting Tool), and a cardholder (Physical Security).

identity certificate

An identity certificate, also known as a digital certificate or public key certificate, is a digitally signed document that allows a computer or an organization to exchange information securely over a public network. The certificate includes information about the owner's identity, the public key used to encrypt future messages sent to the owner, and the digital signature of the certificate authority (CA).

identity provider

An identity provider is a trusted, external system that administers user accounts, and is responsible for providing user authentication and identity information to relying applications over a distributed network.

iFob

An iFob entity represents a physical cylinder that attaches permanently to a key, set of keys, or an asset. The iFob has an electronic chip that gives it a unique identity. It is inserted into a receptor in a cabinet until released by an authorized user.

illuminator

An illuminator is a light in the Sharp unit that illuminates the plate, thereby improving the accuracy of the images produced by the ALPR camera.

Import tool

The Import tool is the tool that you can use to import cardholders, cardholder groups, and credentials from a comma-separated values (CSV) file.

inactive entity

An inactive entity is an entity that is shaded in red in the entity browser. It signals that the real world entity it represents is either not working, offline, or incorrectly configured.

incident

An incident is an unexpected event reported by a Security Desk user. Incident reports can use formatted text and include events and entities as support material.

incident (Genetec Mission Control™)

A Genetec Mission Control™ incident is an undesirable or unusual situation that needs investigation and resolution, or a routine, scheduled task that requires monitoring.

incident category

An incident category is an entity that represents a grouping of incident types that have similar characteristics.

Incident configuration

The Incident configuration task is an administration task that you can use to configure the incident types, the incident categories, and the support documents for Genetec Mission Control™. You can also use this task to generate reports on the changes made to incident types.

Incident Manager

The Incident Manager is the central role that recognizes situational patterns, and triggers incidents in a Genetec Mission Control™ system. This role manages the automation workflows and keeps track of all user activities that are related to incidents.

Incident monitoring

The Incident monitoring task is an operation task that you can use to monitor and respond to incidents. From this task, you can see the incidents displayed on a map, thus improving your situational awareness.

incident owner

The incident owner is the incident recipient who took ownership of the incident. Only the incident owner can take actions to resolve the incident. An incident can only have one owner at a time.

incident recipient

An incident recipient is a user or user group that the incident has been dispatched to. Incident recipients can see the incident in the Incident monitoring task.

Incident report

The Incident report task is an investigation task that you can use to search, review, and analyze Genetec Mission Control™ incidents.

incident supervisor

An incident supervisor is a user who sees an incident in the Incident monitoring task because they supervise the incident recipients. Incident supervisors are not incident recipients themselves. A user cannot be both supervisor and recipient of the same incident.

incident trigger

An incident trigger is an event or a sequence of events that can trigger an incident. The Genetec Mission Control™ Rules Engine looks for specific combinations of events (type, time, correlation, and frequency) to determine whether to trigger an incident.

incident type

An incident type entity represents a situation that requires specific actions to resolve it. The incident type entity can also be used to automate the incident detection in Genetec Mission Control™ and to enforce the standard operating procedures that your security team must follow.

Incidents

The Incidents task is an investigation task that you can use to search, review, and modify incident reports created by Security Desk users.

Industrial Protocol Interface

The Industrial Protocol Interface plugin is a building automation and control plugin. Using this plugin, you can expose Security Center data to compatible client applications using protocols such as BACnet or SNMP.

integration

An integration in Genetec Clearance™ is an external device or application that is authorized to transfer data to the Genetec Clearance™ account.

integrator administrator

User level that is assigned by the Stratocast™ cloud administrator. The integrator administrator level has the most privileges. You can only have one integrator administrator per integrator account, but you can register the same username to multiple accounts.

integrator user

User level that is assigned by the integrator administrator. The integrator user has the same privileges as the integrator administrator, except for the ability to add other integrator users. You can have an unlimited number of integrator users per integrator account, and they can each be assigned unique usernames or the same username.

interface module

An interface module is a third-party security device that communicates with an access control unit over IP or RS-485, and provides additional input, output, and reader connections to the unit.

interlock

An interlock (also known as sally port or airlock) is an access restriction placed on a secured area that permits only one perimter door to be open at any given time.

interview room

An interview room entity represents a physical location used for interrogating suspects. It contains the configuration for the inputs (buttons, switches, and so on) and recording equipment deployed in that space.

intrusion detection

Intrusion detection designates one of the following: intrusion detection (hardware) or intrusion detection (analytics).

intrusion detection (analytics)

In KiwiVision™ video analytics, intrusion detection refers to the software technology that is used to automatically detect the intrusion of people, objects, or vehicles into protected or private areas when analyzing a video sequence.

intrusion detection (hardware)

In Security Center, intrusion detection refers to the detection of an intrusion into a secured area by an intrusion detection unit (hardware device).

Intrusion detection

The Intrusion detection task is an administration task that you can use to configure intrusion detection roles and units.

intrusion detection area

An intrusion detection area entity represents a zone (sometimes called an area) or a partition (group of sensors) on an intrusion panel.

Intrusion detection area activities

The Intrusion detection area activities task is an investigation task that reports on activities (master arm, perimeter arm, duress, input trouble, and so on) in selected intrusion detection areas.

intrusion detection unit

An intrusion detection unit entity represents an intrusion device (intrusion panel, control panel, receiver, and so on) that is monitored and controlled by the Intrusion Manager role.

Intrusion detection unit events

The Intrusion detection unit events task is an investigation task that reports on events (AC fail, battery fail, unit lost, input trouble, and so on) related to selected intrusion detection units.

Intrusion Manager

The Intrusion Manager role monitors and controls intrusion detection units. It listens to the events reported by the units, provides live reports to Security Center, and logs the events in a database for future reporting.

intrusion panel

An intrusion panel (also known as alarm panel or control panel) is a wall-mounted unit where the alarm sensors (motion sensors, smoke detectors, door sensors, and so on) and wiring of the intrusion alarms are connected and managed.
Also known as: alarm panel

intrusion panel area

An intrusion panel area is and entity that represents an area, zone, or partition (group of sensors) configured on the intrusion panel. These areas only report events and cannot be controlled (armed, disarmed) from Security Center. On a map, an intrusion panel area is represented by an icon.

intrusion panel input

An intrusion panel input entity represents a sensor (motion sensor, smoke detector, door sensor, and so on) configured on the intrusion panel. These inputs report events and can be added to a Security Center map as an icon.

Inventory management

The Inventory management task is an operation task that you can use to add and reconcile license plate reads to a parking facility inventory.

Inventory report

The Inventory report task is an investigation task that you can use to view a specific inventory (vehicle location, vehicle length of stay, and so on) or compare two inventories of a selected parking facility (vehicles added, vehicles removed, and so on).

I/O configuration

The I/O configuration task is a maintenance task that reports on the I/O configurations (controlled access points, doors, and elevators) of access control units.

I/O linking

I/O (input/output) linking is controlling an output relay based on the combined state (normal, active, or trouble) of a group of monitored inputs. A standard application is to sound a buzzer (through an output relay) when any window on the ground floor of a building is shattered (assuming that each window is monitored by a "glass break" sensor connected to an input).

I/O zone

An I/O zone is a zone entity in which the I/O linking can be spread across multiple Synergis™ units, while one unit acts as the master unit. All Synergis™ units involved in an I/O zone must be managed by the same Access Manager. The I/O zone works independently of the Access Manager, but ceases to function if the master unit is down. An I/O zone can be armed and disarmed from Security Desk as long as the master unit is online.

IP camera

An IP camera is a video encoder unit incorporating a camera.

IPv4

IPv4 is the first generation Internet protocol using a 32-bit address space.

IPv6

IPv6 is a 128-bit Internet protocol that uses eight groups of four hexadecimal digits for address space.

Item transactions

The Item transactions task is an investigation task in Security Desk. You can use it to investigate individual lines in a transaction that that took place in point-of-sale systems or at individual cash registers.

"K" terms

Kashef Third-Party Matcher

The AutoVu™ - Kashef Third Party Matcher plugin forwards license plate reads to the Kashef API and triggers alarms based on the vehicle legal status returned from Kashef.

key logger

A key logger is a software or hardware solution that logs keystrokes for monitoring purposes.

Key Programmer

The Genetec™ Medeco XT Key Programmer is a service that provides the communication channel between the plugin and the Medeco programming station. The service must run on the computer to which the programming station connects.

Keyhole Markup Language

Keyhole Markup Language (KML) is a file format used to display geographic data in an Earth browser such as Google Earth and Google Maps.

Keyhole Markup Language (KML)

Acronym: KML

KeyWatcher TrueTouch Server

The KeyWatcher TrueTouch Server connects to Morse Watchmans KeyWatcher via network connection. The server is the main interface for the client software and performs all synchronizations of transactions as well as maintaining the SQL database. Both access control systems and customized client control software interface with the server application.

KiwiVision™ Analyzer

The KiwiVision™ Analyzer role performs video analytics processing for assigned cameras.

KiwiVision™ Camera Integrity Monitor

KiwiVision™ Camera Integrity Monitor is a Security Center module that ensures cameras are operational at all times by performing regular checks of their video to detect whether the cameras have been tampered with.

KiwiVision™ intrusion detector

(Obsolete) The KiwiVision™ intrusion detector task is an investigation task in Security Desk that is used to generate software intrusion detection reports. Starting in KiwiVision™ video analytics 4.1 GA, this task is replaced by the Security video analytics task.

KiwiVision™ Manager

The KiwiVision™ Manager role manages and distributes the video analytics requests to the available KiwiVision™ Analyzer roles, stores the events generated by these Analyzer roles, and handles the report requests sent from Security Desk.

KiwiVision™ People Counter

The KiwiVision™ People Counter module is part of the KiwiVision™ video analytics plugin, and adds analytics capabilities for people counting to Security Center.

KiwiVision™ Privacy Protector™

KiwiVision™ Privacy Protector™ is a Security Center module that ensures the privacy of individuals recorded by video surveillance cameras while safeguarding potential evidence.

KiwiVision™ Security video analytics

The KiwiVision™ Security video analytics module is part of the KiwiVision™ video analytics plugin, and adds analytics capabilities for security monitoring to Security Center.

KiwiVision™ video analytics

The KiwiVision™ video analytics plugin adds automation to security monitoring and people counting tasks through the KiwiVision™ Security video analytics and KiwiVision™ People Counter modules.

known issues

Known issues are software issues that have been discovered in the current or previous release of a product, and have not yet been resolved.

