The Access control task is an
administration task that allows you to configure access control roles, units, rules,
cardholders, credentials, and related entities and settings.
Access control health history
Access control health history is a type of maintenance task
that reports on malfunction events for access control units.
access control unit
An access control unit is an entity that represents an
intelligent access control device, such as a Synergis™ appliance or an HID network
controller, that communicates directly with the Access Manager over an IP network. An
access control unit operates autonomously when it is disconnected from the Access
Also known as: door
Access control unit events
Access control unit events is a type of maintenance task
that reports on events pertaining to selected access control units.
The Access Manager role manages and monitors access
control units on the system.
An access point is any entry (or exit) point to a physical
area where access can be monitored and governed by access rules. An access point is
typically a door side.
An access right is the basic right users must have over any
part of the system before they can do anything with it. Other rights, such as viewing
and modifying entity configurations, are granted through privileges. In the context of a Synergis™ system, an access right is
the right granted to a cardholder to pass through an access point at a given date and
An access rule entity defines a list of cardholders to whom
access is either granted or denied based on a schedule. Access rules can be applied to
secured areas and doors for entries and exits, or to intrusion detection areas for
arming and disarming.
Access rule configuration
Access rule configuration is a type of maintenance task
that reports on entities and access points affected by a given access
Access troubleshooter is a tool that helps you detect and
diagnose access configuration problems.
With this tool, you can find out about the
- Who is allowed to pass through an access point at a given date and time
- Which access points a cardholder is allowed to use at a given date and time
- Why a given cardholder can or cannot use an access point at a given date and
An action is a user-programmable function that can be triggered as an
automatic response to an event, such as door held open for too long or object left
unattended, or that can be executed according to a specific time table.
An active alarm is an alarm that has not yet been
Active authentication is when the client
application captures the user credentials and sends them through a secure channel to a
trusted identity provider for authentication.
Active Directory is a directory service created by
Microsoft, and a type of role that imports users and cardholders from an Active
Directory and keeps them synchronized.
Active Directory (AD)
An add-on is a software package that adds tasks, tools, or
specific configuration settings to Security Center systems.
Active Directory Federation Services
Active Directory Federation Services (ADFS) is a component of the
Microsoft® Windows® operating system that issues and transforms claims, and implements
Active Directory Federation Services (ADFS)
Activity trails is a type of maintenance task that
reports on the user activity related to video, access control, and ALPR functionality. This
task can provide information such as who played back which video recordings, who used the
Hotlist and permit editor, who enabled hotlist filtering, and much more.
Advanced Systems Format
The Advanced Systems Format (ASF) is a video streaming format from
Microsoft. The ASF format can only be played in media players that support this format,
such as Windows Media Player.
Advanced Systems Format (ASF)
An agent is a subprocess created by a Security Center role to run
simultaneously on multiple servers for the purpose of sharing its load.
An alarm is a type of entity that describes a particular trouble
situation that requires immediate attention and how it can be handled in Security
Center. For example, an alarm can indicate which entities (usually cameras and doors)
best describe it, who must be notified, how it must be displayed to the user, and so
An alarm acknowledgement is a user response to an alarm.
In Security Center, the default acknowledgement and alternate acknowledgement are the
two variants of alarm acknowledgements. Each variant is associated to a different event
so that specific actions can be programmed based on the alarm response selected by the
Alarm monitoring is a type of operation task that allows you
to monitor and respond to alarms (acknowledge, forward, snooze, and so on) in real time,
as well as review past alarms.
Alarm report is a type of investigation task that allows you to
search and view current and past alarms.
The Alarms task is an administration
task that allows you to configure alarms and monitor groups.
ALPR Frequency Monitor
The Stakeout - ALPR Frequency Monitor plugin tracks
how often vehicles are detected by fixed Sharp
cameras. The system can alert Security
Desk users if vehicles without whitelisted license plates have exceed the configured
An analog monitor is a type of entity that represents a monitor
that displays video from an analog source, such as a video decoder or an analog camera.
This term is used in Security Center to refer to monitors that are not controlled by a
Antipassback is an access restriction placed on a secured
area that prevents a cardholder from entering an area that they have not yet exited
from, and vice versa.
An architecture version is a software version that
introduces significant changes to the architecture or user experience of the platform.
Architecture upgrades require changes to system design and configuration settings, data
migration, and retraining of users. Architecture versions are not compatible with
previous versions. A license update is required to upgrade to a new architecture
version. An architecture version is indicated by a version number with zeros at the
second, third and fourth positions: X.0.0.0.
For more information, see our Product Lifecycle
page on GTAP.
The Archiver role is responsible for the discovery, status
polling, and control of video units. The Archiver also manages the video archive and
performs motion detection if it is not done on the unit itself.
Archiver events is a type of maintenance task that reports on
events pertaining to selected Archiver roles.
Archiver statistics is a maintenance task that
reports on the operation statistics (number of archiving cameras, storage usage,
bandwidth usage, and so on) of the selected archiving roles (Archiver and Auxiliary
Archiver) in your system.
Archives is a type of investigation task that allows you to find and
view available video archives by camera and time range.
Archive storage details is a type of maintenance task
that reports on the video files (file name, start and end time, file size, protection
status, and so on) used to store video archive, and which allows you to change the
protection status of those files, among other things.
(Obsolete as of Security Center 5.8 GA) The Archive
transfer task is an administration task that allows you to configure settings for
retrieving recordings from a video unit, duplicating archives from one Archiver to another, or
backing up archives to a specific location. Starting from Security Center 5.8 GA, Archive transfer
is page inside the Video administration task.
Archive transfer is the process of transferring your video
data from one location to another. The video is recorded and stored on the video unit
itself or on an Archiver storage disk, and then the recordings are transferred to
An archiving role is an instance of either the Archiver
role or Auxiliary Archiver role.
An area entity represents a concept or a physical location (room,
floor, building, site, and so on) used for grouping other entities in the system.
Area activities is a type of investigation task that reports on
access control events pertaining to selected areas.
Area presence is a type of investigation task that provides a
snapshot of all cardholders and visitors currently present in a selected area.
The Area view task is an
administration task that allows you to configure areas, doors, cameras, tile plugins,
intrusion detection areas, zones, and other entities found in the area
The area view is a view that organizes the commonly used entities
such as doors, cameras, tile plugins, intrusion detection areas, zones, and so on, by
areas. This view is primarily created for the day to day work of the security
An armed tile is a tile in Security Desk that displays new
alarms that are triggered. In the Alarm monitoring task all tiles
are armed, while in the Monitoring task, tiles must be armed by a
An asset is a type of entity that represents any valuable object
with an RFID tag attached, thus allowing it to be tracked by an asset management
An asynchronous video is a type of entity that represents
any valuable object with an RFID tag attached, thus allowing it to be tracked by an
asset management software.
An audio decoder is a device or software that decodes compressed
audio streams for playback. Synonym of speaker.
An audio encoder is a device or software that encodes audio
streams using a compression algorithm. Synonym of microphone.
Audit trails is a type of maintenance task that reports on the
configuration changes of the selected entities in the system and also indicates the user
who made the changes.
The process of verifying that an entity is what it claims
to be. The entity could be a user, a server, or a client application.
The process of establishing the rights an entity has over
the features and resources of a system.
An authorized user is a user who can see (has the right to
access) the entities contained in a partition. Users can only exercise their privileges
on entities they can see.
Automatic enrollment is when new IP units on a network are
automatically discovered by and added to Security Center. The role that is responsible
for the units broadcasts a discovery request on a specific port, and the units
listening on that port respond with a message that contains the connection information
about themselves. The role then uses the information to configure the connection to the
unit and enable communication.
automatic license plate recognition
Automatic license plate recognition (ALPR) is an image processing
technology used to read license plate numbers. ALPR converts license plate numbers
cropped from camera images into a database searchable format.
automatic license plate recognition (ALPR)
The Authentication Service role connects Security Center to an external identity provider for
Instances of the Authentication Service role are
protocol-specific. One of the following protocols is selected at role creation:
- WS-Trust or WS-Federation
Multiple Authentication Service roles can be created, but each must monitor a unique
list of domains.
The AutoVu™ automatic
license plate recognition (ALPR) system automates license plate reading and
identification, making it easier for law enforcement and for municipal and commercial
organizations to locate vehicles of interest and enforce parking restrictions. Designed
for both fixed and mobile installations, the AutoVu™ system is ideal for a variety of applications
and entities, including law enforcement, municipal, and commercial
AutoVu™ ALPR Processing
AutoVu™ ALPR Processing Unit is the
processing component of the SharpX system. The ALPR Processing Unit is available with two
or four camera ports, with one dedicated processor per camera (if using SharpX) or per
two cameras (if using SharpX VGA). This ensures maximum, per-camera, processing
performance. The ALPR Processing Unit is sometimes referred to as the trunk unit
because it is typically installed in a vehicle's trunk.
Also known as: trunk
AutoVu™ Managed Services
With AutoVu™ Managed
Services (AMS), your automatic license plate recognition (ALPR) system is hosted in the
cloud and experts from Genetec Inc. configure
and maintain it. This reduces the need for on-site IT infrastructure and support.
AutoVu™ Managed Services
The Auxiliary Archiver role supplements the video
archive produced by the Archiver role. Unlike the Archiver role, the Auxiliary Archiver
role is not bound to any particular discovery port, therefore, it can
archive any camera in the system, including cameras federated from other Security Center systems. The Auxiliary Archiver role
cannot operate independently; it requires the Archiver role to communicate with video
Badge designer is a tool that allows you to design and modify
A badge template is a type of entity used to configure a
printing template for badges.
block face (2 sides)
A block face (2 sides) is a type of parking regulation
characterizing an overtime rule. A block face is the length of a street between two
intersections. A vehicle is in violation if it is seen parked within the same block over
a specified period of time. Moving the vehicle from one side of the street to the other
does not make a difference.
A body-worn camera (BWC), also
known as a wearable camera, is a video recording system that is typically used by law
enforcement to record their interactions with the public or gather video evidence at
A bookmark is an indicator of an event or incident that is used to
mark a specific point in time in a recorded video sequence. A bookmark also contains a
short text description that can be used to search for and review the video sequences at
a later time.
Bookmarks is a type of investigation task that searches for
bookmarks related to selected cameras within a specified time range.
The breakout box is the proprietary connector box of Genetec
Inc. for AutoVu™ mobile solutions that use Sharp cameras. The breakout box provides
power and network connectivity to the Sharp units and the in-vehicle
Broadcast is the communication between a single sender and all
receivers on a network.
A camera entity represents a single video source in the system.
