The Access control task is an
administration task that you can use to configure access control roles, units, access
rules, cardholders, credentials, and related entities and settings.
Access control health history
The Access control health
history task is a maintenance task that reports on events related to the
health of access control entities. Unlike the events in the Health
history report, the events in the Access control health
history report are not generated by the Health Monitor role, identified
by an event number, or categorized by severity.
access control unit
An access control unit entity represents an intelligent
access control device, such as a Synergis™
appliance or an HID network controller, that communicates directly with the Access
Manager over an IP network. An access control unit operates autonomously when it is
disconnected from the Access Manager.
Also known as: door
Access control unit events
The Access control unit events
task is a maintenance task that reports on events pertaining to selected access control
The Access Manager role manages and monitors access
control units on the system.
An access point is any entry (or exit) point to a physical
area where access can be monitored and governed by access rules. An access point is
typically a door side.
An access right is the basic right users must have over any
part of the system before they can do anything with it. Other rights, such as viewing
and modifying entity configurations, are granted through privileges. In the context of a Synergis™ system, an access right is
the right granted to a cardholder to pass through an access point at a given date and
An access rule entity defines a list of cardholders to whom
access is either granted or denied based on a schedule. Access rules can be applied to
secured areas and doors for entries and exits, or to intrusion detection areas for
arming and disarming.
Access rule configuration
The Access rule configuration
task is a maintenance task that reports on entities and access points affected by a
given access rule.
Access troubleshooter is a tool that helps you
detect and diagnose access configuration problems.
With this tool, you can find out
about the following:
- Who is allowed to pass through an access point at a given date and time
- Which access points a cardholder is allowed to use at a given date and time
- Why a given cardholder can or cannot use an access point at a given date and
An action is a user-programmable function that can be triggered as an
automatic response to an event, such as door held open for too long or object left
unattended, or that can be executed according to a specific time table.
An active alarm is an alarm that has not yet been
Active authentication is when the client
application captures the user credentials and sends them through a secure channel to a
trusted identity provider for authentication.
Active Directory is a directory service created by
Microsoft, and a type of role that imports users and cardholders from an Active
Directory and keeps them synchronized.
Active Directory (AD)
An add-on is a software package that adds tasks, tools, or
specific configuration settings to Security Center systems.
Active Directory Federation Services
Active Directory Federation Services (ADFS) is a component of the
Microsoft® Windows® operating system that issues and transforms claims, and implements
Active Directory Federation Services (ADFS)
The Activity trails task is a
maintenance task that reports on the user activity related to video, access control, and ALPR
functionality. This task can provide information such as who played back which video
recordings, who used the Hotlist and permit editor, who enabled hotlist filtering, and much
Advanced Systems Format
The Advanced Systems Format (ASF) is a video streaming format from
Microsoft. The ASF format can only be played in media players that support this format,
such as Windows Media Player.
Advanced Systems Format (ASF)
An agent is a subprocess created by a Security Center role to run
simultaneously on multiple servers for the purpose of sharing its load.
An alarm entity describes a particular type of trouble situation
that requires immediate attention and how it can be handled in Security Center. For example, an alarm can indicate
which entities (usually cameras and doors) best describe the situation, who must be
notified, how it must be displayed to the user, and so on.
An alarm acknowledgement is a user's response to an
alarm. In Security Center, the default and the
alternative acknowledgement are the two variants of alarm acknowledgements. Each variant
is associated to a different event so that specific actions can be programmed
based on the alarm response selected by the user.
The Alarm monitoring task is an
operation task that you can use to monitor and respond to alarms (acknowledge, forward,
snooze, and so on) in real time, and to review past alarms.
The Alarm report task is an
investigation task that you can use to search and view current and past
The Alarms task is an administration
task that you can use to configure alarms and monitor groups.
The ALPR task is an administration task
that you can use to configure roles, units, hotlists, permits, and overtime rules for
ALPR, and related entities and settings.
An Automatic License Plate Recognition (ALPR) camera is a camera connected to an
ALPR unit that produces high resolution close-up images of license
An ALPR context is an ALPR optimization that improves license plate
recognition performance for license plates from a specific region (for example, New
York) or from a group of regions (for example, Northeast states).