"L" terms

Law Enforcement

Law Enforcement is a Genetec Patroller™ software installation that is configured for law enforcement: the matching of license plate reads against lists of wanted license plates (hotlists). The use of maps is optional.

layout

In Security Desk, a layout entity represents a snapshot of what is displayed in a Monitoring task. Only the tile pattern and the tile contents are saved, not the tile state.

license key

A license key is the software key used to unlock the Security Center software. The license key is specifically generated for each computer where the Directory role is installed. To obtain your license key, you need the System ID (which identifies your system) and the Validation key (which identifies your computer).

license plate inventory

A license plate inventory is a list of license plate numbers of vehicles found in a parking facility within a given time period, showing where each vehicle is parked (sector and row).

license plate read

A license plate read is a license plate number captured from a video image using ALPR technology.

limitations

Limitations are software or hardware issues that cannot be fixed for a product. For some limitations, workarounds are documented in the product release notes.

live event

A live event is an event that Security Center receives when the event occurs. Security Center processes live events in real-time. Live events are displayed in the event list in Security Desk and can be used to trigger event-to-actions.

live hit

A live hit is a hit matched by the Genetec Patroller™ and immediately sent to the Security Center over a wireless network.

live read

A live read is a license plate captured by the patrol vehicle and immediately sent to Security Center over a wireless network.

load balancing

Load balancing is the distribution of workload across multiple computers.

lockdown rule

The lockdown rule is a permanent access rule that denies access to all cardholders at all times, and can be used as an exception to rules that grant access.

logical ID

Logical ID is a unique ID assigned to each entity in the system for ease of reference. Logical IDs are only unique within a particular entity type.

Logons per Patroller

The Logons per Patroller task is an investigation task that reports on the logon records of a selected patrol vehicle.

long term

The long term regulation is a parking regulation characterizing an overtime rule. This regulation uses the same principle as the same position regulation, but the parking period starts on one calendar date and ends on another calendar date. No more than one overtime rule can use the long term regulation in the entire system.

Long-Term Support

The Long-Term Support (LTS) release track offers customers an upgrade path that minimizes changes to software and extends access to critical bug and security fixes. The LTS track includes major and patch versions. Minor versions are excluded. Choosing the LTS track limits your access to new capabilities, but increases stability due to less frequent code change and extends the maintenance period by two years.

Long-Term Support (LTS)

Acronym: LTS

LPM protocol

The License Plate Management (LPM) protocol provides a Sharp camera with a secure and reliable connection to Security Center. When The LPM protocol is enabled on a Sharp camera, the protocol manages the camera’s connection to the ALPR Manager role.

"M" terms

macro

A macro is an entity that encapsulates a C# program that adds custom functionalities to Security Center.

main server

The main server is the only server in a Security Center system hosting the Directory role. All other servers on the system must connect to the main server to be part of the same system. In a high availability configuration where multiple servers host the Directory role, it is the only server that can write to the Directory database.

major version

A major version is a software version that adds new features, behavioral changes, SDK capabilities, support for new devices, and performance improvements. Using backward compatibility mode, major versions are compatible with up to three previous major versions. A license update is required to upgrade to a new major version. A major version is indicated by a version number with zeros at the third and fourth positions: X.Y.0.0. For more information, see our Product Lifecycle page on GTAP.

man-in-the-middle

In computer security, man-in-the-middle (MITM) is a form of attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

man-in-the-middle (MITM)

Acronym: MITM

manual capture

Manual capture is when license plate information is entered into the system by the user and not by the ALPR.

map

A map in Security Center is a two-dimensional diagram that helps you visualize the physical locations of your security equipment in a geographical area or a building space.

Map designer

The Map designer task is an administration task that you can use to create and edit maps that represent the physical locations of your equipment to Security Desk users.

map link

Map Manager

The Map Manager is the central role that manages all mapping resources in Security Center, including imported map files, external map providers, and KML objects. It acts as the map server for all client applications that require maps and as the record provider for all Security Center entities placed on georeferenced maps.

map mode

Map mode is a Security Desk canvas operating mode that replaces tiles and controls with a geographical map showing all active, georeferenced events in your system. Switching to Map mode is a feature that comes with AutoVu™, Genetec Mission Control™, or Record fusion, and requires a license for one of these major features.

map object

Map objects are graphical representations on your maps of Security Center entities or geographical features, such as cities, highways, rivers, and so on. With map objects, you can interact with your system without leaving your map.

map preset

A map preset is a saved map view. Every map has at least one preset, called the default view, that is displayed when a user opens the map.

map view

A map view is a defined section of a map.

Maps

The Maps task is an operation task that heightens your situational awareness by providing the context of a map to your security monitoring and control activities.

master arm

Master arm is arming an intrusion detection area in such a way that all sensors attributed to the area would set the alarm off if one of them is triggered.
Also known as: Away arming

master key stream

In fusion stream encryption, the master key stream is the sequence of symmetric keys generated by the Archiver to encrypt one data stream. The symmetric keys are randomly generated and change every minute. For security reasons, the master key stream is never transmitted or stored anywhere as plaintext.

max occupancy

The max occupancy feature monitors the number of people in an area, up to a configured limit. Once the limit is reached, the rule will either deny access to additional cardholders (if set to Hard) or trigger events while allowing further access (Soft) .

maximum session time

Setting a maximum session time helps to improve parking lot occupancy statistics. When a vehicle exceeds the maximum session time, it is assumed that the vehicle's plate was not read at the exit and the vehicle is no longer in the parking zone. The parking session appears in reports generated from the Parking sessions task with the State reason: Maximum session time exceeded.

Medeco XT

The Medeco XT plugin imports your Medeco XT Intelligent keys, cylinders, and programming stations into Security Center so that you can manage access rules and investigate access events.

Media Gateway

The Media Gateway role is used by Genetec™ Mobile and Web Client to get transcoded video from Security Center. The Media Gateway role supports the Real Time Streaming Protocol (RTSP), which external applications can use to request raw video streams from Security Center.

Media Router

The Media Router is the central role that handles all stream requests (audio and video) in Security Center. It establishes streaming sessions between the stream source, such as a camera or an Archiver, and its requesters (client applications). Routing decisions are based on the location (IP address) and the transmission capabilities of all parties involved (source, destinations, networks, and servers).

minor version

A minor version is a software version that adds new features, SDK capabilities, support for new devices, bug fixes, and security fixes. Different system components can run at different minor versions, provided they share the same major version. No license update is required to upgrade to a new minor version. A minor version is indicated by a version number with a zero at the fourth position: X.Y.Z.0. For more information, see our Product Lifecycle page on GTAP.

missing file

A missing file is a video file that is still referenced by an archive database, but cannot be accessed anymore. This situation occurs when video files are deleted manually without using the Archive storage details task, creating a mismatch between the number of video files referenced in the database and the actual number of video files stored on disk.

mobile authentication key

A string of user-defined characters that is used to authenticate a user's identity for mobile applications. When connecting to the Stratocast™ mobile apps from a mobile device, users must enter a valid mobile authentication key.

mobile credential

A mobile credential is a credential on a smartphone that uses Bluetooth or Near Field Communication (NFC) technology to access secured areas.

Mobile Credential Manager

The Mobile Credential Manager role links Security Center to your third-party mobile credential provider so that you can view your subscription status, and manage your mobile credentials and profiles in Config Tool.

mobile credential profile

A mobile credential profile links a part number from your mobile credential provider to your subscription so that you can create mobile credentials in Security Center.

Mobile Data Computer

Mobile Data Computer is a tablet computer or ruggedized laptop used in patrol vehicles to run the Genetec Patroller™ application. The MDC is typically equipped with a touch-screen with a minimum resolution of 800 x 600 pixels and wireless networking capability.

Mobile Data Computer (MDC)

Acronym: MDC

Mobile License Plate Inventory

Mobile License Plate Inventory (MLPI) is the Genetec Patroller™ software installation that is configured for collecting license plates and other vehicle information for creating and maintaining a license plate inventory for a large parking area or parking garage.

Mobile License Plate Inventory (MLPI)

Acronym: MLPI

Mobile Server

The Mobile Server role provides Security Center access on mobile devices.

Mobile Server Extension

Mobile Server Extension is a server component of Security Center Mobile that provides access to Security Center Mobile for new mobile apps such as the Security Center Threat Level app.

Modbus

Modbus is a communication protocol used by electronic devices to transmit data to a computer for building automation and control. Using the Modbus plugin, you can turn Security Center into a Modbus client application.

monitor group

A monitor group is an entity used to designate analog monitors for alarm display. Besides the monitor groups, the only other way to display alarms in real time is to use the Alarm monitoring task in Security Desk.

monitor ID

Monitor ID is an ID used to uniquely identify a workstation screen controlled by Security Desk.

Monitoring

The Monitoring task is an operation task that you can use to monitor and respond to real-time events that relate to selected entities. Using the Monitoring task, you can also monitor and respond to alarms.

Morpho Biometrics

The Morpho Biometrics plugin is a third-party Security Center plugin that integrates IDEMIA MorphoManager biometrics devices into Security Center. Using this plugin, you can manage cardholder access using biometric devices.

Morse Watchmans KeyWatcher Touch

The Morse Watchmans KeyWatcher Touch plugin integrates KeyWatcher sites, lockers and keys into Security Center.

motion detection

Motion detection is the feature that watches for changes in a series of video images. The definition of what constitutes motion in a video can be based on highly sophisticated criteria.

Motion search

The Motion search task is an investigation task that searches for motion detected in specific areas of a camera's field of view.

motion zone

A motion zone is a user defined areas within a video image where motion should be detected.

Move unit

Move unit tool is used to move units from one manager role to another. The move preserves all unit configurations and data. After the move, the new manager immediately takes on the command and control function of the unit, while the old manager continues to manage the unit data collected before the move.

multi-factor authentication

Multi-factor authentication (MFA) is a security system that requires more than one method of authentication from independent categories of credentials to verify the user’s identity for a login or other transaction.

Multi-Factor Authentication (MFA)

Acronym: MFA

multi-tenant parking

If you use AutoVu™ Free-Flow to manage transient parking and contract permit parking in parking zones, you can install the AutoVu™ Free-Flow plugin to manage parking lots where parking spots are leased to tenants.

mustering area

A mustering area is an area in Security Center that represents where individuals must gather during emergency evacuations.

mustering captain

A mustering captain is the person responsible for ensuring everyone in a given area is safely evacuated and gathered to a designated mustering area during an emergency evacuation. For example, there could be a mustering captain assigned to each floor of a building.

mustering operation

A mustering operation consists of moving a cardholder to a mustering area, either manually from the Mustering task, or by presenting a credential to the associated USB reader.

mustering point

A mustering point refers to the reader that evacuees must badge onto to confirm their safety during an emergency evacuation.

Mustering (task)

The Mustering task is used to generate a list of people who have physically reached their emergency mustering areas.

"N" terms

Navigator box

The Navigator box is a proprietary in-vehicle device of Genetec Inc. that provides GPS coordinates and odometer readings to Genetec Patroller™. Because it taps into the vehicle’s odometry signal, it is more accurate than a standard GPS device. The Navigator box can be used with any type of AutoVu™ mobile deployment that requires positioning information, but it is required for City Parking Enforcement with Wheel Imaging.

network

The network entity is used to capture the characteristics of the networks used by your system so that proper stream routing decisions can be made.

network address translation

Network address translation is the process of modifying network address information in datagram (IP) packet headers while in transit across a traffic routing device, for the purpose of remapping one IP address space into another.

network attached storage

A network attached storage (NAS) is an edge recording storage device that has a dedicated network address and IP address, and provides file storing and sharing capabilities to other devices on the same network. With a NAS, you can expand the hard disk space of your local network and securely store more recordings from more cameras.

network attached storage (NAS)

Acronym: NAS

NAS volume

A NAS (network attached storage) volume is a formatted section on the hard disk of a NAS, which represents a logical storage device that is independent from the other volumes on the same NAS. You can store video recordings from a single camera to a designated NAS volume on your NAS device.

network security appliance

A network security appliance is a computer that comes preinstalled with the operating system and Genetec™ Security Center. These turnkey appliances are available in different form-factors to support anywhere from 16 to 100 IP devices. You can use a network security appliance to quickly deploy a unified or standalone video surveillance and access control system, or a mix of both.

network view

The network view is a browser view that illustrates your network environment by showing each server under the network they belong to.