The video source can either be an IP camera, or an analog camera that connects to the
video encoder of a video unit. Multiple video streams can be generated from the same
Camera blocking is an Omnicast™ feature that lets you restrict
the viewing of video (live or playback) from certain cameras to users with a minimum
Camera configuration is a type of maintenance task
that reports on the properties and settings of local cameras in your system
(manufacturer, resolution, frame rate, stream usage, and so on).
Camera events is a type of investigation task that reports on
events pertaining to selected cameras within a specified time range.
Camera Integrity Monitor
The Camera Integrity Monitor role samples video
images from cameras at regular intervals, detects abnormal variations that indicate that
cameras might have been tampered with, and generates Camera tampering
camera integrity monitoring
In Security Center, camera integrity monitoring is
software that detects any form of tampering with the camera, such as moving the camera,
obstructing the camera view, changing the camera focus, and so on. The software
automatically generates events to alert the security team to remedy the
A camera sequence is a type of entity that defines a list of
cameras that are displayed one after another in a rotating fashion within a single tile
in Security Desk.
Canvas is one of the panes found in the Security Desk's task workspace.
The canvas is used to display multimedia information, such as videos, maps, and
pictures. It is further divided into three panels: the tiles, the dashboard, and the
The capture rate measures the speed at which a license plate
recognition system can take a photo of a passing vehicle and detect the license plate in
Card and PIN
Card and PIN is an access point mode that requires a cardholder to
present their card, and then enter a personal identification number (PIN).
A cardholder is a type of entity that represents a person who can
enter and exit secured areas by virtue of their credentials (typically access cards) and
whose activities can be tracked.
Cardholder access rights is a type of maintenance task
that reports on which cardholders and cardholder groups are granted or denied access to
selected areas, doors, and elevators.
Cardholder activities is type of investigation task that
reports on cardholder activities, such as access denied, first person in, last person
out, antipassback violation, and so on.
Cardholder configuration is a type of maintenance task
that reports on cardholder properties, such as first name, last name, picture, status,
custom properties, and so on.
A cardholder group is a type of entity that configures the
common access rights of a group of cardholders.
Cardholder management is a type of operation task that allows
you to create, modify, and delete cardholders. In this task, you can also manage a
cardholder's credentials, including temporary replacement cards.
Designates one of the following: (1) digital
certificate; (2) SDK certificate.
A certificate authority or certification authority
(CA) is an entity or organization that signs identity certificates and attests to the
validity of their contents.
certificate authority (CA)
City Parking Enforcement
City Parking Enforcement is a Genetec
Patroller™ software installation that is configured
for the enforcement of parking permit and overtime restrictions.
City Parking Enforcement with Wheel
City Parking Enforcement with Wheel Imaging is a
City Parking Enforcement installation of a Genetec
Patroller™ application that also includes wheel imaging. The
use of maps is mandatory and the mobile AutoVu™ system
must include navigation hardware.
A statement that a trusted third-party makes about a subject, such
as a user. For example, a claim can be about a name, identity, key, group, privilege, or
capability. Claims are issued by an identity provider. They are given one or more values
and then packaged in a security token that is sent to relying applications during
A software component or service that generates security
tokens upon request. Also known as the issuer of claims.
client-specific key stream
The client-specific key stream is the encrypted form of the master key stream. The master key stream is encrypted with the public key contained in an encryption certificate, specifically issued for one or more client machines. Only the client machines that have the encryption certificate installed have the required private key to decrypt the encrypted key stream.
Cloud Archives is a service from Genetec Inc. that enables
organizations to maintain video recordings in the cloud, while continuing to leverage
their existing Security Center system.
A cloud platform provides remote computing and storage services
through centralized data centers that are accessible via the Internet.
A collaborative incident is an incident type that
requires the collaboration of multiple teams to resolve. Each team has specific tasks to
follow, which are represented by sub-incidents. The collaborative incident is resolved
when all its sub-incidents are resolved.
the Security Center administrative application
used to manage all Security Center users and to
configure all Security Center entities such as
areas, cameras, doors, schedules, cardholders, patrol vehicles, ALPR units, and hardware
Conflict resolution utility is a tool that helps you
resolve conflicts caused by importing users and cardholders from an Active
A context camera is a camera connected to an ALPR unit that
produces a wider angle color image of the vehicle whose license plate was read by the
The Continuous Delivery (CD) release track offers
customers an upgrade path with ongoing innovations, introducing new features, bug fixes,
performance enhancements, and support for the latest devices through minor versions. The
frequency of changes introduced on the CD track may be impractical for some
organizations, who opt for the long-term predictability of the LTS
Continuous Delivery (CD)
contract permit parking
Contract permit parking is a parking scenario where only
drivers with monthly permits can park in the parking zone. A whitelist is used to grant
permit holders access to the parking zone.
A controlled exit is when credentials are necessary to leave a
Controller module is the processing component of Synergis™
Master Controller with IP capability. This module comes pre-loaded with the controller
firmware and the web-based administration tool, Synergis™ Applicance
The convenience time is a configurable leeway time before a vehicle starts to be charged after entering the parking zone. For example, if you need to set up a 2-hour free parking period before paid time or parking enforcement takes effect, you would set the convenience time for 2 hours. For parking lots where parking enforcement begins immediately, you would still need to set a short convenience time to allow vehicle owners time to find a parking spot and purchase parking time before parking enforcement begins.
Copy configuration tool
The Copy configuration tool helps you save configuration time
by copying the settings of one entity to many others that partially share the same
A covert hit is a read (captured license plate) that is matched to a
covert hotlist. Covert hits are not displayed on the Genetec
Patroller™ screen, but can be displayed in Security
Desk by a user with proper
Covert hotlists allow you to ensure the discretion of an
ongoing investigation or special operation. When a hit is identified, only the
authorized officer at the Security Center
station is notified, while the officer in the patrol vehicle is not alerted. This
enables enforcement officials to assign multiple objectives to the vehicle and back-end
systems, while not interrupting the priorities of officers on duty.
A credential is a type of entity that represents a proximity card,
a biometrics template, or a PIN required to gain access to a secured area. A credential
can only be assigned to one cardholder at a time.
Credential activities is a type of investigation task
that reports on credential related activities, such as access denied due to expired,
inactive, lost, or stolen credential, and so on.
A credential code is a textual representation of the
credential, typically indicating the Facility code and the Card number. For credentials
using custom card formats, the user can choose what to include in the credential
Credential configuration is a type of maintenance task that
reports on credential properties, such as status, assigned cardholder, card format,
credential code, custom properties, and so on.
Credential management is a type of operation task that
allows you to create, modify, and delete credentials. It also allows you to print badges
and enroll large numbers of card credentials into the system, either by scanning them at
a designated card reader or by entering a range of values.
Credential request history is a type of
investigation task that reports on which users requested, canceled, or printed
A custom event is an event added after the initial system
installation. Events defined at system installation are called system events. Custom
events can be user-defined or automatically added through plugin installations. Unlike
system events, custom events can be renamed and deleted.
A custom field is a user-defined property that is associated
with an entity type and is used to store additional information that is useful to your
In cryptography, cyphertext is the encrypted
Daily usage per patroller
Daily usage per patroller entity is a type of
investigation task that reports on the daily usage statistics of a selected patrol vehicle
(operating time, longest stop, total number of stops, longest shutdown, and so on) for a given
A dashboard is one of the three panels that belong to the canvas in
Security Desk. It contains the graphical commands (or widgets) pertaining to the entity
displayed in the current tile.
A database server is an application that manages databases and
handles data requests made by client applications. Security Center uses Microsoft SQL
Server as its database server.
A debounce is the amount of time an input can be in a changed state
(for example, from active to inactive) before the state change is reported. Electrical
switches often cause temporarily unstable signals when changing states, possibly
confusing the logical circuitry. Debouncing is used to filter out unstable signals by
ignoring all state changes that are shorter than a certain period of time (in
default expiration delay
The default expiration delay is used for permits
supplied by Pay-by-Plate
Sync that do not include an
expiration. In this case, AutoVu™
Free-Flow checks with the parking permit
provider to see if the permit is still valid. Increasing this value reduces the
frequency of the permit checks. For example, if the parking lot charges for parking in
increments of 15 minutes, and you also set the default expiration delay to 15 minutes,
the system validates the permit with the parking provider every 15
Degraded mode is an offline operation mode of the interface
module when the connection to the Synergis™ unit is lost. The interface module grants
access to all credentials matching a specified facility code. Only HID VertX interface
modules can operate in degraded mode.
Dependent mode is an online operation mode of the
interface module where the Synergis™ unit makes all access control decisions. Not all
interface modules can operate in dependent mode.
Dewarping is the transformation used to straighten a digital image
taken with a fisheye lens.
A digital certificate, also known as an
identity certificate or encryption certificate, is an
electronic "passport" that allows a person, computer, or organization to exchange
information securely over the Internet using the public key infrastructure
A digital signature is cryptographic metadata added to
video frames by the Archiver or Auxiliary Archiver to ensure their authenticity. If a
video sequence is manipulated by adding, deleting, or modifying frames, the signature of
the modified content will differ from the original, indicating that the video
sequence has been tampered with.
The Directory role identifies a Security Center system. It manages all entity
configurations and system-wide settings.
Only a single instance of this role is permitted on
your system. The server hosting the Directory role is called the main server, and
must be set up first. All other servers you add in Security Center are called
expansion servers, and must connect to the main server to be part of the same
Directory authentication is a Security Center
option that forces all client and server applications on a given machine to validate the
identity certificate of the Directory before connecting to it. This measure prevents
Directory gateways allow Security Center applications
located on a non-secured network to connect to the main server that is behind a
firewall. A Directory gateway is a Security Center server that acts as a proxy for the
main server. A server cannot be both a Directory server and a Directory gateway; the
former must connect to the Directory database, while the latter must not, for security
The Directory Manager role manages the Directory
failover and load balancing in order to produce the high availability characteristics in
A Directory server is any one of the multiple servers
simultaneously running the Directory role in a high availability
A discovery port is a port used by certain Security Center roles
(Access Manager, Archiver, ALPR Manager) to find the units they are responsible for on
the LAN. No two discovery ports can be the same on one system.
A district is a type of parking regulation characterizing an overtime
rule. A district is a geographical area within a city. A vehicle is in violation if it
is seen within the boundaries of the district over a specified period of
A door entity represents a physical barrier. Often, this is an
actual door but it could also be a gate, a turnstile, or any other controllable barrier.
Each door has two sides, named In and Out by default. Each side is an
access point (entrance or exit) to a secured area.
Door activities is a type of investigation task that reports on
door related activities, such as access denied, door forced open, door open too long,
hardware tamper, and so on.
A door contact monitors the state of a door, whether it is open or
closed. It can also be used to detect an improper state, such as door open too
Every door has two sides, named In and Out by default.