ALPR Frequency Monitor
The Stakeout - ALPR Frequency Monitor plugin tracks
how often vehicles are detected by fixed Sharp
cameras. The system can alert Security
Desk users if vehicles without whitelisted license plates have exceed the configured
The ALPR Manager role manages and controls the patrol vehicle
Patroller™), Sharp cameras, and parking zones. The ALPR Manager
stores the ALPR data (reads, hits, timestamps, GPS coordinates, and so on) collected by
ALPR rule is a method used by Security Center and AutoVu™ for
processing a license plate read. An ALPR rule can be a hit rule or a parking
An ALPR unit is a device that captures license plate numbers. An
ALPR unit typically includes a context camera and at least one ALPR
An analog monitor entity represents a monitor that
displays video from an analog source, such as a video decoder or an analog camera. This term
is used in Security Center to refer to monitors that
are not controlled by a computer.
Antipassback is an access restriction placed on a secured
area that prevents a cardholder from entering an area that they have not yet exited
from, and vice versa.
An architecture version is a software version that
introduces significant changes to the architecture or user experience of the platform.
Architecture upgrades require changes to system design and configuration settings, data
migration, and retraining of users. Architecture versions are not compatible with
previous versions. A license update is required to upgrade to a new architecture
version. An architecture version is indicated by a version number with zeros at the
second, third and fourth positions: X.0.0.0.
For more information, see our Product Lifecycle
page on GTAP.
The Archiver role is responsible for the discovery, status
polling, and control of video units. The Archiver also manages the video archive and
performs motion detection if it is not done on the unit itself.
The Archiver events task is a
maintenance task that reports on events pertaining to selected Archiver
Archiver statistics is a maintenance task that
reports on the operation statistics (number of archiving cameras, storage usage,
bandwidth usage, and so on) of the selected archiving roles (Archiver and Auxiliary
Archiver) in your system.
The Archives task is an investigation task
that you can use to find and view video archives by camera and time
The Archive storage details
task is a maintenance task that reports on the video files (file name, start and end time,
file size, protection status, and so on) used to store video archive. Using this task, you can
also change the protection status of these video files.
(Obsolete as of Security Center 5.8 GA) The Archive
transfer task is an administration task that allows you to configure settings for
retrieving recordings from a video unit, duplicating archives from one Archiver to another, or
backing up archives to a specific location. Starting from Security Center 5.8 GA, Archive transfer
is a page inside the Video administration task.
Archive transfer is the process of transferring your video
data from one location to another. The video is recorded and stored on the video unit
itself or on an Archiver storage disk, and then the recordings are transferred to
An archiving role is an instance of either the Archiver
role or Auxiliary Archiver role.
In Security Center, an area
entity represents a concept or a physical location (room, floor, building, site, and so
on) used for grouping other entities in the system.
The Area activities task is an
investigation task that reports on access control events pertaining to selected
The Area presence is and investigation
task that provides a snapshot of all cardholders and visitors currently present in a
The Area view task is an
administration task that you can use to configure areas, doors, cameras, tile plugins,
intrusion detection areas, zones, and other entities found in the area
The area view is a view that organizes the commonly used entities
such as doors, cameras, tile plugins, intrusion detection areas, zones, and so on, by
areas. This view is primarily created for the day to day work of the security
An armed tile is a tile in Security
Desk that displays new
alarms that are triggered. In the Alarm monitoring task all tiles
are armed, while in the Monitoring task, tiles must be armed by a
An asset entity represents any valuable object with an RFID tag
attached, thus allowing it to be tracked by an asset management
See "public-key encryption".
Asynchronous video is simultaneous playback video from
more than one camera that are not synchronized in time.
An audio decoder is a device or software that decodes compressed
audio streams for playback. Synonym of speaker.
An audio encoder is a device or software that encodes audio
streams using a compression algorithm. Synonym of microphone.
The Audit trails task is a maintenance
task that reports on the configuration changes of the selected entities in the system.