Network view

The Network view task is an administration task that you can use to configure your networks and servers.

new wanted

A new wanted is a manually entered hotlist item in Genetec Patroller™. When you are looking for a plate that does not appear in the hotlists loaded in the Genetec Patroller™, you can enter the plate in order to raise a hit if the plate is captured.

notification tray

The notification tray contains icons that allow quick access to certain system features, and also displays indicators for system events and status information. The notification tray display settings are saved as part of your user profile and apply to both Security Desk and Config Tool.

"O" terms

OCR equivalence

OCR equivalence is the interpretation of OCR (Optical Character Recognition) equivalent characters performed during license plate recognition. OCR equivalent characters are visually similar, depending on the plate’s font. For example, the letter “O” and the number “0”, or the number “5” and the letter “S”. There are several pre-defined OCR equivalent characters for different languages.

odometry sensor

To track and display a patrol vehicle's position accurately on a map, you can provide an odometry signal to the SharpZ3 system by installing an odometry sensor on the drive shaft of the vehicle.

officer

An officer, or wearable camera user, is an entity that identifies a person who holds a body-worn camera license and uploads video evidence to Genetec Clearance™ or a Security Center video archive. Officers are automatically added when a camera is connected to the Genetec Clearance™ Uploader, but can also be added and modified manually.

offline event

An offline event is an event that occurs while the event source is offline. Security Center only receives the offline events when the event source is back online.

offloading

Offloading is the process of transferring data and video data from a vehicle system to a central system.

Omnicast™

Security Center Omnicast™ is the IP video management system (VMS) that provides organizations of all sizes the ability to deploy a surveillance system adapted to their needs. Supporting a wide range of IP cameras, it addresses the growing demand for HD video and analytics, all the while protecting individual privacy.

Omnicast™ compatibility pack

Omnicast™ compatibility pack is the software component that you need to install to make Security Center compatible with an Omnicast™ 4.x system.

Omnicast™ Federation™

The Omnicast™ Federation™ role connects an Omnicast™ 4.x system to Security Center. That way, the Omnicast™ entities and events can be used in your Security Center system.

orphan file

An orphan file is a video file that is no longer referenced by any archive database. Orphan files remain on the disk until they are manually deleted. This situation occurs when the archive database is changed inadvertently, creating a mismatch between the number of video files referenced in the database and the actual number of video files stored on disk.

Otis Compass

The Otis Compass plugin integrates the Otis CompassPlus™ Destination Management system into Security Center. Using this plugin, you can manage and monitor your elevators and cardholders in Security Center.

Otis Compass activities

The Otis Compass activities task is an investigation task that reports on the entities and events related to the Otis CompassPlus™ Destination Management system.

output behavior

An output behavior is an entity that defines a custom output signal format, such as a pulse with a delay and duration.

overtime rule

An overtime rule is an entity that defines a parking time limit and the maximum number of violations enforceable within a single day. Overtime rules are used in city and university parking enforcement. For university parking, an overtime rule also defines the parking area where these restrictions apply.

Owner Authentication Key

An Owner Authentication Key (OAK) is a security key that is used to ensure that only the owner or authorized user(s) of a device are able to register the device with a service.

Owner Authentication Key (OAK)

Acronym: OAK

"P" terms

paid time

The paid time stage of a parking session begins when the convenience time expires. Vehicle owners can purchase parking time through a pay station or mobile app, and the payment system can be provided by integrated third-party parking permit providers.

parking facility

A parking facility entity defines a large parking area as a number of sectors and rows for the purpose of inventory tracking.

parking lot

A parking lot is a polygon that defines the location and shape of a parking area on a map. By defining the number of parking spaces inside the parking lot, Security Center can calculate its percentage of occupancy during a given time period.

parking rule

A parking rule defines how and when a parking session is either considered to be valid or in violation.

parking session

The AutoVu™ Free-Flow feature in Security Center uses parking sessions to track each vehicle's stay in a parking zone. A parking session is divided into four states: Valid (including convenience time, paid time, and grace period), Violation, Enforced, and Completed.

parking session states

A vehicle's parking session is divided into four states: Valid (including convenience time, paid time, and grace period), Violation, Enforced, and Completed. When a vehicle parks in a parking zone, its parking session progresses through the parking session states based on the timing that is configured for the parking rule, the validity of the paid time, and whether the vehicle's parking session incurs a violation.

Parking sessions

The Parking sessions task is an investigation task that you can use to generate a list of vehicles that are currently in violation. You can create a vehicle inventory report for the current parking zone occupancy or for a specific time in the past based on the selected time filter.

parking zone

The parking zones that you define in Security Center represent off-street parking lots where the entrances and exits are monitored by Sharp cameras.

Parking zone activities

The Parking zone activities task is an investigation task that you can use to track the parking zone-related events that occur between the time the vehicle's plate is read at the entrance and at the exit of the parking zone.

parking zone capacity

The parking zone capacity is the maximum number of vehicles that can be parked in a parking zone.

parking zone capacity threshold

The parking zone capacity threshold setting determines at what point a capacity threshold reached event is generated. For example, if you lower the threshold to 90%, the system generates an event when the parking zone reaches 90% capacity.

parser

A parser receives, standardizes, and formats data from a point-of-sale system, so it can be pushed to Security Center.

partition

A partition is an entity in Security Center that defines a set of entities that are only visible to a specific group of users. For example, a partition could include all areas, doors, cameras, and zones in one building.

patch version

A patch version is a software version that adds support for new devices, bug fixes, and security fixes. Patch versions do not affect system compatibility, as long as all your system components are at the same major version. If you are on the Long-Term Support (LTS) track, patch versions only include critical bug and security fixes. A patch version is indicated by a version number where the fourth position is not a zero. For more information, see our Product Lifecycle page on GTAP.

patrol vehicle

A patrol vehicle monitors parking lots and city streets for parking violations or wanted vehicles. A patrol vehicle includes one or more Sharp automatic license plate recognition (ALPR) cameras and an in-vehicle computer running Genetec Patroller™ software.

Patroller Config Tool

Genetec Patroller™ Config Tool is the Genetec Patroller™ administrative application used to configure Patroller-specific settings, such as adding Sharp cameras to the in-vehicle LAN, enabling features such as Manual Capture or New Wanted, and specifying that a username and password are needed to log on to Genetec Patroller™.

patroller entity

A patroller entity in Security Center represents a patrol vehicle equipped with an in-vehicle computer running Genetec Patroller™ software.

Patroller tracking

The Patroller tracking task is an investigation task that you can use to replay the route followed by a patrol vehicle on a given date on a map, or view the current location of patrol vehicles on a map.

People counting

The People counting task is an operation task that keeps count in real-time of the number of cardholders in all secured areas of your system.

people counting (analytics)

In KiwiVision™ video analytics, people counting refers to the software technology that is used to detect the number of people in an area, and entering or exiting an area.

perimeter arm

Perimeter arm is arming an intrusion detection area in such a way that only sensors attributed to the area perimeter set the alarm off if triggered. Other sensors, such as motion sensors inside the area, are ignored.

permission level

The permission level of a user or group in Genetec Clearance™ determines which actions users can perform on a case or file. Manage, Edit, View and download, or View only permission levels can be assigned to cases or files individually, or assigned to departments.

permit

A permit is an entity that defines a single parking permit holder list. Each permit holder is characterized by a category (permit zone), a license plate number, a license issuing state, and optionally, a permit validity range (effective date and expiry date). Permits are used in both city and university parking enforcement.

permit hit

A permit hit is a hit that is generated when a read (license plate number) does not match any entry in a permit or when it matches an invalid permit.

permit restriction

A permit restriction is an entity that applies time restrictions to a series of parking permits for a given parking area. Permit restrictions can be used by patrol vehicles configured for University Parking Enforcement and for systems that use the AutoVu™ Free-Flow feature.

Personal Identity Verification

Personal Identity Verification (PIV) is a credential specified by the US government's Federal Information Processing Standard Publication 201 (FIPS 201), which specifies cryptographic key sizes, algorithms, biometrics, and best practices in physical access control.

Personal Identity Verification (PIV)

Acronym: PIV

Personal Identity Verification-Interpoerable

Personal Identity Verification-Interoperable (PIV-I) is a credential specified by the US government's Federal Information Processing Standard Publication 201 (FIPS 201), which is mainly issued by US non-federal entities, but might be used for either federal or non-federal installations.

Personal Identity Verification-Interoperable (PIV-I)

Acronym: PIV-I

plaintext

In cryptography, plaintext is the data that is not encrypted.

Plan Manager

(Obsolete) Plan Manager is a module of Security Center that provides interactive mapping functionality to better visualize your security environment. The Plan Manager module has been replaced by the Security Center role, Map Manager, since version 5.4 GA.

Plate link

Plate Reader

Plate Reader is the software component of the Sharp unit that processes the images captured by the ALPR camera to produce license plate reads, and associates each license plate read with a context image captured by the context camera. The Plate Reader also handles the communications with the Genetec Patroller™ and the ALPR Manager. If an external wheel imaging camera is connected to the Sharp unit, the Plate Reader also captures wheel images from this camera.

plugin

A plugin (in lowercase) is a software component that adds a specific feature to an existing program. Depending on the context, plugin can refer either to the software component itself or to the software package used to install the software component.

Plugin

Plugin (with an uppercase, in singular) is the role template that serves to create specific plugin roles.

plugin role

A plugin role adds optional features to Security Center. A plugin role is created by using the Plugin role template. By default, it is represented by an orange puzzle piece in the Roles view of the System task. Before you can create a plugin role, the software package specific to that role must be installed on your system.

Plugins

The Plugins task is an administration task that you can use to configure plugin-specific roles and related entities.

Point of sale

Point of sale (POS) is a system that typically refers to the hardware and software used for checkouts - the equivalent of an electronic cash register. These systems are used to capture detailed transactions, authorize payments, track inventory, audit sales, and manage employees. Point of sale systems are used in supermarkets, restaurants, hotels, stadiums, casinos, retail establishments.

Point of sale (POS)

Acronym: POS

Post-Payment

The AutoVu™ Post-Payment plugin validates the parking session against the parking lot rules and the payment provider database, and then sends an evidence package to ticketing system if an infraction is detected.

primary server

The primary server is the default server chosen to perform a specific function (or role) in the system. To increase the system's fault-tolerance, the primary server can be protected by a secondary server on standby. When the primary server becomes unavailable, the secondary server automatically takes over.

primitive rule

A primitive rule is a method used by Synergis™ Softwire to generate an action when a trigger event occurs, even when the Synergis™ unit is offline.

privacy protection

In Security Center, privacy protection is software that anonymizes or masks parts of a video stream where movement is detected. The identity of individuals or moving objects is protected, without obscuring movements and actions or preventing monitoring.