Each side is an access point to an area. For example, passing through one side leads
into an area, and passing through the other side leads out of that area. For the
purposes of access management, the credentials that are required to pass through a door
in one direction are not necessarily the same that are required to pass through in the
Door troubleshooter is a type of maintenance task that
lists all the cardholders who have access to a particular door side or elevator floor at
a specific date and time.
Driver Development Kit
Driver Development Kit is a SDK for creating device
Driver Development Kit (DDK)
A duress is a special code used to disarm an alarm system. This code
quietly alerts the monitoring station that the alarm system was disarmed under
In a system that uses the Pay-by-Plate
Sync plugin, a dynamic permit holds a list of
vehicles that is updated by a third-party permit provider. For example, in a system
where vehicle owners pay for parking at a kiosk or using a mobile phone app, the list of
vehicles are dynamically managed by a third-party permit provider.
Edge recording is the process of recording and storing recorded
videos locally, thus removing the need for a centralized recording server or unit. With
edge recording, you can store video directly on the camera’s internal storage device (SD
card) or on a network attached storage volume (NAS volume).
electric door strike
An electric door strike is an electric device that releases
the door latch when current is applied.
An elevator is a type of entity that provides access control
properties to elevators. For an elevator, each floor is considered an access point.
Elevator activities is a type of investigation task that
reports on elevator related activities, such as access denied, floor accessed, unit is
offline, hardware tamper, and so on.
An encryption certificate, also known as a
digital certificate or public key certificate, is an
electronic document that contains a public and private key pair used in Security Center
for fusion stream encryption. Information encrypted with the public
key can only be decrypted with the matching private
To enforce is to take action following a confirmed hit. For example, a
parking officer can enforce a scofflaw violation (unpaid parking tickets) by placing a
wheel boot on the vehicle.
Entities are the basic building blocks of Security Center. Everything
that requires configuration is represented by an entity. An entity can represent a
physical device, such as a camera or a door, or an abstract concept, such as an alarm, a
schedule, a user, a role, a plugin, or an add-on.
An entity tree is the graphical representation of Security Center
entities in a tree structure, illustrating the hierarchical nature of their
An event indicates the occurrence of an activity or incident, such
as access denied to a cardholder or motion detected on a camera. Events are
automatically logged in Security Center. Every
event has an entity as its main focus, called the event source.
An event-to-action links an action to an event. For example, you
can configure Security Center to trigger an
alarm when a door is forced open.
An expansion server is any server machine in a Security Center
system that does not host the Directory role. The purpose of the expansion server is to
add to the processing power of the system.
An extension refers to a group of manufacturer-specific
settings found in the Extensions configuration page of a role, such
as Archiver, Access Manager, or Intrusion Manager. Most extensions are built-in to
Security Center, but some require the
installation of an add-on; in those situations, the extension also refers to this
Failover is a backup operational mode in which a role (system
function) is automatically transferred from its primary server to a secondary server
that is on standby. This transfer between servers occurs only if the primary server
becomes unavailable, either through failure or through scheduled downtime.
Federal Agency Smart Credential
A Federal Agency Smart Credential Number (FASC-N) is an identifier
used in the Personal Identity Verification (PIV) credentials issued by US Federal
Agencies. FASC-N credential bit lengths vary based on reader configuration; Security
Center natively recognizes 75-bit and 200-bit formats.
Federal Agency Smart Credential Number (FASC-N)
false positive read
False positive plate reads can occur when a license plate
recognition system mistakes other objects in an image for license plates. For example,
lettering on a vehicle or street signs can sometimes create false positive plate
Federal Information Processing
Federal Information Processing Standards (FIPS) are publicly
announced standards developed by the United States federal government for use in
computer systems by non-military government agencies and government
Federal Information Processing Standard (FIPS)
A federated entity is any entity that is imported from an
independent system through one of the Federation™
A federated identity is a security token that is generated outside
of your own realm that you accept. Federated identity enables single sign-on, allowing
users to sign on to applications in different realms without needing to enter
A federated system is a independent system (Omnicast™ or
Security Center) that is unified under your local Security Center via a Federation™
role, so that the local users can view and control its entities, as if they belong to
the local system.
The Federation™ feature
joins multiple, independent Genetec™ IP
security systems into a single virtual system. With this feature, Security Center users
can view and control entities that belong to remote systems, directly from their local
Security Center system.
The Federation™ host is the Security Center system that
runs Federation™ roles. Users on the Federation™ host can view and control entities that
belong to federated systems directly from their local system.
The first-person-in rule is the additional access
restriction placed on a secured area that prevents anyone from entering the area until a
supervisor is on site. The restriction can be enforced when there is free access (on
door unlock schedules) and when there is controlled access (on access
Forensic search is a type of investigation task that searches
for video sequences based on video analytics events.
four-port RS-485 module
A four-port RS-485 module is a RS-485 communication
component of Synergis™ Master Controller with four ports (or channels) named A, B, C,
and D. The number of interface modules you can connect to each channel depends on the
type of hardware you have.
A free access is an access point state where no credentials are
necessary to enter a secured area. The door is unlocked. This is typically used during
normal business hours, as a temporary measure during maintenance, or when the access
control system is first powered up and is yet to be configured.
A free exit is an access point state where no credentials are
necessary to leave a secured area. The person releases the door by turning the doorknob,
or by pressing the REX button, and walks out. An automatic door closer shuts the door so
it can be locked after being opened.
Fusion stream is a proprietary data structure of Genetec
Inc. for streaming multimedia. Each fusion stream is a bundle of data (video, audio, and
metadata) streams and key streams related to a single camera. Fusion streams are
generated on specific client requests. The key streams are included only if the data
streams are encrypted.
Fusion stream encryption is a proprietary
technology of Genetec Inc. used to protect the privacy of your video archives. The
Archiver uses a two-level encryption strategy to ensure that only authorized client
machines or users with the proper certificates on smart cards can access your private
G64 is a Security Center format used by archiving roles (Archiver and
Auxiliary Archiver) to store video sequences issued from a single camera. This data
format supports audio, bookmarks, metadata overlays, timestamps, motion and event
markers, and variable frame rate and resolution.
G64x is a Security Center format used to store video sequences from
multiple cameras that are exported or backed up simultaneously. This data format
supports audio, bookmarks, metadata overlays, timestamps, motion and event markers,
variable frame rate and resolution, and watermarking.
Genetec Clearance™ Uploader
Genetec Clearance™ Uploader is an application
used to automatically upload media from body-worn cameras, sync folders, or other
devices to Genetec Clearance™, or a Security Center video archive, depending on which
.json config file is used.
is a collaborative decision management system that provides organizations with new
levels of situational intelligence, visualization, and complete incident management
capabilities. It allows security personnel to make the right decision when faced with
routine tasks or unanticipated situations by ensuring a timely flow of information. To
learn more about Genetec Mission
Control™, refer to the
Genetec resource center.
Official name of the map-based Security Center mobile application for Android and
Patroller™ is the software
application installed on an in-vehicle computer that analyzes license plate reads from
Sharp camera units. The application can be
installed to operate in different modes to suit your specific enforcement needs and can
be configured to notify the vehicle operator if immediate action is
Genetec™ Protocol is a standard protocol developed by
Genetec Inc. that third-party video encoder and IP camera manufacturers can use to
integrate their products to Security Center Omnicast™.
Genetec™ Server is the Windows service that is at the core of
Security Center architecture, and that must be installed on every computer that is part
of the Security Center's pool of servers. Every such server is a generic computing
resource capable of taking on any role (set of functions) you assign to
Genetec™ Update Service
The Genetec™ Update Service (GUS) is automatically
installed with most Genetec™ products and
enables you to update products when a new release becomes available.
Genetec™ Update Service (GUS)
Genetec™ Video Player
Genetec™ Video Player is a media player that is used to
view exported G64 and G64x video files from Security Desk, or on a computer that does
not have Security Center installed.
Geocoding is the process of finding associated geographic
coordinates (latitude and longitude) from a street address.
Georeferencing is the process of using an object’s
geographic coordinates (latitude and longitude) to determine its position on a
Geographic Information System
Geographic Information System (GIS) is a system that captures spatial
geographical data. Map Manager can connect to third-party vendors that provide GIS
services in order to bring maps and all types of geographically referenced data to
Geographic Information System (GIS)
A ghost camera is an entity used as a substitute camera. This
entity is automatically created by the Archiver when video archives are detected for a
camera whose definition has been deleted from the Directory, either accidentally or
because the physical device no longer exists. Ghost cameras cannot be configured, and
only exist so users can reference the video archive that would otherwise not be
associated to any camera.
ghost patroller entity
A ghost patroller entity is automatically created by
the ALPR Manager when the AutoVu™ license
includes the XML Import module. In Security Center, all ALPR data must be associated to a
Patroller™ entity or an ALPR unit
corresponding to a fixed Sharp camera. When you
import ALPR data from an external source via a specific ALPR Manager using the XML Import
module, the system uses the ghost entity to represent the ALPR data source. You can
formulate queries using the ghost entity as you would with a normal
Global antipassback is a feature that extends the
antipassback restrictions to areas controlled by multiple Synergis™
Global Cardholder Synchronizer
The Global Cardholder Synchronizer role ensures the
two-way synchronization of shared cardholders and their related entities between the
local system (sharing guest) where it resides and the central system (sharing
Global Cardholder Synchronizer (GCS)
A global entity is an entity that is shared across multiple
independent Security Center systems by virtue of its membership to a global partition.
Only cardholders, cardholder groups, credentials, and badge templates are eligible for
Global partition is a partition that is shared across multiple
independent Security Center systems by the partition owner, called the sharing
You can add a grace period to a parking session for purposes of
lenient enforcement. Following the expiration of the vehicle’s paid time or convenience
time, the grace period gives extra time before a parking session is flagged as a
hardware integration package
A hardware integration package, or HIP, is an update that can be applied
to Security Center. It enables the management of new functionalities (for example, new
video unit types), without requiring an upgrade to the next Security Center
hardware integration package (HIP)
Hardware inventory is a type of maintenance task that
reports on the characteristics (unit model, firmware version, IP address, time zone, and
so on) of access control, video, intrusion detection, and ALPR units in your system.
In cryptography, a hash function uses a mathematical
algorithm to take input data and return a fixed-size alphanumeric string. A hash
function is designed to be a one-way function, that is, a function which is infeasible
Hardening is the process of enhancing hardware and software
security. When hardening a system, basic and advanced security measures are put in place
to achieve a more secure operating environment.
A hardware zone is a zone entity in which the I/O linking is
executed by a single access control unit. A hardware zone works independently of the
Access Manager, and consequently, cannot be armed or disarmed from Security
Health history is a type of maintenance task that reports on
The Health Monitor role monitors system entities such as
servers, roles, units, and client applications for health issues.