The report also indicates the user who made the changes.
The process of verifying that an entity is what it claims
to be. The entity could be a user, a server, or a client application.
The process of establishing the rights an entity has over
the features and resources of a system.
An authorized user is a user who can see (has the right to
access) the entities contained in a partition. Users can only exercise their privileges
on entities they can see.
Automatic enrollment is when new IP units on a network are
automatically discovered by and added to Security Center. The role that is responsible
for the units broadcasts a discovery request on a specific port, and the units
listening on that port respond with a message that contains the connection information
about themselves. The role then uses the information to configure the connection to the
unit and enable communication.
automatic license plate recognition
Automatic license plate recognition (ALPR) is an image processing
technology used to read license plate numbers. ALPR converts license plate numbers
cropped from camera images into a database searchable format.
automatic license plate recognition (ALPR)
The Authentication Service role connects Security Center to an external identity provider for
Instances of the Authentication Service role are
protocol-specific. One of the following protocols is selected at role creation:
- WS-Trust or WS-Federation
Multiple Authentication Service roles can be created, but each must monitor a unique
list of domains.
The AutoVu™ automatic
license plate recognition (ALPR) system automates license plate reading and
identification, making it easier for law enforcement and for municipal and commercial
organizations to locate vehicles of interest and enforce parking restrictions. Designed
for both fixed and mobile installations, the AutoVu™ system is ideal for a variety of applications
and entities, including law enforcement, municipal, and commercial
AutoVu™ third-party data exporter
The AutoVu™ third-party data exporter is a feature that
uses either an HTTPS or a SFTP connection protocol to securely export ALPR events, for
example reads and hits, to external endpoints.
AutoVu™ ALPR Processing Unit
ALPR Processing Unit is the processing component of the SharpX system. The ALPR Processing Unit is available
with two or four camera ports, with one dedicated processor per camera (if using
SharpX) or per two cameras (if using
SharpX VGA). This ensures maximum,
per-camera, processing performance. The ALPR Processing Unit is sometimes referred to as
the trunk unit because it is typically installed in a vehicle's
Also known as: trunk
AutoVu™ Managed Services
With AutoVu™ Managed
Services (AMS), your automatic license plate recognition (ALPR) system is hosted in the
cloud and experts from Genetec Inc. configure
and maintain it. This reduces the need for on-site IT infrastructure and support.
AutoVu™ Managed Services
The Auxiliary Archiver role supplements the video
archive produced by the Archiver role. Unlike the Archiver role, the Auxiliary Archiver role
is not bound to any particular discovery port, therefore, it can archive any camera in
the system, including cameras federated from other Security Center systems. The Auxiliary Archiver role cannot
operate independently; it requires the Archiver role to communicate with video
The Badge designer is the tool that you can use to design
and modify badge templates.
A badge template is an entity used to configure a printing
template for badges.
block face (2 sides)
A block face (2 sides) is a parking regulation
characterizing an overtime rule. A block face is the length of a street between two
intersections. A vehicle is in violation if it is seen parked within the same block over a
specified period of time. Moving the vehicle from one side of the street to the other does not
make a difference.
A body-worn camera (BWC), also
known as a wearable camera, is a video recording system that is typically used by law
enforcement to record their interactions with the public or gather video evidence at
A bookmark is an indicator of an event or incident that is used
to mark a specific point in time in a recorded video sequence. A bookmark also contains a
short text description that can be used to search for and review the video sequences at a
The Bookmarks task is an investigation
task that searches for bookmarks related to selected cameras within a specified time
The breakout box is the proprietary connector box of Genetec Inc. for AutoVu™ mobile solutions that use Sharp cameras. The breakout box provides
power and network connectivity to the Sharp units and the in-vehicle
Broadcast is the communication between a single sender and all
receivers on a network.
camera (Security Center)
A camera entity represents a single video source in the system.