Privacy Protector™

The Privacy Protector™ role requests original video streams from Archiver roles and applies data anonymization to the original video streams. The privacy-protected (anonymized) video stream is then sent back to the Archiver role for recording.

private IP address

A private IP address is an IP address chosen from a range of addresses that are only valid for use on a LAN. The ranges for a private IP address are: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.16.255.255, and 192.168.0.0 to 192.168.255.255. Routers on the Internet are normally configured to discard any traffic using private IP addresses.

private key

In cryptography, a private or secret key is either an encryption or decryption key known only to one of the parties that exchange secret messages.

private task

A private task is a saved task that is only visible to the user who created it.

privilege

Privileges define what users can do, such as arming zones, blocking cameras, and unlocking doors, over the part of the system they have access rights to.

Privilege troubleshooter

The Privilege troubleshooter is a tool that helps you investigate the allocation of user privileges in your Security Center system. With this tool, you can discover:
  • Who has permission to work with a selected entity
  • What privileges are granted to selected users or groups
  • Who has been granted a privilege, has access to a specific entity, or both

profile

A profile in Genetec Mission Control™ is an incident filter used to distribute active incidents among the operators who are currently logged on to the system. Profiles filter incidents by type and by occurrence location.

programming station

A programming station is a USB device that connects to a computer and that charges and programs electronic keys. In Security Center this device is represented by the Programming station entity.

protection ending period

The protection ending period is a setting in Security Center that is applied automatically to video when a user manually removes the video's protection. During this 24-hour period, the video continues to be protected from deletion.

provisioning rule

In Genetec ClearID™, a provisioning rule is a logic-based criterion used to grant or revoke access by adding identities to or removing identities from a specific role or area.​

proxSafe Asset Inventory Report

The proxSafe Asset Inventory Report task is an operation task in Security Desk. You can use this task to view a list of all deister proxSafe assets that are part of your system, and view information about an asset, such as an asset's associated locker, whether the asset is currently in the locker, or when the asset is scheduled to be returned.

proxSafe Asset Management

The proxSafe Asset Management task is an operation task in Config Tool. You can use this task to manage deister proxSafe assets and asset groups.

proxSafe Asset Release

The proxSafe Asset Release task is an operation task in Security Desk. You can use this task to manually release deister proxSafe assets to cardholders.

proxSafe Event Report

The proxSafe Event Report report is an investigation task in Security Desk. You use it to investigate events that occurred at deister proxSafe lockers.

proxy authentication

Proxy authentication is the process of validating user credentials for access to a proxy server. This authentication typically includes a username and can also include a password.

proxy server

A proxy server is a server that verifies and forwards incoming client requests to other servers for further communication. For example, when a client is unable to meet the security authentication requirements of the server but should be permitted access to some services.

public key

In cryptography, a public key is a value provided by some designated authority as an encryption key that, combined with a private key that is generated at the same time, can be used to effectively encrypt messages and verify digital signatures.

public key encryption

Public key encryption, also known as asymmetric encryption, is a type of encryption where two different keys are used to encrypt and decrypt information. The private key is a key that is known only to its owner, while the public key can be made known and available to other entities on the network. What is encrypted with one key can only be decrypted with the other key.

public key infrastructure

A public key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to support the distribution and identification of public encryption keys. This enables users and computers to both securely exchange data over networks such as the Internet and verify the identity of the other party.

public key infrastructure (PKI)

Acronym: PKI

public task

A public task is a saved task that can be shared and reused among multiple Security Center users.

push notification

A push notification is the delivery of information or a message from a software application to a mobile device, without a specific request from the client.

"R" terms

RabbitMQ

RabbitMQ is a message broker software that transmits data from external devices and systems to Security Center. The following Genetec™ software install and use RabbitMQ: Genetec Mission Control™, Sipelia™, Restricted Security Area Surveillance, and Modbus.

read fusing

For patrol vehicles that are configured with forward-facing and rear-facing cameras, you can fuse reads from multiple cameras to improve the capture rate and read rate. When read fusing is activated and two Sharp cameras read one or both of the vehicle's plates, only the best plate read from the two fused cameras is kept. The other plate read is discarded.

read rate

The read rate measures the speed at which a license plate recognition system can correctly detect and read all of the characters in an image of a license plate.

reader

A reader is a sensor that reads the credential for an access control system. For example, this can be a card reader, or a biometrics scanner.

Reads

The Reads task is an investigation task that reports on license plate reads performed within a selected time range and geographic area.

Reads/hits per day

The Reads/hits per day task is an investigation task that reports on license plate reads performed within a selected time range and geographic area.

Reads/hits per zone

The Reads/hits per zone task is an investigation task that reports on the number of reads and hits per parking area for a selected date range.

realm

In identity terms, a realm is the set of applications, URLs, domains, or sites for which a token is valid. Typically a realm is defined using an Internet domain such as genetec.com, or a path within that domain, such as genetec.com/support/GTAC. A realm is sometimes described as a security domain because it encompasses all applications within a specified security boundary.

Receiver

The Receiver extension integrates alarm receivers into Security Center so that operators can monitor alarms forwarded by the alarm receivers from connected intrusion panels.

Receiver activities

The Receiver activities task is an investigation task that reports on the events sent by alarm receivers and connected intrusion panels. There is a receiver activities report for each manufacturer supported by the Receiver extension.

receiver unit

A receiver unit is an entity in the area view that contains the intrusion panels connected to an alarm receiver.

record cache

The record cache is the database where the Record Caching Service role keeps copies of records ingested from external data sources in Security Center. You can generate reports on the cached records using the Records investigation task.

Record Caching Service

The Record Caching Service role is used for data ingestion. Using this role, you can import records from external data sources into Security Center. You can share the ingested data across the entire unified platform to enhance awareness and response, to provide contextual information on dynamic maps, or to visualize in operational dashboards.

Record Fusion Service

The Record Fusion Service is the central role that provides a unified querying mechanism for data records that come from a wide variety of sources, such as Security Center modules or third-party applications. All record requests go through this role, which then queries their respective record providers.

record provider

A record provider is either a Security Center role or an SDK application that connects a data source to the Record Fusion Service role.

record type

In Security Center, a record type defines the data format and display properties of a set of records that you can share across the entire system through the Record Fusion Service role.

recording mode

Recording mode is the criteria by which the Archiver schedules the recording of video streams. There are four possible recording modes:
  • Off (no recording allowed)
  • Manual (record only on user requests)
  • Continuous (always record)
  • On motion/manual (record according to motion detection settings or on user request)

recording state

Recording state is the current recording status of a given camera. There are four possible recording states: Enabled, Disabled, Currently recording (unlocked), and Currently recording (locked).

Records

The Records task in an investigation task that you can use to query the record providers registered in Security Center and find relevant information based on known or suspected correlations.

redaction

Redaction in Genetec Clearance™ is the act of obscuring faces or other sensitive information from uploaded video files.

redirector

A redirector is a server assigned to host a redirector agent created by the Media Router role.

redirector agent

A redirector agent is an agent created by the Media Router role to redirect data streams from one IP endpoint to another.

redundant archiving

Redundant archiving is an option to enhance the availability of video archives during failover and to protect against data loss. If you enable this option, all servers assigned to an Archiver role archive video at the same time.

registry

The registry is a Genetec Clearance™ module that simplifies the video request process and improves collaboration between organizations and investigators. The registry can include a list of surveillance cameras to allow authorized users to rapidly identify and request video from camera sources of interest.

regular expression

A regular expression is a sequence of symbols used by a regular expression engine to identify all the strings of characters that match a specific search pattern without having to list all the possible discrete values that must be returned. The Microsoft's .NET Framework Regular Expression engine is the engine used in Sipelia™.

relative time

In Genetec Clearance™, relative time refers to the duration of the video recording with no reference to when the recording started. For example, a 5 minute recording would be shown as 0:00 - 05:00.

Remote

The Remote task is an operation task that you can use to remotely monitor and control other Security Desk applications in your system that are running the Monitoring task or the Alarm monitoring task.

Remote configuration

The Remote configuration task is an administration task that you can use to configure federated Security Center entities without logging off from your local Config Tool.

Remote Site Archiver

The Remote Site Archiver is an Archiver role dedicated to managing federated cameras. The Remote Site Archiver requires the Federation™ role to be active to enroll federated cameras. After the cameras are enrolled, the Remote Site Archiver continues to operate even when the Federation™ host is no longer connected to the federated systems.

rendering rate

Rendering rate is the comparison of how fast the workstation renders a video with the speed the workstation receives that video from the network.

Report Manager

The Report Manager role automates report emailing and printing based on schedules.

report pane

The report pane is one of the panes found in the Security Desk workspace. It displays query results or real-time events in a tabular form.

requester

In Genetec Clearance™, a requester is a user who can request video from camera sources of interest. This includes requesting video from a public or privately owned camera defined in the Genetec Clearance™ registry.

request to exit

Request to exit (REX) is a door release button normally located on the inside of a secured area that when pressed, allows a person to exit the secured area without having to show any credential. This can also be the signal from a motion detector. It is also the signal received by the controller for a request to exit.

request to exit (REX)

Acronym: REX

Restricted Security Area Surveillance

The Restricted Security Area Surveillance (RSA) plugin integrates tracking systems into Security Center. A tracking system might use radars, lasers, heat sensors, and cameras to detect activity in restricted areas and on the perimeter of a property.

Restricted Security Area Surveillance (RSA Surveillance)

Acronym: RSA

RSA Surveillance

restricted camera

Restricted cameras are cameras that Genetec Inc. has identified as cybersecurity risks.

retention policy

A retention policy in Genetec Clearance™ defines the retention periods for cases and files in the recycle bin, or automatic deletion periods for files.

reverse geocoding

Reverse geocoding is an AutoVu™ feature that translates a pair of latitude and longitude into a readable street address.

reverse tunnel

A reverse tunnel is a private communication channel open between a server inside a secured LAN and a client outside. In the Security Center implementation, certificate authentication is used to protect against man-in-the-middle attacks.

Reverse Tunnel

The Reverse Tunnel role is used on the federated system to connect to the Federation™ host residing in the cloud. The connection is established using a keyfile generated from the cloud system. The keyfile can only be used once to ensure maximum security.

Reverse Tunnel Server

The Reverse Tunnel Server role is used on the Federation™ host to manage reverse tunnels. Reverse tunnels are created using this role, but must be opened from the federated sites using the Reverse Tunnel roles.

reverse tunneling

Reverse tunneling is a technique used on servers protected behind a firewall to avoid having to open inbound ports to receive requests from clients found on the other side of the firewall. Instead of having the client contact the server, the communication is reversed. The client generates a keyfile that includes an identity certificate about itself that the server uses to contact the client, hence, eliminating the need to open any inbound port on the server.

ring group

A ring group is a group of SIP entities that has its own unique SIP phone extension. All entities (or members) within a ring group are part of a call list, and all members get called when the ring group extension is called. The members of a ring group can either be called all at the same time, or successively at a set interval. The call stops ringing when any one of the members within a call list answers the call.

role

A role is a software component that performs a specific job within Security Center. To execute a role, you must assign one or more servers to host it.

role

In Genetec ClearID™, a role is a group of people who are assigned the same access. A person can be assigned multiple roles. Roles are linked to cardholder groups in Synergis™.​ A role manager controls who is granted access to the group.

role manager

In Genetec ClearID™, a role manager is an identity that has authority over who is assigned to a role. A role manager can add people to and remove people from a role. They are also responsible for role access review approvals.

role owner

In Genetec ClearID™, a role owner is responsible for assigning role managers and configuring role-based policies.

roles and units view

The roles and units view is a browser view that lists the roles on your system with the units they control as child entities.

route

A route is a setting that configures the transmission capabilities between two end points in a network for the purpose of routing media streams.