Health statistics is a maintenance task that gives you
an overall view of the health of your system by reporting on the availability of
selected system entities such as roles, video units, and doors.
High availability is a design approach that enables a system
to perform at a higher than normal operational level. This often involves failover and
A hit is a license plate read that matches a hit rule, such as a hotlist,
overtime rule, permit, or permit restriction. A Genetec
Patroller™ user can choose to reject or accept a hit.
An accepted hit can subsequently be enforced.
Hit rule is a type of ALPR rule used to identify vehicles of interest
(called "hits") using license plate reads. The hit rules include the following types:
hotlist, overtime rule, permit, and permit restriction.
Hits is a type of investigation task that reports on hits reported
within a selected time range and geographic area.
A hot action is an action mapped to a PC keyboard function key
(Ctrl+F1 through Ctrl+F12) in Security Desk for quick access.
A hotlist is a list of wanted vehicles, where each vehicle is
identified by a license plate number, the issuing state, and the reason why the vehicle
is wanted (stolen, wanted felon, Amber alert, VIP, and so on). Optional vehicle
information might include the model, the color, and the vehicle identification number
Hotlist and permit
Hotlist and permit editor is a type of operation task
used to edit an existing hotlist or permit list. A new list cannot be created with this
task, but after an existing list has been added to Security Center, users can edit, add,
or delete items from the list, and the original text file is updated with the
Hotspot is a type of map object that represents an area on the map
which requires special attention. Clicking on a hotspot displays associated fixed and
An identity certificate, also known as a
digital certificate or public key certificate, is a
digitally signed document that allows a computer or an organization to exchange
information securely over a public network. The certificate includes information about
the owner's identity, the public key used to encrypt future messages sent
to the owner, and the digital signature of the certificate authority
A trusted, external system that administers user
accounts, and is responsible for providing user authentication and identity information to
relying applications over a distributed network.
An illuminator is a light in the Sharp unit that illuminates the
plate, thereby improving the accuracy of the images produced by the ALPR
Import tool is a tool that allows you to import cardholders,
cardholder groups, and credentials from a comma-separated values (CSV) file.
An inactive entity is an entity that is shaded in red in the
entity browser. It signals that the real world entity it represents is either not
working, offline, or incorrectly configured.
An incident is an unexpected event reported by a Security Desk user.
Incident reports can use formatted text and include events and entities as support
incident (Genetec Mission
A Genetec Mission
incident is an undesirable or unusual situation that needs investigation and resolution,
or a routine, scheduled task that requires monitoring.
An incident category is a type of entity that
represents a grouping of incident types that have similar
The Incident configuration
task is the administration task that you can use to configure the incident types, the
incident categories, and the support documents for Mission Control. You can also use
this task to generate reports on the changes made to incident types.
The Incident Manager is the central role that recognizes
situational patterns, and triggers incidents in a Genetec Mission
Control™ system. This role manages the
automation workflows and keeps track of all user activities that are related to
The Incident monitoring task is
a type of operation task that you can use to monitor and respond to incidents. From this
task, you can see the incidents displayed on a map, thus improving your situational
The incident owner is the incident recipient who took
ownership of the incident. Only the incident owner can take actions to resolve the
incident. An incident can only have one owner at a time.
An incident recipient is a user or user group that the
incident has been dispatched to. Incident recipients can see the incident in the
Incident monitoring task.
The Incident report task is a type
of investigation task that you can use to search, review, and analyze Mission Control
An incident supervisor is a user who sees an incident
in the Incident monitoring task because they supervise the incident
recipients. Incident supervisors are not incident recipients themselves. A user cannot
be both supervisor and recipient of the same incident.
An incident trigger is an event or a sequence of events
that can trigger an incident. The Genetec Mission
Control™ Rules Engine looks for specific combinations of events (type, time, correlation, and
frequency) to determine whether to trigger an incident.
An incident type is an entity that represents a situation
that requires specific actions to resolve it. The incident type entity can also be used
to automate the incident detection in Mission Control and to enforce the standard
operating procedures that your security team must follow.
Incidents is a type of investigation task that allows you to
search, review, and modify incident reports.
An interface module is a third-party security device that
communicates with an access control unit over IP or RS-485, and provides additional
input, output, and reader connections to the unit.
An interlock (also known as sally port or airlock) is an
access restriction placed on a secured area that permits only one door to be open at any
The Intrusion detection task
is an administration task that allows you to configure intrusion detection roles and
An intrusion detection area is an entity that
represents a zone (sometimes called an area) or a partition (group of sensors) on an
Intrusion detection area
Intrusion detection area
activities is a type of investigation task that reports on activities
(master arm, perimeter arm, duress, input trouble, and so on) in selected intrusion
An intrusion detection unit is an entity that
represents an intrusion device (intrusion panel, control panel, receiver, and so on)
that is monitored and controlled by the Intrusion Manager role.
Intrusion detection unit
Intrusion detection unit
events is a type of investigation task that reports on events (AC fail,
battery fail, unit lost, input trouble, and so on) related to selected intrusion
The Intrusion Manager role monitors and controls
intrusion detection units. It listens to the events reported by the units, provides live
reports to Security Center, and logs the events
in a database for future reporting.
An intrusion panel (also known as alarm panel) is a
wall-mounted unit where the alarm sensors (motion sensors, smoke detectors, door
sensors, and so on) and wiring of the intrusion alarms are connected and
Also known as: alarm
Inventory management is a type of operation task that
allows you to add and reconcile license plate reads to a parking facility
Inventory report is a type of investigation task that allows
you to view a specific inventory (vehicle location, vehicle length of stay, and so on)
or compare two inventories of a selected parking facility (vehicles added, vehicles
removed, and so on).
I/O configuration is a type of maintenance task that reports
on the I/O configurations (controlled access points, doors, and elevators) of access
I/O (input/output) linking is controlling an output relay based on
the combined state (normal, active, or trouble) of a group of monitored inputs. A
standard application is to sound a buzzer (through an output relay) when any window on
the ground floor of a building is shattered (assuming that each window is monitored by a
"glass break" sensor connected to an input).
An I/O zone is a zone entity in which the I/O linking can be
spread across multiple Synergis™ units, while one unit acts as the master unit. All
Synergis™ units involved in an I/O zone must be managed by the same Access Manager. The
I/O zone works independently of the Access Manager, but ceases to function if the master
unit is down. An I/O zone can be armed and disarmed from Security Desk as long as the
master unit is online.
An IP camera is a video encoder unit incorporating a
IPv4 is the first generation Internet protocol using a 32-bit address
IPv6 is a 128-bit Internet protocol that uses eight groups of four
hexadecimal digits for address space.
Keyhole Markup Language
Keyhole Markup Language (KML) is a file format used to display geographic
data in an Earth browser such as Google Earth and Google Maps.
Keyhole Markup Language (KML)
KiwiVision™ Camera Integrity Monitor
KiwiVision™ Camera Integrity Monitor is a Security Center module that ensures cameras are
operational at all times by performing regular checks of their video to detect whether
the cameras have been tampered with.
Privacy Protector™ is a Security Center module that ensures the privacy of
individuals recorded by video surveillance cameras while safeguarding potential
Law Enforcement is a Genetec
Patroller™ software installation that is configured
for law enforcement: the matching of license plate reads against lists of wanted license
plates (hotlists). The use of maps is optional.
layout is an entity that represents a snapshot of what is displayed in a
Monitoring task. Only the tile pattern and the tile contents
are saved, not the tile state.
A license key is the software key used to unlock the Security
Center software. The license key is specifically generated for each computer where the
Directory role is installed. To obtain your license key, you need the System ID
(which identifies your system) and the Validation key (which identifies your
A license plate inventory is a list of license plate
numbers of vehicles found in a parking facility within a given time period, showing
where each vehicle is parked (sector and row).
license plate read
A license plate read is a license plate number captured from
a video image using ALPR technology.
license plate recognition
Automatic license plate recognition (ALPR) is an image processing technology
used to read license plate numbers. ALPR converts license plate numbers cropped from
camera images into a database searchable format.
automatic license plate recognition (ALPR)
A live event is an event that Security Center receives when the event occurs.
Security Center processes live events in
real-time. Live events are displayed in the event list in Security
Desk and can be used to trigger
A live hit is a hit matched by the Genetec
Patroller™ and immediately sent to the Security Center over a wireless
A live read is a license plate captured by the patrol vehicle and
immediately sent to Security Center over a
Load balancing is the distribution of workload across multiple
Logical ID is a unique ID assigned to each entity in the system for
ease of reference. Logical IDs are only unique within a particular entity
Logons per Patroller
Logons is a type of investigation task that reports on the
logon records of a selected patrol vehicle.
Long term is a type of parking regulation characterizing an
overtime rule. The long term regulation uses the same principle as the same
position regulation, but the parking period starts on one calendar date and ends
on another calendar date. No more than one overtime rule can use the long term
regulation in the entire system.
The Long-Term Support (LTS) release track offers
customers an upgrade path that minimizes changes to software and extends access to
critical bug and security fixes. The LTS track includes major and patch versions. Minor
versions are excluded. Choosing the LTS track limits your access to new capabilities,
but increases stability due to less frequent code change and extends the maintenance
period by two years.
Long-Term Support (LTS)
The License Plate Management (LPM) protocol provides a
Sharp camera with a secure and reliable
connection to Security Center. When The LPM
protocol is enabled on a Sharp camera, the
protocol manages the camera’s connection to the ALPR Manager role.
An Automatic License Plate Recognition (ALPR) camera is a camera connected to an
ALPR unit that produces high resolution close-up images of license
An ALPR context is an ALPR optimization that improves license plate
recognition performance for license plates from a specific region (for example, New
York) or from a group of regions (for example, Northeast states).
The ALPR Manager role manages and controls the patrol vehicle
Patroller™), Sharp cameras, and parking zones. The ALPR Manager
stores the ALPR data (reads, hits, timestamps, GPS coordinates, and so on) collected by
ALPR rule is a method used by Security Center and AutoVu™ for
processing a license plate read. An ALPR rule can be a hit rule or a parking
The ALPR task is an administration task that
allows you to configure roles, units, hotlists, permits, and overtime rules for ALPR, and
related entities and settings.
An ALPR unit is a device that captures license plate numbers. An
ALPR unit typically includes a context camera and at least one ALPR
A macro is a type of entity that encapsulates a C# program that adds
custom functionalities to Security Center.