The video source can either be an IP camera, or an analog camera that connects to the
video encoder of a video unit. Multiple video streams can be generated from the same
Camera blocking is an Omnicast™ feature that lets you restrict the viewing
of video (live or playback) from certain cameras to users with a minimum user
The Camera configuration task
is a maintenance task that reports on the properties and settings of local cameras in
your system (manufacturer, resolution, frame rate, stream usage, and so
The Camera events task is an
investigation task that reports on events pertaining to selected cameras within a
specified time range.
Camera Integrity Monitor
The Camera Integrity Monitor role samples video
images from cameras at regular intervals, detects abnormal variations that indicate that
cameras might have been tampered with, and generates Camera tampering
camera integrity monitoring
In Security Center, camera integrity monitoring is
software that detects any form of tampering with the camera, such as moving the camera,
obstructing the camera view, changing the camera focus, and so on. The software
automatically generates events to alert the security team to remedy the
A camera sequence is an entity that defines a list of
cameras that are displayed one after another in a rotating fashion within a single tile
Canvas is one of the panes found in the Security
Desk's task workspace.
The canvas is used to display multimedia information, such as videos, maps, and
pictures. It is further divided into three panels: the tiles, the dashboard, and the
The capture rate measures the speed at which a license plate
recognition system can take a photo of a passing vehicle and detect the license plate in
Card and PIN
Card and PIN is an access point mode that requires a cardholder to
present their card, and then enter a personal identification number (PIN).
A cardholder entity represents a person who can enter and
exit secured areas by virtue of their credentials (typically access cards) and whose
activities can be tracked.
The Cardholder access rights
task is a maintenance task that reports on which cardholders and cardholder groups are
granted or denied access to selected areas, doors, and elevators.
The Cardholder activities task
is an investigation task that reports on cardholder activities, such as access denied,
first person in, last person out, antipassback violation, and so on.
configuration is a maintenance task that reports on cardholder
properties, such as first name, last name, picture, status, custom properties, and so
A cardholder group is an entity that defines the common
access rights of a group of cardholders.
The Cardholder management task
is an operation task. You can use this task to create, modify, and delete cardholders.
With this task, you can also manage a cardholders' credentials, including temporary
Designates one of the following: (1) digital
certificate; (2) SDK certificate.
A certificate authority or certification authority
(CA) is an entity or organization that signs identity certificates and attests to the
validity of their contents. The CA is a key component of the public-key infrastructure
certificate authority (CA)
The Certificate Signing role acts as the
certificate authority (CA) for all access control and video units whose certificates are
managed in Security Center by the Unit Assistant
role. You may have only one instance of this role in your system.
City Parking Enforcement
City Parking Enforcement is a Genetec
Patroller™ software installation that is configured
for the enforcement of parking permit and overtime restrictions.
City Parking Enforcement with Wheel Imaging
City Parking Enforcement with Wheel
Imaging is a City Parking Enforcement installation of a Genetec
Patroller™ application that also includes wheel imaging. The
use of maps is mandatory and the mobile AutoVu™ system
must include navigation hardware.
A statement that a trusted third-party makes about a subject, such
as a user. For example, a claim can be about a name, identity, key, group, privilege, or
capability. Claims are issued by an identity provider. They are given one or more values
and then packaged in a security token that is sent to relying applications during
A client certificate is an identity certificate
used to authenticate the client's identity to the server. Unlike server certificates,
client certificates are not used to encrypt data-in-transit. They only serve as a more
secure authentication mechanism than passwords.
client-specific key stream
The client-specific key stream is the encrypted
form of the master key stream. The master key stream is encrypted with the
public key contained in an encryption certificate, specifically issued
for one or more client machines. Only the client machines that have the encryption
certificate installed have the required private key to decrypt the encrypted key
A cloud platform provides remote computing and storage services
through centralized data centers that are accessible via the Internet.
The Cloud Playback role is used by Cloud storage to stream
video archives from the cloud to clients and federated users connected to the system. Cloud Playback
supports the Real Time Streaming Protocol (RTSP) locally and uses TLS to retrieve video
sequences from the cloud.