RSA coverage zone

An RSA coverage zone is an RSA zone that cannot be disarmed. When targets are detected in a coverage zone, all the same events are generated in the Monitoring task, but no event notification bubbles are displayed on the map. Only the outline of the coverage zone is represented on the map.

RSA perimeter

An RSA perimeter is a logical representation of a physical barrier, such as a fence or border of a property, displayed as a line on georeferenced map in Security Center.

RSA target

An RSA target represents an intruder in a restricted area on a map. When an intruder is detected entering the area, a map object is created in the RSA zone that represents the restricted area, and is shown on the map until the target is acknowledged.

RSA zone

An RSA zone defines the boundaries of a restricted area. In Security Center, an RSA zone is shown as a colored shape or outline on a map. The color indicates if the zone is armed, disarmed, or in alert. When a tracking system reports an intrusion, the RSA Surveillance plugin generates an event if the intrusion occurs in an armed RSA zone.

Rules Engine

The Rules Engine is the component of the Genetec Mission Control™ system that analyzes and correlates the events collected by Security Center, based on predefined rules. The Rules Engine uses these events to detect and trigger incidents in the Genetec Mission Control™ system.

"S" terms

salt (cryptography)

In cryptography, a salt is data that is used as an additional input to the information you want to encrypt or protect with a hash function, so that the original information is nearly impossible to guess, even when the attacker knows what algorithm is being used.

SALTO Virtual Network

The SALTO Virtual Network plugin integrates SALTO Virtual Network access control systems into Security Center so that users can provide and monitor access to SALTO doors, SALTO lockers, areas, and events in Security Desk.

SAM card

A secure access module (SAM) card is a physical smart card that increases key management security by moving the cryptography off the access control appliance and onto the card itself. A SAM card is inserted into a slot on an expansion module-equipped Synergis™ Cloud Link.

secure access module (SAM) card

same position

The same position regulation is a type of parking regulation characterizing an overtime rule. A vehicle is in violation if it is seen parked at the exact same spot over a specified period of time. Genetec Patroller™ must be equipped with GPS capability to enforce this type of regulation.

SC-200 v1

The SC-200 v1 is a Streamconnect appliance for port mirroring. The SC-200 v1 is capable of generating up to 200 video streams on the Security Center LAN.

schedule

A schedule is and entity that defines a set of time constraints that can be applied to a multitude of situations in the system. Each time constraint is defined by a date coverage (daily, weekly, ordinal, or specific) and a time coverage (all day, fixed range, daytime, and nighttime).

scheduled task

A scheduled task is an entity that defines an action that executes automatically on a specific date and time, or according to a recurring schedule.

Schindler PORT Elevator

The Schindler PORT Elevator plugin integrates the Schindler PORT Technology destination dispatch system into Security Center. Using this plugin, you can manage and monitor your elevator systems and cardholders in Security Center.

SDK certificate

An SDK certificate is what an SDK application (or plugin) needs to connect to Security Center. The certificate must be included in the Security Center license key for the SDK application to work.

SDS Guardian

The SDS Guardian plugin is a shooter detection plugin. With this plugin installed on an expansion server and client workstations, you can create the SDS Guardian role and use it to integrate Guardian gunshot detection sensors into Security Center.

secondary server

A secondary server is any alternate server on standby intended to replace the primary server in the case the latter becomes unavailable.
Also known as: standby server

Secure Socket Layer

The Secure Sockets Layer (SSL) is a computer networking protocol that manages server authentication, client authentication and encrypted communication between servers and clients.

Secure Socket Layer (SSL)

Acronym: SSL

secured area

A secured area is an area entity that represents a physical location where access is controlled. A secured area consists of perimeter doors (doors used to enter and exit the area) and access restrictions (rules governing the access to the area).

Security Center

Security Center is a truly unified platform that blends IP video surveillance, access control, automatic license plate recognition, intrusion detection, and communications within one intuitive and modular solution. By taking advantage of a unified approach to security, your organization becomes more efficient, makes better decisions, and responds to situations and threats with greater confidence.

Security Center Federation™

The Security Center Federation™ role connects a remote independent Security Center system to your local Security Center system. That way, the remote system's entities and events can be used in your local system.

Security Center Fleet Monitoring

The Security Center Fleet Monitoring plugin detects events from vehicles running the Security Center Vehicle Monitoring plugin. With the Security Center Fleet Monitoring plugin installed, you can track vehicle locations, detect vehicles as they enter or exit areas of interest, and offload from vehicles travel routes and video recordings.

Security Center Interview Room

The Interview Room application helps to manage audio and video recordings of police interrogations in Security Center.

Security Center SaaS edition

The Security Center SaaS edition is Security Center offered by subscription. Subscription-based ownership simplifies the transition to cloud services and provides an alternative way to purchase, deploy, and maintain the Genetec™ Security Center unified platform.

Security Center Threat Level app

Security Center Threat Level app is a mobile application that is used to remotely trigger threat levels and change the state and operations in Security Center.

Security Center Vehicle Monitoring

The Security Center Vehicle Monitoring plugin integrates global positioning system (GPS), accelerometer, and general-purpose input and output (GPIO) sensors onboard vehicles into Security Center as automatic vehicle locator (AVL) entities. You can use this plugin to integrate an LCD screen to monitor the status of the system and cameras within the vehicle.

security clearance

A security clearance is a numerical value used to further restrict the access to an area when a threat level is in effect. Cardholders can only enter an area if their security clearance is equal or higher than the minimum security clearance set on the area.

Security Desk

Security Desk is the unified user interface of Security Center. It provides consistent operator flow across all of the Security Center main systems, Omnicast™, Synergis™, and AutoVu™. The unique task-based design of Security Desk lets operators efficiently control and monitor multiple security and public safety applications.

Security Patrol System CheckPoint

The Security Patrol System (SPS) CheckPoint plugin is a perimeter protection plugin. Using this plugin, you can create guard tours and personnel sweeps that have a set or sequence of checkpoints that must be triggered to complete the tour. The plugin generates events when the guard tour criteria are not met. Checkpoints can be any Security Center event, such as access granted, PIN entered, license plate reads, motion detected, and more.

Security Patrol System (SPS) CheckPoint

security profile

In the Otis Compass plugin, a security profile defines the operation modes of a Destination Entry Computer (DEC), and which floors and door sides can be accessed, based on schedules. Security profiles are assigned to DECs. By default, the Default security profile is assigned to all DECs that are part of the Otis CompassPlus™ Destination Management system.

security token

An on-the-wire representation of claims that is cryptographically signed by the issuer of the claims, providing strong proof to any relying party as to the integrity of the claims and the identity of the issuer.

security token service

Security token service (STS) is a claims provider implemented as a web service that issues security tokens. Active Directory Federation Services (ADFS) is an example of a security token service. Also known as an issuer.

security token service (STS)

Acronym: STS

Security video analytics

The Security video analytics task is an investigation task that reports on video analytics events that are triggered based on analytics scenarios.

self-signed certificate

A self-signed certificate is an identity certificate that is signed by the same entity whose identity it certifies.

server

In Security Center, a server entity represents a computer on which the Genetec™ Server service is installed.

Server Admin

Server Admin is the web application running on every server machine in Security Center that you use to configure the Genetec™ Server settings. You use this same application to configure the Directory role on the main server.

server mode

The server mode is a special online operation mode restricted to Synergis™ units, in which the unit allows the Access Manager (the server) to make all access control decisions. The unit must stay connected to the Access Manager at all times to operate in this mode.

Service Release

A Service Release (SR) is a standalone release that includes minor functionality improvements, bug fixes, and the integration of new hardware, intrusion devices, and plugins.

Service Release (SR)

Acronym: SR

services

Services are external devices or applications that have been authorized to transfer data to the Genetec Clearance™ account.

Session Initiation Protocol

The Session Initiation Protocol (SIP) is a signalling standard that is used to control the exchange of data between two or more parties in multimedia communications. Sipelia™, the Security Center core module that allows users to make, receive, and manage voice and video calls over the web, is based on the SIP standard.

Session Initiation Protocol (SIP)

Acronym: SIP

sharing guest

A sharing guest is a Security Center system that has been given the rights to view and modify entities owned by another Security Center system, called the sharing host. Sharing is done by placing the entities in a global partition.

sharing host

A sharing host is a Security Center system that gives the right to other Security Center systems to view and modify its entities by putting them up for sharing in a global partition.

Sharp Portal

Sharp Portal is a web-based administration tool used to configure Sharp cameras for AutoVu™ systems. From a web browser, you log on to a specific IP address (or the Sharp name in certain cases) that corresponds to the Sharp you want to configure. When you log on, you can configure options such as selecting the ALPR context (for example, Alabama, Oregon, Quebec), selecting the read strategy (for example, fast moving or slow moving vehicles), viewing the Sharp’s live video feed, and more.

Sharp unit

The Sharp unit is a proprietary ALPR unit of Genetec Inc. that integrates license plate capturing and processing components, as well as digital video processing functions, inside a ruggedized casing.

SharpOS

SharpOS is the software component of a Sharp unit. SharpOS is responsible for everything related to plate capture, collection, processing, and analytics. For example, a SharpOS update can include new ALPR contexts, new firmware, Sharp Portal updates, and updates to the Sharp's Windows services (Plate Reader, HAL, and so on).

SharpV

SharpV is a Sharp unit that is specialized for fixed installations and is ideally suited for a range of applications, from managing off-street parking lots and facilities to covering major city access points to detect wanted vehicles. SharpV combines two high-definition cameras (1.2MP) with onboard processing and illumination in a ruggedized, environmentally sealed unit. Both lenses are varifocal for ease of installation and the camera is powered via PoE+.

SharpX

SharpX is the camera component of the SharpX system. The SharpX camera unit integrates a pulsed LED illuminator that works in total darkness (0 lux), a monochrome ALPR camera (1024 x 946 @ 30 fps), and a color context camera (640 x 480 @ 30 fps). The ALPR data captured by the SharpX camera unit is processed by a separate hardware component called the AutoVu™ ALPR Processing Unit.

SharpZ3

SharpZ3 is a proprietary mobile ALPR system designed by Genetec Inc. that integrates license plate cameras and a trunk unit that is responsible for ALPR processing as well as communication with the Genetec Patroller™ software running on the in-vehicle computer.

SharpZ3 expansion module

Up to three expansion modules can be added to the SharpZ3 base unit. The modules add additional functionality to the base system. For example, you can add modules for precise navigation, PoE ports for wheel imaging cameras, and so on.

SharpZ3 ALPR module

ALPR modules are available for the SharpZ3 trunk unit which can support either two or four SharpZ3 cameras.

SharpZ3 base unit

The SharpZ3 base unit is the processing component of the SharpZ3 system. The base unit includes the ALPR module and up to three expansion modules that are used to add features to the system such as precise navigation, PoE ports for wheel imaging cameras, and so on.