The main server is the only server in a Security Center
system hosting the Directory role. All other servers on the system must connect to the
main server to be part of the same system. In a high availability configuration where
multiple servers host the Directory role, it is the only server that can write to the
A major version is a software version that adds new
features, behavioral changes, SDK capabilities, support for new devices, and performance
improvements. Using backward compatibility mode, major versions are compatible with up
to three previous major versions. A license update is required to upgrade to a new major
version. A major version is indicated by a version number with zeros at the third and
fourth positions: X.Y.0.0.
For more information, see our Product Lifecycle
page on GTAP.
In computer security, man-in-the-middle (MITM) is a
form of attack where the attacker secretly relays and possibly alters the communication
between two parties who believe they are directly communicating with each
Manual capture is when license plate information is entered into
the system by the user and not by the ALPR.
A map in Security Center is a two-dimensional diagram that helps you
visualize the physical locations of your security equipment in a geographical area or a
The Map designer task is an
administration task that allows you to create and edit maps that represent the physical
locations of your equipment to Security
A map link is a map object that brings you to another map with a
The Map Manager is the central role that manages all mapping
resources in Security Center, including imported map files, external map providers, and
KML objects. It acts as the map server to all client applications that require
Map mode is a Security
Desk canvas operating mode that
replaces tiles and controls with a geographical map showing all active, georeferenced
events in your system. Switching to Map mode is a feature
of AutoVu™ and Genetec Mission
Control™, and requires a license for one
of these products.
Map objects are graphical representations of Security Center
entities or geographical features, such as cities, highways, rivers, and so on, on your
maps. With map objects, you can interact with your system without leaving your
A map preset is a saved map view. Every map has at least one
preset, called the default view, that is displayed when a user opens the
A map view is a defined section of a map.
Maps is a type of operation task that heightens your situational
awareness by providing the context of a map to your security monitoring and control
Master arm is arming an intrusion detection area in such a way that all sensors attributed to the area would set the alarm off if one of them is triggered.
Also known as: Away
master key stream
In fusion stream encryption, the master key
stream is the sequence of symmetric keys generated by the Archiver to encrypt one data
stream. The symmetric keys are randomly generated and change every minute. For security
reasons, the master key stream is never transmitted or stored anywhere as
The Max occupancy feature monitors the number of
people in an area, up to a configured limit. Once the limit is reached, the rule will
either deny access to additional cardholders (if set to Hard) or trigger events
while allowing further access (Soft) .
maximum session time
Setting a maximum session time helps to improve parking lot
occupancy statistics. When a vehicle exceeds the maximum session time, it is assumed
that the vehicle's plate was not read at the exit and the vehicle is no longer in the
parking zone. The parking session appears in reports generated from the
Parking sessions task with the State reason: Maximum session
The Media Gateway role is used by Genetec™ Mobile and Web
Client to get transcoded video from Security Center. The Media Gateway role supports the Real
Time Streaming Protocol (RTSP), which external applications can use to request raw video
streams from Security Center.
The Media Router is the central role that handles all stream
requests (audio and video) in Security Center. It establishes streaming sessions between
the stream source (camera or Archiver) and its requesters (client applications). Routing
decisions are based on the location (IP address) and the transmission capabilities of
all parties involved (source, destinations, networks, and servers).
A minor version is a software version that adds new
features, SDK capabilities, support for new devices, bug fixes, and security fixes.
Different system components can run at different minor versions, provided they share the
same major version. No license update is required to upgrade to a new minor version. A
minor version is indicated by a version number with a zero at the fourth position:
For more information, see our Product Lifecycle
page on GTAP.
A missing file is a video file that is still referenced by
an archive database, but cannot be accessed anymore. This situation occurs when video
files are deleted manually without using the Archive storage
details task, creating a mismatch between the number of video files
referenced in the database and the actual number of video files stored on
(Obsolete as of SC 5.8 GA) Mobile Admin is a web-based
administration tool used to configure the Mobile
A mobile credential is a credential on a smartphone that uses
Bluetooth or Near Field Communication (NFC) technology to access secured
Mobile Data Computer
Mobile Data Computer is a tablet computer or ruggedized laptop used
in patrol vehicles to run the Genetec
application. The MDC is typically equipped with a touch-screen with a minimum resolution
of 800 x 600 pixels and wireless networking capability.
Mobile Data Computer (MDC)
Mobile License Plate Inventory
Mobile License Plate Inventory (MLPI) is the Genetec
Patroller™ software installation that is configured
for collecting license plates and other vehicle information for creating and maintaining
a license plate inventory for a large parking area or parking garage.
Mobile License Plate Inventory (MLPI)
The Mobile Server role provides Security Center access on mobile
A monitor group is a type of entity used to designate analog
monitors for alarm display. Besides the monitor groups, the only other way to display
alarms in real time is to use the Alarm monitoring task in Security
Monitor ID is an ID used to uniquely identify a workstation screen
controlled by Security Desk.
The Monitoring task is a type of operation
task that you can use to monitor and respond to real-time events that relate to selected
entities. Using the Monitoring task, you can also monitor and
respond to alarms.
Motion detection is the feature that watches for changes in a
series of video images. The definition of what constitutes motion in a video can be
based on highly sophisticated criteria.
Motion search is a type of investigation task that searches for
motion detected in specific areas of a camera's field of view.
A motion zone is a user defined areas within a video image where
motion should be detected.
Move unit tool is used to move units from one manager role to
another. The move preserves all unit configurations and data. After the move, the new
manager immediately takes on the command and control function of the unit, while the old
manager continues to manage the unit data collected before the move.
If you use AutoVu™
Free-Flow to manage transient parking and
contract permit parking in parking zones, installing the AutoVu™
Free-Flow plugin allows you to manage parking
lots where parking spots are leased to tenants.
Multi-factor authentication (MFA) is a security system that requires
more than one method of authentication from independent categories of credentials to
verify the user’s identity for a login or other transaction.
Multi-Factor Authentication (MFA)
The network entity is used to capture the characteristics of the
networks used by your system so that proper stream routing decisions can be
Network address translation is the process of modifying
network address information in datagram (IP) packet headers while in transit across a
traffic routing device, for the purpose of remapping one IP address space into
The network view is a browser view that illustrates your network
environment by showing each server under the network they belong to.
The Network view task is an
administration task that allows you to configure your networks and
A new wanted is a manually entered hotlist item in Genetec
Patroller™. When you are looking for a plate that
does not appear in the hotlists loaded in the Genetec
Patroller™, you can enter the plate in order to raise
a hit if the plate is captured.
The notification tray contains icons that allow quick access
to certain system features, and also displays indicators for system events and status
information. The notification tray display settings are saved as part of your user
profile and apply to both Security Desk and Config Tool.
OCR equivalence is the interpretation of OCR (Optical Character
Recognition) equivalent characters performed during license plate recognition. OCR
equivalent characters are visually similar, depending on the plate’s font. For example,
the letter “O” and the number “0”, or the number “5” and the letter “S”. There are
several pre-defined OCR equivalent characters for different languages.
An offline event is an event that occurs while the event
source is offline. Security Center only receives
the offline events when the event source is back online.
Omnicast™ is the IP video management system
(VMS) that provides organizations of all sizes the ability to deploy a surveillance
system adapted to their needs. Supporting a wide range of IP cameras, it addresses the
growing demand for HD video and analytics, all the while protecting individual
Omnicast™ compatibility pack is the software component
that you need to install to make Security Center compatible with an Omnicast™ 4.x
The Omnicast™ Federation™ role connects an Omnicast™ 4.x
system to Security Center. That way, the Omnicast™ entities and events can be used in
your Security Center system.
An orphan file is a video file that is no longer referenced
by any archive database. Orphan files remain on the disk until they are manually
deleted. This situation occurs when the archive database is changed inadvertently,
creating a mismatch between the number of video files referenced in the database and the
actual number of video files stored on disk.
An output behavior is a type of entity that defines a custom
output signal format, such as a pulse with a delay and duration.
An overtime rule is a type of entity that defines a parking time limit and the maximum number of violations enforceable within a single day. Overtime rules are used in city and university parking enforcement. For university parking, an overtime rule also defines the parking area where these restrictions apply.
The paid time stage of a parking session begins when the convenience time expires. Vehicle owners can purchase parking time through a pay station or mobile app, and the payment system can be provided by integrated third-party parking permit providers.
Parking Enforcement Essential is a Genetec
Patroller™ software installation configuration that
is similar to the City Parking Enforcement configuration, but excludes features such as
shared permits, zone auto-selection, Plate link, and wheel imaging. You can configure
the system for either overtime enforcement or permit enforcement, but you cannot
configure both enforcement types.
A parking facility is a type of entity that defines a large
parking area as a number of sectors and rows for the purpose of inventory
A parking lot is a polygon that defines the location and shape of
a parking area on a map. By defining the number of parking spaces inside the parking
lot, Security Center can calculate its percentage of occupancy during a given time
A parking rule defines how and when a parking session is either
considered to be valid or in violation.
Free-Flow feature in Security Center uses parking sessions to track each vehicle's stay in a parking zone. A parking session is divided into four states: Valid (including convenience time, paid time, and grace period), Violation, Enforced, and Completed.
parking session states
A vehicle's parking session is divided into four states:
Valid (including convenience time, paid time, and grace period),
Violation, Enforced, and Completed. When a vehicle parks in a
parking zone, its parking session progresses through the parking session states based on
the timing that is configured for the parking rule, the validity of the paid time, and
whether the vehicle's parking session incurs a violation.
The Parking sessions task is a
type of investigation task that allows you to generate a list of vehicles that are
currently in violation. You can create a vehicle inventory report for the current
parking zone occupancy or for a specific time in the past based on the selected time
The parking zones that you define in Security Center represent off-street parking lots where the entrances and exits are monitored by Sharp cameras.
The Parking zone activities task is a type of investigation task
that allows you to track the parking zone-related events that occur between the time the
vehicle's plate is read at the entrance and at the exit of the parking zone.
parking zone capacity
The parking zone capacity is the maximum number of
vehicles that can be parked in a parking zone.
parking zone capacity threshold
The parking zone capacity threshold setting determines at what point a capacity threshold reached event is generated. For example, if you lower the threshold to 90%, the system generates an event when the parking zone reaches 90% capacity.
A partition is a type of entity that defines a set of entities that
are only visible to a specific group of users. For example, a partition could include
all areas, doors, cameras, and zones in one building.
(Obsolete) Beginning in Security Center 5.7 GA,
privileges that used to be exclusive to administrators can now be granted individually,
making the concept of partition administrator obsolete.
A patch version is a software version that adds support for
new devices, bug fixes, and security fixes. Patch versions do not affect system
compatibility, as long as all your system components are at the same major version. If
you are on the Long-Term Support (LTS) track, patch versions only include critical bug
and security fixes. A patch version is indicated by a version number where the fourth
position is not a zero.
For more information, see our Product Lifecycle
page on GTAP.