Cloud storage is a service from Genetec Inc. that extends on premise storage for
Omnicast™ into the cloud. Video archives in
Cloud storage benefit from extended retention periods, secure and redundant storage, and
seamless retrieval from Security
A collaborative incident is an incident type that
requires the collaboration of multiple teams to resolve. Each team has specific tasks to
follow, which are represented by sub-incidents. The collaborative incident is resolved
when all its sub-incidents are resolved.
the Security Center administrative application used to
manage all Security Center users and to configure all
Security Center entities such as areas, cameras,
doors, schedules, cardholders, patrol vehicles, ALPR units, and hardware
The Conflict resolution utility is a tool that
helps you resolve conflicts caused by importing users and cardholders from an Active
A context camera is a camera connected to an ALPR unit that
produces a wider angle color image of the vehicle whose license plate was read by the
The Continuous Delivery (CD) release track offers
customers an upgrade path with ongoing innovations, introducing new features, bug fixes,
performance enhancements, and support for the latest devices through minor versions. The
frequency of changes introduced on the CD track may be impractical for some
organizations, who opt for the long-term predictability of the LTS
Continuous Delivery (CD)
contract permit parking
Contract permit parking is a parking scenario where only
drivers with monthly permits can park in the parking zone. A whitelist is used to grant
permit holders access to the parking zone.
A controlled exit is when credentials are necessary to leave a
Controller module is the processing component of
Controller with IP capability. This module comes
pre-loaded with the controller firmware and the web-based administration tool, Synergis™ Appliance Portal.
The convenience time is a configurable leeway time before a vehicle starts to be charged after entering the parking zone. For example, if you need to set up a 2-hour free parking period before paid time or parking enforcement takes effect, you would set the convenience time for 2 hours. For parking lots where parking enforcement begins immediately, you would still need to set a short convenience time to allow vehicle owners time to find a parking spot and purchase parking time before parking enforcement begins.
Copy configuration tool
The Copy configuration tool helps you save
configuration time by copying the settings of one entity to many others that partially
share the same settings.
Correlation refers to the relationship that exists between
two types of events, A and B. A correlation exists between A and B if whenever event A
occurs, event B is expected. For example, if whenever there is a large gathering of
people, the number of new cases of COVID-19 increases in the following days, we can say
that there is a correlation between large gatherings and the increase of the number of
new cases of COVID-19.
A covert hit is a read (captured license plate) that is matched to a
covert hotlist. Covert hits are not displayed on the Genetec
Patroller™ screen, but can be displayed in Security
Desk by a user with proper
Covert hotlists allow you to ensure the discretion of an
ongoing investigation or special operation. When a hit is identified, only the
authorized officer at the Security Center
station is notified, while the officer in the patrol vehicle is not alerted. This
enables enforcement officials to assign multiple objectives to the vehicle and back-end
systems, while not interrupting the priorities of officers on duty.
A credential entity represents a proximity card, a biometrics
template, or a PIN required to gain access to a secured area. A credential can only be
assigned to one cardholder at a time.
The Credential activities task
is an investigation task that reports on credential related activities, such as access
denied due to expired, inactive, lost, or stolen credentialsl, and so
A credential code is a textual representation of the
credential, typically indicating the Facility code and the Card number. For credentials
using custom card formats, the user can choose what to include in the credential
The Credential configuration
task is a maintenance task that reports on credential properties, such as status,
assigned cardholder, card format, credential code, custom properties, and so
The Credential management task
is an operation task. You can use this task to create, modify, and delete credentials.
With this task, you can also print badges and enroll large numbers of card credentials
into the system, either by scanning them at a designated card reader or by entering a
range of values.
The Credential request
history task is an investigation task that reports on which users
requested, canceled, or printed cardholder credentials.
cumulative security rollup
A cumulative security rollup is a periodic
release that contains the latest security fixes and updates for legacy Synergis™ Cloud
A custom event is an event added after the initial system
installation. Events defined at system installation are called system events. Custom
events can be user-defined or automatically added through plugin installations. Unlike
system events, custom events can be renamed and deleted.