ShotSpotter Gunshot Detection

The Genetec™ ShotSpotter Gunshot Detection plugin integrates alerts sent by SST ShotSpotter service into Security Center to help police officers and security guards monitor and quickly respond to gunshots that occur in the area.

simple text placeholder

Simple text placeholders are placeholders that can be replaced with any content and added to messages.

simple user procedure

A simple user procedure (or simple SOP) is an ordered list of steps that do not involve multiple-choice questions. Operators might be allowed to resolve the incident without validating all the steps, or to complete the steps out of sequence, depending on the configuration.
Also known as: simple SOP

single sign-on

Single sign-on (SSO) is the use of a single user authentication for multiple IT systems or even organizations.

single sign-on (SSO)

Acronym: SSO

SIP client

A SIP client is a program with softphone functionality that users can install on their computers or mobile devices to make and receive voice or video calls from other SIP clients. A SIP client requires a SIP account, and typically includes a user interface from which users can manage calls and also view call-related video streams, if such a feature is supported. Examples of SIP clients are SIP phones, softphones, and SIP intercoms. Once Sipelia™ Client is installed and configured, Security Desk is also an example of a SIP client.
Also known as: softphone

SIP endpoint

A SIP endpoint is the device or system that is at each end of a SIP call session. Examples of endpoints are hard-wired phones, voice mail systems, and intercoms. A SIP client such as a softphone, is another example of an endpoint. Once Sipelia™ Client is installed and configured, Security Desk is considered both an endpoint and a SIP client.
Also known as: user agent

SIP entity

A SIP entity is a Security Center entity that has SIP-related capabilities. In Security Center, examples of SIP entities are users, ring groups, and SIP devices such as SIP intercoms.

SIP extension

A SIP extension is a numeric value assigned to a SIP device so that the device can make and receive SIP calls. Typically, a SIP extension is also used to register the SIP device (to which it is assigned) to a SIP server. To be able to communicate with other SIP endpoints, every SIP entity (user, ring group, or intercom) in Security Center must have a unique SIP extension assigned to it.

SIP intercom

A SIP intercom is an intelligent SIP endpoint that provides two-way phone connectivity in a SIP environment. In Security Center, a SIP intercom is one of the established SIP entities, and it is the only SIP entity that is an actual device. The other SIP entities are Security Center users and ring groups.

SIP trunk

A SIP trunk is a SIP server that allows users to connect their existing SIP servers to other servers, thus extending their VoIP capabilities and allowing them to migrate their old PBX systems to a unified VoIP system. With an integrated dial plan, SIP trunks make it possible for SIP extensions that reside on different SIP servers to communicate with one another.

Sipelia™

Sipelia™ is a core module of Security Center. Using this module, Security Center users can make, receive, and manage SIP-based voice and video calls over a network. Running on the open source Session Initiation Protocol (SIP), Sipelia™ also integrates existing video and access control platforms with intercom systems, and allows users to log call activities.

Sipelia™ Client

Sipelia™ Client is the softphone component of Sipelia™. As a result, it installs the various user interface features of the Sipelia™ module, such as the call dialog box and conversation window. Sipelia™ Client must be installed on every Security Desk workstation that is running Sipelia™ software, thus turning Security Desk into a SIP client (or softphone).

Sipelia™ Server

Sipelia™ Server is the SIP server component of Sipelia™. It receives and administers information about the different SIP endpoints, and essentially facilitates the communication between two or more endpoints that are communicating in a SIP environment. Sipelia™ Server also collates and stores important data, such as contact list information, SIP server settings, and call session recordings. Sipelia™ Server must be run by a Security Center plugin role, and therefore, must be installed on every Security Center server on which you intend to host the plugin role.

site

A site is a virtual branch of a Stratocast™ account (client or integrator), which represents an actual geographical location. By creating two Stratocast™ accounts and registering the same usernames to both accounts, you create two sites that can be accessed by each of those usernames.

site

In Genetec ClearID™, a site is a logical entity. Sites include one or more areas. Each site and area can have a different owner.

site owner

In Genetec ClearID™, a site owner is an identity that has authority over areas associated with a specific site. The site owner can assign or modify area owners and can configure specific area settings that are exclusive to site owners. They are also responsible for site access reviews.

SNMP Manager

The SNMP Manager plugin collects and organizes information about your Simple Network Management Protocol (SNMP) devices. This information can then be accessed in Security Center.

SNMP traps

SNMP traps are event messages sent by the SNMP device to the SNMP Manager.

Software Development Kit

The Software Development Kit (SDK) is what end-users use to develop custom applications or custom application extensions for Security Center.

Software Development Kit (SDK)

Acronym: SDK

standalone mode

Standalone mode is an operation mode where the interface module makes autonomous decisions based on the access control settings previously downloaded from the Synergis™ unit. When the module is online, activity reporting occurs live. When the module is offline, activity reporting occurs on schedule, or when the connection to the unit is available. Not all interface modules can operate in standalone mode.

standard operating procedure

A standard operating procedure (SOP) or user procedure is a series of steps that the operator must follow before changing an incident state to Resolved. Each step can range from a simple task, such as Call 911, to a complex task that requires support documents to accomplish. All actions taken by the operator are logged by the system in the incident history for audit purposes.

standard operating procedure (SOP)

Acronym: SOP

Also known as: user procedure

standard schedule

A standard schedule is a schedule entity that can be used in all situations. Its only limitation is that it does not support daytime or nighttime coverage.

static permit

In a system that uses the Pay-by-Plate Sync plugin, a static permit holds a list of vehicle license plates that is not updated by a third-party permit provider. For example, a list of employee vehicles that are authorized to park in the lot are manually maintained as a static list.

Stratocast™

Stratocast™ is a cloud-based video monitoring system that makes the adoption of network video security solutions easy. With Stratocast™, you can connect to your business wherever you go. Using the Microsoft Windows Azure cloud-computing platform, Stratocast™ eliminates the need for on-site servers. As a result, installation time is reduced and you can begin monitoring your premises quickly.

Stratocast™ account

A Stratocast™ account is a collection of user-related and geographical information for a given company in a given location, and the arrangement with which that company can use the services offered by Stratocast™. There are two types of accounts: integrator accounts and client accounts.

Stratocast™ mobile apps

Stratocast™ mobile apps are the mobile version of Stratocast™ that you can use to connect to your system remotely over WiFi or cellular networks. With the Stratocast™ mobile apps, you can monitor your premises directly from your mobile devices.

Streamconnect appliance

Streamconnect is a cross-organization video collaboration appliance. With a Streamconnect appliance, an organization with Security Center can tap into the video management network of another organization and receive the video packets from selected cameras on their system without compromising the network security of either organization.

Streamconnect firmware

The Streamconnect firmware is the video discovery and transmission software and the operating system that run on the Streamconnect appliance. The Streamconnect firmware includes Streamconnect Portal.

Streamconnect Portal

Streamconnect Portal is the web-based administration interface used to configure and administer the Streamconnect appliance.

strict antipassback

A strict antipassback is an antipassback option. When enabled, a passback event is generated when a cardholder attempts to leave an area that they were never granted access to. When disabled, Security Center only generates passback events for cardholders entering an area that they never exited.

subscription

In Genetec ClearID™, a subscription is a renewable license that assigns a set of privileges to a Genetec ClearID™ account for a defined period. It includes logging on to the portal, configuring several Security Center workstations and users, and using a set of features, as defined by the subscription license.

supervised mode

Supervised mode is an online operation mode of the interface module where the interface module makes decisions based on the access control settings previously downloaded from the Synergis™ unit. The interface module reports its activities in real time to the unit, and allows the unit to override a decision if it contradicts the current settings in the unit. Not all interface modules can operate in supervised mode.

supported by design

Used to define a product (specific hardware model, software version, or a combination of both) that has not been tested by our lab technicians, but that we believe would work with a specific software release of a given Genetec™ product, because it shares similar characteristics (for example, firmware version) with a certified product.

SV-100E

The SV-100E is a subcompact all-in-one appliance that comes with Microsoft Windows, Security Center, and the SV Control Panel pre-installed. The SV-100E is for small-scale, single server installations, and can support both cameras and access control readers.

SV-300E

The SV-300E is a compact, all-in-one turnkey appliance that comes with Microsoft Windows, Security Center, and the SV Control Panel preinstalled. With built-in analog encoder capture cards, you can use the appliance to quickly deploy a standalone video surveillance or access control system, or a unified system.

SV-1000E

The SV-1000E is a cost-effective rackmount security appliance designed for mid-sized security systems. It helps you move to a unified security system combining video surveillance, access control, automatic license plate recognition, communications, intrusion and analytics in a single appliance. The SV-1000E comes with Security Center, and the SV Control Panel pre-installed.

SV-2000E

The SV-2000E is a rackmount security appliance that lets you easily deploy a unified system combining video surveillance, access control, automatic license plate recognition and communications. The SV-2000E comes with Security Center, and the SV Control Panel pre-installed.

SV-4000E

The SV-4000E is a rackmount security appliance that delivers enterprise-grade performance and reliability. Its certified hardware configurations and out-of-the-box hardening against cyber threats simplifies the design and deployment of a new security system. The SV-4000E comes with Security Center, and the SV Control Panel pre-installed.

SV-7000E

The SV-7000E is a rackmount security appliance designed for applications combining a large number of high resolution cameras, users and events. The SV-7000E comes with Security Center, and the SV Control Panel pre-installed.

SV appliance

A Streamvault™ is a turnkey appliance that comes with an embedded operating system and Security Center pre-installed. You can use Streamvault™ appliances to quickly deploy a unified or standalone video surveillance and access control system.

SV Control Panel

SV Control Panel is a user interface application that you can use to configure your SV appliance to work with Security Center access control and video surveillance.

SVA-100E

The SVA-100E is a compact appliance you can use to easily enhance your security system with KiwiVision™ video analytics. The design is optimized for you to apply more analytics streams to your video surveillance system, whether that is a single or multiple analytic stream, per camera.

SVW-300E

The SVW-300E workstation is a turnkey solution designed for monitoring small and medium-sized security systems with support for multiple displays. The SVW-300E comes with Security Center pre-installed.

SVW-500E

The SVW-500E workstation is a high-performance solution designed for users who need the ability to view cameras with a very high-resolution on 4K monitors and video walls. The SVW-500E comes with Security Center pre-installed.

symmetric encryption

Symmetric encryption is a type of encryption where the same key is used for both encryption and decryption.

synchronous video

A synchronous video is a simultaneous live video or playback video from more than one camera that are synchronized in time.

Synergis™

Security Center Synergis™ is the IP access control system (ACS) that heightens your organization’s physical security and increases your readiness to respond to threats. Synergis™ supports an ever-growing portfolio of third-party door control hardware and electronic locks. Using Synergis™, you can leverage your existing investment in network and security equipment.

Synergis™ appliance

A Synergis™ appliance is an IP-ready security appliance manufactured by Genetec Inc. that is dedicated to access control functions. All Synergis™ appliances come pre-installed with Synergis™ Softwire and are enrolled as access control units in Security Center.

Synergis™ Appliance Portal

Synergis™ Appliance Portal is the web-based administration tool used to configure and administer the Synergis™ appliance and upgrade its firmware.