A patrol vehicle monitors parking lots and city streets
for parking violations or wanted vehicles. A patrol vehicle includes one or more
Sharp automatic license plate recognition
(ALPR) cameras and an in-vehicle computer running Genetec
A patroller entity in Security Center represents a patrol vehicle equipped
with an in-vehicle computer running Genetec
Patroller Config Tool
Patroller™ Config Tool is the Genetec
Patroller™ administrative application used to
configure Patroller-specific settings, such as adding Sharp cameras to the in-vehicle LAN, enabling
features such as Manual Capture or New Wanted, and specifying that a username and
password are needed to log on to Genetec
Patrol vehicle tracking
Patrol vehicle tracking is a type of investigation
task that allows you to replay the route followed by a patrol vehicle on a given date on
a map, or view the current location of patrol vehicles on a map.
People counting is a type of operation task that keeps count in
real-time of the number of cardholders in all secured areas of your
Perimeter arm is arming an intrusion detection area in such a way that only sensors attributed to the area perimeter set the alarm off if triggered. Other sensors, such as motion sensors inside the area, are ignored.
A permit is a type of entity that defines a single parking permit
holder list. Each permit holder is characterized by a category (permit zone), a license
plate number, a license issuing state, and optionally, a permit validity range
(effective date and expiry date). Permits are used in both city and university parking
A permit hit is a hit that is generated when a read (license plate
number) does not match any entry in a permit or when it matches an invalid
A permit restriction is a type of entity that applies
time restrictions to a series of parking permits for a given parking area. Permit
restrictions can be used by patrol vehicles configured for University Parking
Enforcement and for systems that use the AutoVu™
In cryptography, plaintext is the data that is not
Plan Manager is a module of Security Center that provides
interactive mapping functionality to better visualize your security
Plate Reader is the software component of the Sharp unit that processes the images captured by the
ALPR camera to produce license plate reads, and associates each license plate read with a
context image captured by the context camera. The Plate Reader also handles the
communications with the Genetec
Patroller™ and the ALPR
Manager. If an external wheel imaging camera is connected to the Sharp unit, the Plate Reader also captures wheel
images from this camera.
A plugin (in lowercase) is a software component that adds a
specific feature to an existing program. Depending on the context, plugin can refer
either to the software component itself or to the software package used to install the
A plugin role adds optional features to Security Center. A plugin role is created by using
the Plugin role template. By default, it is represented by an orange puzzle piece
in the Roles view of the System task.
Before you can create a plugin role, the software
package specific to that role must be installed on your system.
Plugin (with an uppercase, in singular) is the role
template that serves to create specific plugin roles.
The Plugins task is an administration
task that allows you to configure plugin-specific roles and related
Primary server is the default server chosen to perform a
specific function (or role) in the system. To increase the system's fault-tolerance, the
primary server can be protected by a secondary server on standby. When the primary
server becomes unavailable, the secondary server automatically takes
In Security Center, privacy protection is software that
anonymizes or masks parts of a video stream where movement is detected. The identity of
individuals or moving objects is protected, without obscuring movements and actions or
The Privacy Protector™ role requests original video
streams from Archiver roles and applies data anonymization to the original video
streams. The privacy-protected (anonymized) video stream is then sent back to the
Archiver role for recording.
private IP address
A private IP address is an IP address chosen from a
range of addresses that are only valid for use on a LAN. The ranges for a private IP
address are: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.16.255.255, and 192.168.0.0
to 192.168.255.255. Routers on the Internet are normally configured to discard any
traffic using private IP addresses.
In cryptography, a private or secret key is either an
encryption or decryption key known only to one of the parties that exchange secret
A private task is a saved task that is only visible to the
user who created it.
Privileges define what users can do, such as arming zones,
blocking cameras, and unlocking doors, over the part of the system they have access
The Privilege troubleshooter is a tool that
helps you investigate the allocation of user privileges in your Security Center system.
With this tool, you can
- Who has permission to work with a selected entity
- What privileges are granted to selected users or groups
- Who has been granted a privilege, has access to a specific entity, or both
In cryptography, a public key is a value provided by some
designated authority as an encryption key that, combined with a private key that is
generated at the same time, can be used to effectively encrypt messages and verify
public key encryption
Public key encryption, also known as
asymmetric encryption, is a type of encryption where two different keys
are used to encrypt and decrypt information. The private key is a key that is known only
to its owner, while the public key can be made known and available to other entities on
the network. What is encrypted with one key can only be decrypted with the other
public key infrastructure
A public key infrastructure (PKI) is a set of hardware, software,
people, policies, and procedures needed to support the distribution and identification
of public encryption keys. This enables users and computers to both securely exchange
data over networks such as the Internet and verify the identity of the other
public key infrastructure (PKI)
A public task is a saved task that can be shared and reused among multiple Security Center users.
A reader is a sensor that reads the credential for an access control
system. For example, this can be a card reader, or a biometrics scanner.
The read rate measures the speed at which a license plate
recognition system can correctly detect and read all of the characters in an image of a
Reads is a type of investigation task that reports on license plate
reads performed within a selected time range and geographic area.
Reads/hits per day
Reads/hits per day is a type of investigation task that
reports on license plate reads performed within a selected time range and geographic
Reads/hits per zone
Reads/hits per zone is a type of investigation task that reports on the number of reads and hits per parking area for a selected date range.
In identity terms, a realm is the set of applications,
URLs, domains, or sites for which a token is valid. Typically a realm is defined using
an Internet domain such as genetec.com, or a path within that domain, such as
genetec.com/support/GTAC. A realm is sometimes described as a security domain because it
encompasses all applications within a specified security boundary.
Recording mode is the criteria by which the Archiver schedules
the recording of video streams.
There are four possible recording modes:
- Off (no recording allowed)
- Manual (record only on user requests)
- Continuous (always record)
- On motion/manual (record according to motion detection settings or on user
Recording state is the current recording status of a given
camera. There are four possible recording states: Enabled, Disabled,
Currently recording (unlocked), and Currently recording
A redirector is a server assigned to host a redirector agent
created by the Media Router role.
A redirector agent is an agent created by the Media Router
role to redirect data streams from one IP endpoint to another.
Redundant archiving is an option that allows a copy of all
the video streams of an Archiver role to be archived simultaneously on the standby
server as a protection against data loss.
Remote is a type of operation task that allows you to remotely monitor
and control other Security Desks that are part of your system, using the Monitoring task
and the Alarm monitoring task.
The Remote configuration task
is an administration task that allows you to configure federated Security Center entities without logging off from
your local Config
Rendering rate is the comparison of how fast the workstation
renders a video with the speed the workstation receives that video from the
Report Manager is a type of role that automates report emailing
and printing based on schedules.
Report pane is one of the panes found in the Security Desk task
workspace. It displays query results or real-time events in a tabular
request to exit
Request to exit (REX) is a door release button normally located
on the inside of a secured area that when pressed, allows a person to exit the secured
area without having to show any credential. This can also be the signal from a motion
detector. It is also the signal received by the controller for a request to
request to exit (REX)
Restricted cameras are cameras that Genetec Inc. has identified as cybersecurity
Reverse geocoding is an AutoVu™ feature that translates
a pair of latitude and longitude into a readable street address.
The Reverse Tunnel role is used on the federated
system to connect to the Federation™ host residing in
the cloud. The connection is established using a keyfile generated from the cloud
system. The keyfile can only be used once to ensure maximum security.
Reverse tunneling is a technique used on servers
protected behind a firewall to avoid having to open inbound ports to receive requests
from clients found on the other side of the firewall. Instead of having the client
contact the server, the communication is reversed. The client generates a keyfile that
includes an identity certificate about itself that the server uses to contact the
client, hence, eliminating the need to open any inbound port on the
A role is a software component that performs a specific job within
Security Center. To execute a role, you must assign one or more servers to host
roles and units view
The roles and units view is a browser view that lists the
roles on your system with the units they control as child entities.
Route is a setting that configures the transmission capabilities between
two end points in a network for the purpose of routing media streams.
The Rules Engine is the component of the Genetec Mission
Control™ system that analyzes and correlates the events collected by Security Center,
based on predefined rules. The Rules Engine uses these events to detect and trigger
incidents in the Genetec Mission Control™ system.
Same position is a type of parking regulation characterizing an
overtime rule. A vehicle is in violation if it is seen parked at the exact same spot
over a specified period of time. Genetec
be equipped with GPS capability in order to enforce this type of
A schedule is a type of entity that defines a set of time constraints
that can be applied to a multitude of situations in the system. Each time constraint is
defined by a date coverage (daily, weekly, ordinal, or specific) and a time coverage
(all day, fixed range, daytime, and nighttime).
A scheduled task is a type of entity that defines an action that
executes automatically on a specific date and time, or according to a recurring
An SDK certificate allows an SDK application (or plugin)
to connect to Security Center. The certificate must be included in the Security Center
license key for the SDK application to work.
A secondary server is any alternate server on standby intended
to replace the primary server in the case the latter becomes
Also known as: standby
Secure Socket Layer
The Secure Sockets Layer (SSL) is a computer networking protocol
that manages server authentication, client authentication and encrypted communication
between servers and clients.
Secure Socket Layer (SSL)
A secured area is an area entity that represents a physical
location where access is controlled. A secured area consists of perimeter doors (doors
used to enter and exit the area) and access restrictions (rules governing the access to
is a truly unified platform that blends IP video surveillance, access control, license
plate recognition, intrusion detection, and communications within one intuitive and
modular solution. By taking advantage of a unified approach to security, your
organization becomes more efficient, makes better decisions, and responds to situations
and threats with greater confidence.
The Security Center Federation™ role connects a
remote, independent Security Center system to your local Security Center. That way, the
remote system's entities and events can be used in your local system.
Security Center Mobile
(Obsolete) See Mobile Server and Genetec™ Mobile.
Security Center Mobile application
(Obsolete) See Genetec™ Mobile.
Security Center SaaS
The Security Center SaaS edition is Security Center offered by subscription.
Subscription-based ownership simplifies the transition to cloud services and provides an
alternative way to purchase, deploy, and maintain the Genetec™
Security Center unified
Security Center Web
(Deprecated) See Web Server and Web
A security clearance is a numerical value used to further
restrict the access to an area when a threat level is in effect. Cardholders can only
enter an area if their security clearance is equal or higher than the minimum security
clearance set on the area.
is the unified user interface of Security Center. It provides consistent operator flow across all of the Security Center main systems, Omnicast™, Synergis™, and AutoVu™. The unique task-based design of Security
Desk lets operators efficiently
control and monitor multiple security and public safety applications.
An on-the-wire representation of claims that is
cryptographically signed by the issuer of the claims, providing strong proof to any
relying party as to the integrity of the claims and the identity of the issuer.
security token service
Security token service (STS) is a claims provider implemented as a
web service that issues security tokens. Active Directory Federation Services (ADFS) is
an example of a security token service. Also known as an issuer.
security token service (STS)
The Security video
analytics task is an investigation task in Security
Desk that is used to generate reports
on video analytics events that are triggered based on analytics
A self-signed certificate is an identity
certificate that is signed by the same entity whose identity it
A server is a type of entity that represents a server machine on which
the Genetec™ Server service is
The server mode is a special online operation mode restricted
to Synergis™ units, in which the unit allows the Access Manager (the server) to make all
access control decisions. The unit must stay connected to the Access Manager at all
times to operate in this mode.
Server Admin is the web application running on every server
machine in Security Center that allows you to configure the settings of Genetec Server.
Server Admin also allows you to configure the Directory role on the main
A sharing guest is a Security Center system that has been
given the rights to view and modify entities owned by another Security Center system,
called the sharing host. Sharing is done by placing the entities in a global
Sharing host is a Security Center system that gives the
right to other Security Center systems to view and modify its entities by putting them
up for sharing in a global partition.
Sharp EX is the Sharp unit that includes an integrated image processor
and supports two standard definition NTSC or PAL inputs for external cameras (ALPR and
Sharp Portal is a web-based administration tool used to
configure Sharp cameras for AutoVu™ systems. From a web browser, you log on to a specific IP
address (or the Sharp name in certain cases) that corresponds to the Sharp you want to
configure. When you log on, you can configure options such as selecting the ALPR context (for
example, Alabama, Oregon, Quebec), selecting the read strategy (for example, fast moving or
slow moving vehicles), viewing the Sharp’s live video feed, and more.
The Sharp unit is a proprietary ALPR unit of Genetec Inc. that
integrates license plate capturing and processing components, as well as digital video
processing functions, inside a ruggedized casing.
Sharp VGA is a Sharp unit that integrates the following components:
an infrared illuminator; a standard definition (640 x 480) ALPR camera for plate capture;
an integrated image processor; an NTSC or PAL color context camera with video streaming
Sharp XGA is a Sharp unit that integrates the following components:
an infrared illuminator; a high-definition (1024 x 768) ALPR camera for plate capture; an
integrated image processor; an NTSC or PAL color context camera with video streaming
capabilities and optional internal GPS.
SharpOS is the
software component of a Sharp unit. SharpOS is responsible for everything related to plate
capture, collection, processing, and analytics. For example, a SharpOS update can include new ALPR contexts, new
Portal updates, and updates to
the Sharp's Windows services (Plate Reader, HAL, and so on).
SharpV is a Sharp unit that is specialized for fixed installations and is ideally suited for a range of applications, from managing off-street parking lots and facilities to covering major city access points to detect wanted vehicles. SharpV combines two high-definition cameras (1.2MP) with onboard processing and illumination in a ruggedized, environmentally sealed unit. Both lenses are varifocal for ease of installation and the camera is powered via PoE+.
SharpX is the camera component of the SharpX system. The SharpX
camera unit integrates a pulsed LED illuminator that works in total darkness (0 lux), a
monochrome ALPR camera (1024 x 946 @ 30 fps), and a color context camera (640 x 480 @ 30
fps). The ALPR data captured by the SharpX camera unit is processed by a separate
hardware component called the AutoVu™ ALPR Processing
SharpX VGA is the camera component of the SharpX system. The
SharpX VGA camera unit integrates a pulsed LED illuminator that works in total darkness
(0 lux), a monochrome ALPR camera (640 x 480 @ 30 fps), and a color context camera (640 x
480 @ 30 fps). The ALPR data captured by the SharpX VGA camera unit is processed by a
separate hardware component called the AutoVu™ ALPR Processing
Single sign-on (SSO) is the use of a single user
authentication for multiple IT systems or even organizations.
single sign-on (SSO)
Software Development Kit
The Software Development Kit (SDK) allows end-users to develop custom
applications or custom application extensions for Security Center.
Software Development Kit (SDK)
Standalone mode is an operation mode where the interface
module makes autonomous decisions based on the access control settings previously
downloaded from the Synergis™ unit. When the module is online, activity reporting occurs
live. When the module is offline, activity reporting occurs on schedule, or when the
connection to the unit is available. Not all interface modules can operate in standalone
A standard schedule is a type of schedule entity that may be
used in all situations. Its only limitation is that it does not support daytime or
In a system that uses the Pay-by-Plate
Sync plugin, a static permit holds a list of
vehicle license plates that is not updated by a third-party permit provider. For
example, a list of employee vehicles that are authorized to park in the lot are manually
maintained as a static list.
A strict antipassback is an antipassback option. When
enabled, a passback event is generated when a cardholder attempts to leave an area that
they were never granted access to. When disabled, Security Center only generates
passback events for cardholders entering an area that they never exited.
Supervised mode is an online operation mode of the
interface module where the interface module makes decisions based on the access control
settings previously downloaded from the Synergis™ unit. The interface module reports its
activities in real time to the unit, and allows the unit to override a decision if it
contradicts the current settings in the unit. Not all interface modules can operate in
A Streamvault™ is a turnkey appliance that comes with an
embedded operating system and Security Center
pre-installed. You can use Streamvault™ appliances to quickly deploy a unified or
standalone video surveillance and access control system.
The SV-16 is a
subcompact all-in-one appliance that comes with Microsoft Windows, Security Center, and the SV
Control Panel pre-installed. The SV-16 is for small-scale, single server
installations, and can support both cameras and access control readers.
The SV-32 is a
compact all-in-one appliance that comes with Microsoft Windows, Security Center, and the SV
Control Panel pre-installed. With built-in
analog encoder capture cards, the SV-32 is
a turnkey appliance that enables you to quickly deploy a standalone system (video
surveillance or access control) or unified system (video surveillance and access
SV Control Panel
Control Panel is a user interface application
that you can use to configure your SV appliance to work with Security Center access control and video
The SV-PRO is a
rackmount appliance that comes with Microsoft Windows, Security Center, and the SV
Control Panel pre-installed. The SV-PRO is for small to mid-scale, single or
multiple server installations, and can support both cameras and access control
Symmetric encryption is a type of encryption where
the same key is used for both encryption and decryption.
A synchronous video is a simultaneous live video or playback
video from more than one camera that are synchronized in time.
Synergis™ is the IP access control system (ACS)
that heightens your organization’s physical security and increases your readiness to
respond to threats. Supporting an ever-growing portfolio of third-party door control
hardware and electronic locks, it allows you to leverage your existing investment in
network and security equipment.
appliance is an IP-ready security appliance manufactured by Genetec Inc. that is dedicated to access control
functions. All Synergis™ appliances come
pre-installed with Synergis™
Softwire and are enrolled as
access control units in Security Center.
Synergis™ Appliance Portal
Synergis™ Appliance Portal is
the web-based administration tool used to configure and administer the Synergis™
appliance, as well as upgrade its firmware.
Synergis™ Cloud Link
Synergis™ Cloud Link is an intelligent and PoE-enabled
access control appliance of Genetec Inc. that supports a variety of third-party
interface modules over IP and RS-485. Synergis™ Cloud Link is seamlessly integrated with
Security Center and is capable of making access control decisions independently of the
Synergis™ IX (pronounced
"eye-ex") is a family of hybrid controllers and downstream modules used to manage both
access control points and intrusion points. The Synergis™ IX product line is only available to the Australian
and New Zealand markets.
Synergis™ Master Controller
Synergis™ Master Controller (SMC) is an access control appliance of
Genetec Inc. that supports a variety of third-party interface modules over IP and
RS-485. SMC is seamlessly integrated with Security Center and is capable of making
access control decisions independently of the Access Manager.
Synergis™ Master Controller (SMC)
Softwire is the
access control software developed by Genetec Inc. to run on a variety of IP-ready
security appliances. Synergis™
Softwire lets these appliances
communicate with third-party interface modules. A security appliance running Synergis™
Softwire is enrolled as an access control unit in
A Synergis™ unit is a Synergis™ appliance that is
enrolled as an access control unit in Security Center.
System Availability Monitor
System Availability Monitor (SAM) enables you to collect health
information and view the health status of your Security Center systems so that you can
prevent and proactively resolve technical issues.
System Availability Monitor (SAM)
System Availability Monitor Agent
The System Availability Monitor Agent (SAMA) is the component
of SAM that is installed on every Security Center main server. SAMA collects health information from Security Center and sends health information to the
Health Monitoring Services in the cloud.
System Availability Monitor Agent (SAMA)
The System task is an administration
task that allows you to configure roles, macros, schedules, and other system entities
A system event is a predefined event that indicates the occurrence
of an activity or incident. System events are defined by the system and cannot be
renamed or deleted.
System status is a type of maintenance task that monitors the
status of all entities of a given type in real time, and allows you to interact with
A task is the central concept on which the entire Security Center user
interface is built. Each task corresponds to one aspect of your work as a security
professional. For example, use a monitoring task to monitor system events in real-time,
use an investigation task to discover suspicious activity patterns, or use an
administration task to configure your system. All tasks can be customized and multiple
tasks can be carried out
A taskbar is a user interface element of the Security Center client
application window, composed of the Home tab and the active task list. The taskbar can
be configured to appear on any edge of the application window.
A task cycling is a Security Desk feature that automatically
cycles through all tasks in the active task list following a fixed dwell
A task workspace is an area in the Security Center client
application window reserved for the current task. The workspace is typically divided
into the following panes: canvas, report pane, controls, and area view.
temporary access rule
A temporary access rule is an access rule that has
an activation and an expiration time. Temporary access rules are suited for situations
where permanent cardholders need to have temporary or seasonal access to restricted
areas. These access rules are automatically deleted seven days after they expire to
avoid cluttering the system.
Third-party authentication uses a trusted,
external identity provider to validate user credentials before granting access to one or
more IT systems. The authentication process returns identifying information, such as a
username and group membership, that is used to authorize or deny the requested
Threat level is an emergency handling procedure that a Security
Desk operator can enact on one area or the entire system to deal promptly with a
potentially dangerous situation, such as a fire or a shooting.
A tile is an individual window within the canvas, used to display a
single entity. The entity displayed is typically the video from a camera, a map, or
anything of a graphical nature. The look and feel of the tile depends on the displayed
The tile ID is the number displayed at the upper left corner of the
tile. This number uniquely identifies each tile within the canvas.
Tile mode is the main Security
Desk canvas operating mode that
presents information in separate tiles.
The tile pattern is the arrangement of tiles within the
A tile plugin is a software component that runs inside a
Desk tile. By default, it is
represented by a green puzzle piece in the area view.