Synergis™ Cloud Link

Synergis™ Cloud Link clustering

Synergis™ Cloud Link clustering is a feature designed for large systems to optimize the way that cardholder synchronization is handled between Access Manager roles and Synergis™ Cloud Link units. When the feature is enabled, only active cardholders managed by the same Access Manager, based on access rules, are synchronized to the Synergis™ Cloud Link.

Synergis™ IX

Synergis™ IX (pronounced "eye-ex") is a family of hybrid controllers and downstream modules used to manage both access control points and intrusion points. The Synergis™ IX product line is only available to the Australian and New Zealand markets.

Synergis™ IX Portal

Synergis™ IX Portal is the web-based administration tool that you use to configure and administer the Synergis™ IX controller and upgrade its firmware.

Synergis™ key store

The Synergis™ key store is a database that holds transparent reader keys, ReaderKc and ReaderKs keys for STid readers, and the SAM LockUnlock key for Synergis™ units with the optional expansion module. Keys in the database cannot be viewed or read, but can be verified using key hashes.

Synergis™ Master Controller

Synergis™ Master Controller (SMC) is an access control appliance of Genetec Inc. that supports various third-party interface modules over IP and RS-485. SMC is seamlessly integrated with Security Center and can make access control decisions independently of the Access Manager.

Synergis™ Master Controller (SMC)

Acronym: SMC

Synergis™ Softwire

Synergis™ Softwire is the access control software developed by Genetec Inc. to run on various IP-ready security appliances. Synergis™ Softwire lets these appliances communicate with third-party interface modules. A security appliance running Synergis™ Softwire is enrolled as an access control unit in Security Center.

Synergis™ unit

A Synergis™ unit is a Synergis™ appliance that is enrolled as an access control unit in Security Center.

System

The System task is an administration task that you can use to configure roles, macros, schedules, and other system entities and settings.

System Availability Monitor

With System Availability Monitor (SAM) running, you can collect health information and view the health status of your Security Center systems to prevent and proactively resolve technical issues.

System Availability Monitor (SAM)

Acronym: SAM

System Availability Monitor Agent

The System Availability Monitor Agent (SAMA) is the component of SAM that is installed on every Security Center main server. SAMA collects health information from Security Center and sends health information to the Health Monitoring Services in the cloud.

System Availability Monitor Agent (SAMA)

Acronym: SAMA

system event

A system event is a predefined event that indicates the occurrence of an activity or incident. System events are defined by the system and cannot be renamed or deleted.

System for Cross-Domain Identity Management

In Genetec Clearance™, the System for Cross-domain Identity Management (SCIM) protocol is used to synchronize users and groups from an identity management system into cloud-based products.

System for Cross-Domain Identity Management (SCIM)

Acronym: SCIM

System status

The System status task is a maintenance task that you can use to monitor the status of all entities of a given type in real time and to interact with them.

"T" terms

TagTracker

The TagTracker plugin integrates bar code scanners into Security Center so that users can monitor assets in Security Desk and generate reports that can include associated video feeds.

Tag activities

The Tag activities task is an investigation task in Security Desk. You can use it to review and analyze the movements of tagged items through an inventory or shipping system. The reports can be filtered by full code, partial code, or by time stamp, and can include video feeds.

tailgating

Tailgating designates one of the following: tailgating (access control) or tailgating (analytics).

tailgating (access control)

Tailgating is the act of entering a secured area without presenting a credential, by following behind another person who has presented their credential.

tailgating (analytics)

In KiwiVision™ video analytics, tailgating occurs when a person enters an area behind another person within a defined time frame.

task

A task is the central concept on which the entire Security Center user interface is built. Each task corresponds to one aspect of your work as a security professional. For example, use a monitoring task to monitor system events in real-time, use an investigation task to discover suspicious activity patterns, or use an administration task to configure your system. All tasks can be customized and multiple tasks can be carried out simultaneously.

task cycling

A task cycling is a Security Desk feature that automatically cycles through all tasks in the active task list following a fixed dwell time.

task workspace

A task workspace is an area in the Security Center client application window reserved for the current task. The workspace is typically divided into the following panes: canvas, report pane, controls, and area view.

taskbar

A taskbar is a user interface element of the Security Center client application window, composed of the Home tab and the active task list. The taskbar can be configured to be displayed on any edge of the application window.

temporary access rule

A temporary access rule is an access rule that has an activation and an expiration time. Temporary access rules are suited for situations where permanent cardholders need to have temporary or seasonal access to restricted areas. These access rules are automatically deleted seven days after they expire to avoid cluttering the system.

test message

Test messages are maintenance tools used to simplify the maintenance process so that sign repair teams do not need to configure messages themselves.

third-party authentication

Third-party authentication uses a trusted, external identity provider to validate user credentials before granting access to one or more IT systems. The authentication process returns identifying information, such as a username and group membership, that is used to authorize or deny the requested access.

threat level

Threat level is an emergency handling procedure that a Security Desk operator can enact on one area or the entire system to deal promptly with a potentially dangerous situation, such as a fire or a shooting.

tile

A tile is an individual window within the canvas, used to display a single entity. The entity displayed is typically the video from a camera, a map, or anything of a graphical nature. The look and feel of the tile depends on the displayed entity.

tile ID

The tile ID is the number displayed at the upper left corner of the tile. This number uniquely identifies each tile within the canvas.

tile mode

Tile mode is the main Security Desk canvas operating mode that presents information in separate tiles.

tile pattern

The tile pattern is the arrangement of tiles within the canvas.

tile plugin

A tile plugin is a software component that runs inside a Security Desk tile. By default, it is represented by a green puzzle piece in the area view.

Time and attendance

The Time and attendance task is an investigation task that reports on who has been inside a selected area and the total duration of their stay within a given time range.

Time To Response or Time To Resolution

Time To Response or Time To Resolution (collectively TTR) are metrics used in Genetec Mission Control™ that refer to how long it takes to respond to incidents, and resolve incidents and dynamic standard operating procedure steps.

Time To Response or Time To Resolution (TTR)

Acronym: TTR

timed antipassback

Timed antipassback is an antipassback option. When Security Center considers a cardholder to be already in an area, a passback event is generated when the cardholder attempts to access the same area again during the time delay defined by Presence timeout. When the time delay has expired, the cardholder can once again pass into the area without generating a passback event.

timeline

A timeline is a graphic illustration of a video sequence, showing where in time, motion and bookmarks are found. Thumbnails can also be added to the timeline to help the user select the segment of interest.

tour

A tour is a collection of checkpoints along a defined route that security guards (cardholders) must reach; usually within a specified time. The guard's progress is recorded by Security Center and can be monitored by staff in the central office from the Tour monitoring task in Security Desk.

Tour audit trails

The Tour audit trails task is the Security Patrol System (SPS) CheckPoint task that you use to investigate which users created, updated, and deleted tours and checkpoints, and when.

Tour history

The Tour history task is the Security Patrol System (SPS) CheckPoint task that you use to investigate when tours were completed, canceled, late, and on time; and what manual actions were performed, by whom, and when.

Tour monitoring

The Tour monitoring task is the Security Patrol System (SPS) CheckPoint task that you use to monitor in real-time the progress of guard tours and personnel sweeps.

Tour statistics

The Tour statistics task is the Security Patrol System (SPS) CheckPoint task that you use to investigate how often tours and checkpoints were completed on time, early or late.

tracking system

A tracking system is a device or a system of devices that tracks the speed and direction of objects moving through its field of view. Devices include radars, lasers, motion detection sensors, cameras that have video analytics, and thermal sensors.

Traka Asset Management

The Traka Asset Management plugin integrates Traka users, cabinets, and iFobs into Security Center.

Traka cabinet

A Traka cabinet entity represents a physical Traka cabinet, which holds the iFobs and associated keys or assets.

Traka monitoring

The Traka monitoring task is an operation task in Security Desk that shows the current content of the Traka cabinets, and lists past activity. You can use this task to see when an asset is in its cabinet, when it is out, and who last had the asset.

Traka report

The Traka report task is an investigation task in Security Desk. You can use it to investigate Traka user activities at the cabinets and assets (iFobs).

Transaction Finder

The Transaction Finder plugin integrates point-of-sale (POS) systems into Security Center. Using this plugin, operators can identify suspicious transactions and view the corresponding video and other evidence that relates to each transaction to figure out if any further investigation is needed.

Transactions

The Transactions task is an investigation task in Security Desk. You can use it to investigate transactions that have taken place in point-of-sale systems or at individual cash registers.

transfer group

A transfer group is a persistent archive transfer scenario that lets you run a video transfer without redefining the transfer settings. These transfers can be scheduled or executed on demand. Transfer groups define which cameras or archiving roles are included in the transfer, when the archives are transferred, what data is transferred, and so on.

transient parking

Transient parking is a parking scenario where the driver must purchase parking time as soon as the vehicle enters the parking lot.

Transmission Control Protocol

A connection-oriented set of rules (protocol) that, along with the IP (Internet Protocol), is used to send data over an IP network. The TCP/IP protocol defines how data can be transmitted in a secure manner between networks. TCP/IP is the most widely used communications standard and is the basis for the Internet.

Transmission Control Protocol (TCP)

Acronym: TCP

Transport Layer Security

Transport Layer Security (TLS) is a protocol that provides communications privacy and data integrity between two applications communicating over a network. When a server and client communicate, TLS ensures that no third party may eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer (SSL).

Transport Layer Security (TLS)

Acronym: TLS

twilight schedule

A twilight schedule is a schedule entity that supports both daytime and nighttime coverages. A twilight schedule cannot be used in all situations. Its primary function is to control video related behaviors.

two-person rule

The two-person rule is the access restriction placed on a door that requires two cardholders (including visitors) to present their credentials within a certain delay of each other in order to gain access.

"U" terms

unit

A unit is a hardware device that communicates over an IP network that can be directly controlled by a Security Center role. We distinguish four types of units in Security Center:
  • Access control units, managed by the Access Manager role
  • Video units, managed by the Archiver role
  • ALPR units, managed by the ALPR Manager role
  • Intrusion detection units, managed by the Intrusion Manager role

Unit Assistant

The Unit Assistant is the central role that manages system-wide operations on video units.

Unit discovery tool

Starting with Security Center 5.4 GA the Unit discovery tool has been replaced by the Unit enrollment tool.

Unit enrollment

Unit enrollment is a tool that you can use to discover IP units (video and access control) connected to your network, based on their manufacturer, and network properties (discovery port, IP address range, password, and so on). After you discovered a unit, you can add it to your system.

Unit replacement

Unit replacement is a tool that you can use to replace a failed hardware device with a compatible one, while ensuring that the data associated to the old unit gets transferred to the new one. For an access control unit, the configuration of the old unit is copied to the new unit. For a video unit, the video archive associated to the old unit is now associated to the new unit, but the unit configuration is not copied.

unit synchronization

Unit synchronization is the process of downloading the latest Security Center settings to an access control unit. These settings, such as access rules, cardholders, credentials, unlock schedules, and so on, are required so that the unit can make accurate and autonomous decisions in the absence of the Access Manager.

University Parking Enforcement

University Parking Enforcement is a Genetec Patroller™ software installation that is configured for university parking enforcement: the enforcement of scheduled parking permits or overtime restrictions. The use of maps is mandatory. Hotlist functionality is also included.

unlock schedule

An unlock schedule defines the periods of time when free access is granted through an access point (door side or elevator floor).

unreconciled read

An unreconciled read is an MLPI license plate read that has not been committed to an inventory.

user

A user is an entity that identifies a person who uses Security Center applications and defines the rights and privileges that person has on the system. Users can be created manually or imported from an Active Directory.

user group

A user group is an entity that defines a group of users who share common properties and privileges. By becoming member of a group, a user automatically inherits all the properties of the group. A user can be a member of multiple user groups. User groups can also be nested.

user level (Security Center)

A user level is a numeric value assigned to users to restrict their ability to perform certain operations, such as controlling a camera PTZ, viewing the video feed from a camera, or staying logged on when a threat level is set. Level 1 is the highest user level, with the most privileges.

user level (Stratocast)

A user level is an access requirement that defines a user's ability to perform certain tasks once logged on to Stratocast™.

User management

The User management task is an administration task that you can use to configure users, user groups, and partitions.

user procedure

Replaces the term "incident procedure". See "standard operating procedure".

username

A username is an access credential that is comprised of a valid email address from one of the supported identity providers. A username can be registered to multiple Stratocast™ accounts (multi-account username), and must be activated by the user only once before logging on to any of the accounts that the username is registered to.

UTC Advisor Master and Advanced

The UTC Advisor Master and Advanced extension integrates United Technology Corporation (UTC)'s Advisor Master (formerly ATS Classic) and Advisor Advanced intrusion panels into Security Center. With this extension installed, operators can respond to events and alarms from the panels and send commands to the panels directly from Security Desk.

"V" terms

validated step

A validated step in an standard operating procedure (SOP) is a step that is either completed or skipped with a justification.

validation key

A validation key is a serial number uniquely identifying a computer that must be provided to obtain the license key.

Vault

The Vault is a tool that displays your saved snapshots and exported G64, G64x, and GEK (encrypted) video files. From the Vault, you can view the video files, encrypt and decrypt files, convert files to ASF, or package files with the Genetec™ Video Player.

vehicle identification number

A vehicle identification number (VIN) is an identification number that a manufacturer assigns to vehicles. This is usually visible from outside the vehicle as a small plate on the dashboard. A VIN can be included as additional information with license plate entries in a hotlist or permit list, to further validate a hit and ensure that it is the correct vehicle.

vehicle identification number (VIN)

Acronym: VIN

Vehicle metadata report

The Vehicle metadata report task is an investigation task in Security Desk. You can use it to generate reports on local GPS unit and camera metadata key and value pair matches.

Vehicle route playback

The Vehicle route playback task is an investigation task in Security Desk. You can use it to view an AVL unit’s past location and associated camera feeds for a specified time frame.

Video

The Video task is an administration task that you can use to configure video management roles, units, analog monitors, and cameras.

video analytics

Video analytics is the software technology that is used to analyze video for specific information about its content. Examples of video analytics include counting the number of people crossing a line, detection of unattended objects, or the direction of people walking or running.

video analytics scenario

A video analytics scenario is an analytics configuration that is applied to video streams and that defines what information in the video is analyzed.

video archive

A video archive is a collection of video, audio, and metadata streams managed by an Archiver or Auxilliary Archiver role. These collections are catalogued in the archive database that includes camera events linked to the recordings.

video decoder

A video decoder is a device that converts a digital video stream into analog signals (NTSC or PAL) for display on an analog monitor. The video decoder is one of the many devices found on a video decoding unit.

video encoder (Security Center)

A video encoder is a device that converts an analog video source to a digital format by using a standard compression algorithm, such as H.264, MPEG-4, MPEG-2, or M-JPEG. The video encoder is one of the many devices found on a video encoding unit.

video encoder (Stratocast)

A video encoder is a video unit that converts an analog video source to a digital format by using a standard compression algorithm, such as H.264, MPEG-4, MPEG-2, or M-JPEG. Using a video encoder with multi-channel inputs, you can digitize the analog video of multiple cameras at the same time.

video file

A video file is a file created by an archiving role (Archiver or Auxiliary Archiver) to store archived video. The file extension is G64 or G64x. You need Security Desk or the Genetec™ Video Player to view video files.

Video file explorer

The Video file explorer is an investigation task that you can use to browse through your file system for video files (G64 and G64x), and to play, convert to ASF, and verify the authenticity of these files.

video protection

Video can be protected against deletion. Protection is applied on all video files needed to store the protected video sequence. Because no video file can be partially protected, the actual length of the protected video sequence depends on the granularity of the video files.

video request

A video request is a request from an authorized user for a camera owner to share recordings with an investigator in Genetec Clearance™.

video sequence

A video sequence is any recorded video stream of a certain duration.

video stream

A video stream is an entity representing a specific video quality configuration (data format, image resolution, bit rate, frame rate, and so on) on a camera.

video unit

A video unit is a video encoding or decoding device that is capable of communicating over an IP network and that can incorporate one or more video encoders. The high-end encoding models also include their own recording and video analytics capabilities. Cameras (IP or analog), video encoders, and video decoders are all examples of video units.

video watermarking

Video watermarking adds visible text to live, playback, and exported video processed by Security Center. This text includes identifying information that is intended to deter unauthorized users from leaking video recordings.

(Obsolete) Beginning in Security Center 5.9.0.0, video watermarking no longer refers to the use of digital signatures for tampering protection. Tampering protection is now called digital signature.

virtual zone

A virtual zone is a zone entity where the I/O linking is done by software. The input and output devices can belong to different units of different types. A virtual zone is controlled by the Zone Manager and only works when all the units are online. It can be armed and disarmed from Security Desk.

Visit details

The Visit details task is an investigation task that reports on the stay (check-in and check-out time) of current and past visitors.

visit request workflow

A visit request workflow is a series of activities associated with a visit request. These activities are performed by the system during the life cycle of a visit request. The activities can change the visit request state and properties, affect other entities in the system, or wait for a condition to become true.

Visitor activities

The Visitor activities task is an investigation task that reports on visitor activities (access denied, first person in, last person out, antipassback violation, and so on).

visitor escort rule

The visitor escort rule is the additional access restriction placed on a secured area that requires visitors to be escorted by a cardholder during their stay. Visitors who have a host are not granted access through access points until both they and their assigned host (cardholder) present their credentials within a certain delay.

Visitor management

The Visitor management task is the operation task that you can use to check in, check out, and modify visitors, as well as manage their credentials, including temporary replacement cards.

visual reporting

Visual reporting is dynamic charts or graphs in Security Desk that deliver insights that you act on. You can perform searches and investigate situations using these visual and user-friendly reports. The visual report data can be analyzed to help identify activity patterns and enhance your understanding.

visual tracking

Visual tracking is a Security Center feature that lets you follow an individual in live or playback mode through areas of your facility that are monitored by cameras.

visual watermarking

Visual watermarks add a transparent overlay to videos and images in Genetec Clearance™. The overlay displays identifying information about the user that is currently logged in, organization details, and timestamps indicating when the user viewed or shared the video or image. The visual watermark deters the unauthorized use or distribution of content. Visual watermarking can only be removed by users who have the hide visual watermark permission.

VoIP inventory

The VoIP inventory task is a maintenance task that reports on the SIP entities and all of the Security Center users with SIP accounts in your system.

VSIP port

The VSIP port is the name given to the discovery port of Verint units. A given Archiver can be configured to listen to multiple VSIP ports.

"W" terms

Warning (severity level)

The Warning severity level indicates that the system event is not critical. Although immediate attention is not required, it is recommended to correct the issue as soon as possible. System events and their corresponding severity levels appear on the Health monitoring page and in the health dashboard.

Watchdog

Genetec™ Watchdog is a Security Center service installed alongside the Genetec™ Server service on every server computer. Genetec™ Watchdog monitors the Genetec™ Server service, and restarts it if abnormal conditions are detected.

Wearable Camera Manager

The Wearable Camera Manager role is used to configure and manage body-worn camera (BWC) devices in Security Center, including configuring camera stations, adding officers (wearable camera users), uploading content to an Archiver, and setting the retention period for uploaded evidence.

web-based authentication

Web-based authentication (also known as passive authentication) is when the client application redirects the user to a web form managed by a trusted identity provider. The identity provider can request any number of credentials (passwords, security tokens, biometric verifications, and so on) to create a multi-layer defense against unauthorized access. This is also known as multi-factor authentication.

Web-based SDK

The Web-based SDK role exposes the Security Center SDK methods and objects as web services to support cross-platform development.

Web Client

Security Center Web Client is the web application that gives users remote access to Security Center so that they can monitor videos, investigate events related to various system entities, search for and investigate alarms, and manage cardholders, visitors, and credentials. Users can log on to Web Client from any computer that has a supported web browser installed.

web client

The client component of a software system that provides access to the system's features from a web browser on the user's machine.

Web Map Service

Web Map Service (WMS) is a standard protocol for serving georeferenced map images over the Internet that are generated by a map server using data from a GIS database.

Web Map Service (WMS)

Acronym: WMS

Web Server

The Web Server role is used to configure Security Center Web Client, a web application that gives users remote access to Security Center. Each role created defines a unique web address (URL) that users enter in their web browser to log on to Web Client and access information from Security Center.

wheel imaging

Wheel imaging is a virtual tire-chalking technology that takes images of the wheels of vehicles to prove whether they have moved between two license plate reads.

whitelist

A whitelist is a hotlist that is created to grant a group of license plates access to a parking lot. A whitelist can be compared to an access rule where the secured area is the parking lot. Instead of listing the cardholders, the whitelist applies to license plate credentials.

widget

A widget is a component of the graphical user interface (GUI) with which the user interacts.

Windows Communication Foundation

Windows Communication Foundation (WCF) is a communication architecture used to enable applications, in one machine or for multiple machines connected by a network, to communicate. Genetec Patroller™ uses WCF to communicate wirelessly with Security Center.

Windows Communication Foundation (WCF)

Acronym: WCF

workflow

In Genetec ClearID™, a workflow is a process used to initiate a request that requires multiple steps, including the authorization of different stakeholders. For example, access requests or site visit requests.

"X" terms

X.509 certificate

X.509 certificates are used for identity verification, asymmetric cryptography and data-in-transit security. X.509 certificates are made up of the identify of a user or computer and a public key. X.509 certificates are the basis for the HTTPS protocol.

XFEvent

In the CCURE 9000 system, an XFEvent is a work flow that can be configured to respond to different causes by triggering an alarm, an event, or a chain of events.

XFEvent management

The XFEvent management task is an operation task in Security Desk that you can use to see the current state of all XFEvents imported from CCURE 9000. For a selected event, you can apply manual actions, view causes, and show instructions.

"Z" terms

zone

A zone is an entity that monitors a set of inputs and triggers events based on their combined states. These events can be used to control output relays.

Zone activities

The Zone activities task is an investigation task that reports on zone related activities (zone armed, zone disarmed, lock released, lock secured, and so on).

Zone Manager

The Zone Manager role manages virtual zones and triggers events or output relays based on the inputs configured for each zone. It also logs the zone events in a database for zone activity reports.

Zone occupancy

The Zone occupancy task is an investigation task that reports on the number of vehicles parked in a selected parking area, and the percentage of occupancy.