Time and attendance
Time and attendance is a type of investigation task that
reports on who has been inside a selected area and the total duration of their stay
within a given time range.
Timed antipassback is an antipassback option. When
Security Center considers a cardholder to be already in an area, a passback event is
generated when the cardholder attempts to access the same area again during the time
delay defined by Presence timeout. When the time delay has expired, the
cardholder can once again pass into the area without generating a passback
A timeline is a graphic illustration of a video sequence, showing
where in time, motion, and bookmarks are found. Thumbnails can also be added to the
timeline to help the user select the segment of interest.
A transfer group is a persistent archive transfer scenario
that lets you run a video transfer without redefining the transfer settings. These
transfers can be scheduled or executed on demand. Transfer groups define which cameras
or archiving roles are included in the transfer, when the archives are transferred, what
data is transferred, and so on.
Transient parking is a parking scenario where the driver must
purchase parking time as soon as the vehicle enters the parking lot.
Transmission Control Protocol
A connection-oriented set of rules (protocol) that, along with the
IP (Internet Protocol), is used to send data over an IP network. The TCP/IP protocol
defines how data can be transmitted in a secure manner between networks. TCP/IP is the
most widely used communications standard and is the basis for the Internet.
Transmission Control Protocol (TCP)
Transport Layer Security
Transport Layer Security (TLS) is a protocol that provides
communications privacy and data integrity between two applications communicating over a
network. When a server and client communicate, TLS ensures that no third party may
eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer
Transport Layer Security (TLS)
A twilight schedule is a type of schedule entity that
supports both daytime and nighttime coverages. A twilight schedule cannot be used in all
situations. Its primary function is to control video related behaviors.
The two-person rule is the access restriction placed on a door
that requires two cardholders (including visitors) to present their credentials within a
certain delay of each other in order to gain access.
A unit is a hardware device that communicates over an IP network that can
be directly controlled by a Security Center role.
We distinguish four types of
units in Security Center:
- Access control units, managed by the Access Manager role
- Video units, managed by the Archiver role
- ALPR units, managed by the ALPR Manager role
- Intrusion detection units, managed by the Intrusion Manager role
The Unit Assistant is the central role that manages
system-wide operations on video units.
Unit discovery tool
Starting with Security Center 5.4 GA the Unit discovery tool has
been replaced by the Unit enrollment tool.
Unit enrollment tool
The Unit enrollment tool allows you to discover IP
units (video and access control) connected to your network, based on their manufacturer,
and network properties (discovery port, IP address range, password, and so on). Once
discovered, the units can be added to your system.
Unit replacement is a tool that is used to replace a failed
hardware device with a compatible one, while ensuring that the data associated to the
old unit gets transferred to the new one. For an access control unit, the configuration
of the old unit is copied to the new unit. For a video unit, the video archive
associated to the old unit is now associated to the new unit, but the unit configuration
is not copied.
Unit synchronization is the process of downloading
the latest Security Center settings to an access control unit. These settings, such as
access rules, cardholders, credentials, unlock schedules, and so on, are required so
that the unit can make accurate and autonomous decisions in the absence of the Access
University Parking Enforcement is a Genetec
Patroller™ software installation that is configured
for university parking enforcement: the enforcement of scheduled parking permits or
overtime restrictions. The use of maps is mandatory. Hotlist functionality is also
An unlock schedule defines the periods of time when free access
is granted through an access point (door side or elevator floor).
A unreconciled read is a MLPI license plate read that has not
been committed to an
A user is a type of entity that identifies a person who uses Security
Center applications and defines the rights and privileges that person has on the system.
Users can be created manually or imported from an Active Directory.
A user group is a type of entity that defines a group of users who
share common properties and privileges. By becoming member of a group, a user
automatically inherits all the properties of the group. A user can be a member of
multiple user groups. User groups can also be nested.
A user level is a numeric value assigned to users to restrict their ability to perform certain operations, such as controlling a camera PTZ, viewing the video feed from a camera, or staying logged on when a threat level is set. Level 1 is the highest user level, with the most privileges.
The User management task is an
administration task that allows you to configure users, user groups, and
A validation key is a serial number uniquely identifying a
computer that must be provided to obtain the license key.
Vault is a tool that displays your saved snapshots and exported G64,
G64x, and GEK (encrypted) video files. From the Vault, you can view the video files,
encrypt and decrypt files, convert files to ASF, or package files with the Genetec Video
vehicle identification number
A vehicle identification number (VIN) is an identification number that a
manufacturer assigns to vehicles. This is usually visible from outside the vehicle as a
small plate on the dashboard. A VIN can be included as additional information with
license plate entries in a hotlist or permit list, to further validate a hit and ensure
that it is the correct vehicle.
vehicle identification number (VIN)
Video analytics is the software technology that is used
to analyze video for specific information about its content. Examples of video analytics
include counting the number of people crossing a line, detection of unattended objects,
or the direction of people walking or running.
A video archive is a collection of video, audio, and
metadata streams managed by an Archiver or Auxilliary Archiver role. These collections
are catalogued in the archive database that includes camera events linked to the
A video decoder is a device that converts a digital video stream
into analog signals (NTSC or PAL) for display on an analog monitor. The video decoder is
one of the many devices found on a video decoding unit.
A video encoder is a device that converts an analog video source
to a digital format, by using a standard compression algorithm, such as H.264, MPEG-4,
MPEG-2, or M-JPEG. The video encoder is one of the many devices found on a video
A video file is a file created by an archiving role (Archiver or
Auxiliary Archiver) to store archived video. The file extension is G64 or G64x. You need
Security Desk or the Genetec Video Player to view video files.
Video file explorer
Video file explorer is a type of investigation task that
browses through your file system for video files (G64 and G64x) and allows you to play,
convert to ASF, and verify the authenticity of these files.
Video can be protected against deletion. Protection is applied
on all video files needed to store the protected video sequence. Because no video file
can be partially protected, the actual length of the protected video sequence depends on
the granularity of the video files.
A video sequence is any recorded video stream of a certain
A video stream is an entity representing a specific video
quality configuration (data format, image resolution, bit rate, frame rate, and so on)
on a camera.
The Video task is an administration task
that allows you to configure video management roles, units, analog monitors, and
A video unit is a type of video encoding or decoding device that is capable of communicating over an IP network and can incorporate one or more video encoders. The high-end encoding models also include their own recording and video analytic capabilities. Cameras (IP or analog), video encoders, and video decoders are all examples of video units. In Security Center, a video unit refers to a type of entity that represents a video encoding or decoding device.
Video watermarking adds visible text to live, playback,
and exported video processed by Security Center. This text includes identifying information
that is intended to deter unauthorized users from leaking video recordings.
Beginning in Security Center 184.108.40.206, video watermarking no longer refers to the use of
digital signatures for tampering protection. Tampering protection is now called digital
A virtual zone is a zone entity where the I/O linking is done by
software. The input and output devices can belong to different units of different types.
A virtual zone is controlled by the Zone Manager and only works when all the units are
online. It can be armed and disarmed from Security Desk.
Visit details is a type of investigation task that reports on the
stay (check-in and check-out time) of current and past visitors.
Visitor activities is a type of investigation task that
reports on visitor activities (access denied, first person in, last person out,
antipassback violation, and so on).
visitor escort rule
The visitor escort rule is the additional access
restriction placed on a secured area that requires visitors to be escorted by a
cardholder during their stay. Visitors who have a host are not granted access through
access points until both they and their assigned host (cardholder) present their
credentials within a certain delay.
Visitor management is a type of operation task that allows
you to check in, check out, and modify visitors, as well as manage their credentials,
including temporary replacement cards.
Visual reporting is dynamic charts or graphs in Security Desk
that deliver insights that you act on. You can perform searches and investigate
situations using these visual and user-friendly reports. The visual report data can be
analyzed to help identify activity patterns and enhance your
Visual tracking is a Security Center feature that lets you follow an individual in
live or playback mode through areas of your facility that are monitored by
The VSIP port is the name given to the discovery port of Verint
units. A given Archiver can be configured to listen to multiple VSIP
Watchdog is a Security Center service installed alongside the Genetec
Server service on every server computer. The watchdog monitors the Genetec Server
service, and restarts it if abnormal conditions are
Wearable Camera Manager
Wearable Camera Manager role is used to configure
and manage body-worn camera (BWC) devices in Security Center, including configuring camera stations,
adding officers (wearable camera users), uploading content to an Archiver, and setting the
retention period for uploaded evidence.
Web-based authentication (also known as passive
authentication) is when the client application redirects the user to a web form managed by a
trusted identity provider. The identity provider can request any number of credentials
(passwords, security tokens, biometric verifications, and so on) to create a multi-layer
defense against unauthorized access. This is also known as multi-factor
The Web-based SDK role exposes the Security Center SDK methods and
objects as web services to support cross-platform development.
Client is the web application that
gives users remote access to Security Center so
that they can monitor videos, investigate events related to various system entities,
search for and investigate alarms, and manage cardholders, visitors, and credentials.
Users can log on to Web Client from any computer that has a supported web browser
The Web Server role is used to configure Security Center
Client, a web application that gives
users remote access to Security Center. Each
role created defines a unique web address (URL) that users enter in their web browser to
log on to Web Client and access information from Security Center.
Web Map Service
Web Map Service (WMS) is a standard protocol for serving georeferenced map
images over the Internet that are generated by a map server using data from a GIS
Web Map Service (WMS)
Wheel imaging is a virtual tire-chalking technology that takes
images of the wheels of vehicles to prove whether they have moved between two license
A whitelist is a hotlist that is created for the purpose of
granting a group of license plates access to a parking lot. A whitelist can be compared
to an access rule where the secured area is the parking lot. Instead of listing the
cardholders, the whitelist applies to license plate credentials.
A widget is a component of the graphical user interface (GUI) with
which the user interacts.
Windows Communication Foundation
Windows Communication Foundation (WCF) is a communication
architecture used to enable applications, in one machine or across multiple machines
connected by a network, to communicate. Genetec
Patroller™ uses WCF to communicate wirelessly with Security Center.
Windows Communication Foundation (WCF)
Identity verification, asymmetric cryptography and the
security of data in transit are all enabled by X.509 certificates, which are made up of
a user or computer’s identity and public key. X.509 certificates are the basis for the
A zone is a type of entity that monitors a set of inputs and triggers
events based on their combined states. These events can be used to control output
Zone activities is a type of investigation task that reports on
zone related activities (zone armed, zone disarmed, lock released, lock secured, and so
Zone Manager is a type of role that manages virtual zones and
triggers events or output relays based on the inputs configured for each zone. It also
logs the zone events in a database for zone activity
Zone occupancy is a type of investigation task that reports on the number of vehicles parked in a selected parking area, and the percentage of occupancy.