A custom field is a user-defined property that is associated
with an entity type and is used to store additional information that is useful to your
In cryptography, cyphertext is the encrypted
Daily usage per Patroller
The Daily usage per
Patroller task is an investigation task that reports on the daily usage
statistics of a selected patrol vehicle (operating time, longest stop, total number of stops,
longest shutdown, and so on) for a given date range.
A database server is an application that manages
databases and handles data requests made by client applications. Security Center uses Microsoft SQL Server as its
Data ingestion is the means through which you can import
data from external sources into Security Center
without having to
develop complex code-based
A debounce is the amount of time an input can be in a changed
state (for example, from active to inactive) before the state change is reported.
Electrical switches often cause temporarily unstable signals when changing states,
possibly confusing the logical circuitry. Debouncing is used to filter out unstable
signals by ignoring all state changes that are shorter than a certain period (in
default expiration delay
The default expiration delay is used for permits
supplied by Pay-by-Plate
Sync that do not include an
expiration. In this case, AutoVu™
Free-Flow checks with the parking permit
provider to see if the permit is still valid. Increasing this value reduces the
frequency of the permit checks. For example, if the parking lot charges for parking in
increments of 15 minutes, and you also set the default expiration delay to 15 minutes,
the system validates the permit with the parking provider every 15
Degraded mode is an offline operation mode of the interface
module when the connection to the Synergis™ unit
is lost. The interface module grants access to all credentials matching a specified
Dependent mode is an online operation mode of the
interface module where the Synergis™ unit makes all access control decisions. Not all
interface modules can operate in dependent mode.
Dewarping is the transformation used to straighten a digital image
taken with a fisheye lens.
Diagnostic data collector
The Diagnostic data collector is a tool
that you can use to collect and package system information to send to Genetec™ Technical Assistance Center for
A digital certificate, also known as X.509
certificate, is a digitally signed document that binds the identity of the
certificate owner (a person, a computer, or an organization) to a pair of electronic
encryption keys. Digital certificates are used for identity verification, asymmetric
cryptography, data-in-transit security, and so on. Digital certificates are the basis
for the HTTPS protocol.
A digital signature is cryptographic metadata added to
video frames by the Archiver or Auxiliary Archiver to ensure their authenticity. If a
video sequence is manipulated by adding, deleting, or modifying frames, the signature of
the modified content will differ from the original, indicating that the video
sequence has been tampered with.
The Directory role identifies a Security Center system. It manages all entity
configurations and system-wide settings.
Only a single instance of this role is permitted on
your system. The server hosting the Directory role is called the main server, and
must be set up first. All other servers you add in Security Center are called
expansion servers, and must connect to the main server to be part of the same
Directory authentication is a Security Center
option that forces all client and server applications on a given machine to validate the
identity certificate of the Directory before connecting to it. This measure prevents
Directory gateways allow Security Center applications
located on a non-secured network to connect to the main server that is behind a
firewall. A Directory gateway is a Security Center server that acts as a proxy for the
main server. A server cannot be both a Directory server and a Directory gateway; the
former must connect to the Directory database, while the latter must not, for security
The Directory Manager role manages the Directory
failover and load balancing to produce the high availability characteristics in Security Center.
A Directory server is any one of the multiple servers
simultaneously running the Directory role in a high availability
A discovery port is a port used by certain Security Center roles
(Access Manager, Archiver, ALPR Manager) to find the units they are responsible for on
the LAN. No two discovery ports can be the same on one system.
A district is a parking regulation characterizing an overtime
rule. A district is a geographical area within a city. A vehicle is in violation if it is seen
within the boundaries of the district over a specified period of time.
A door entity represents a physical barrier. Often, this is an
actual door but it could also be a gate, a turnstile, or any other controllable barrier.
Each door has two sides, named In and Out by default. Each side is an
access point (entrance or exit) to a secured area.
The Door activities task is an
investigation task that generates reports on door-related activities, such as access
denied, door forced open, door open too long, hardware tamper, and so
A door contact monitors the state of a door, whether it is open or
closed. It can also be used to detect an improper state, such as door open too
Every door has two sides, named In and Out by default.
Each side is an access point to an area. For example, passing through one side leads
into an area, and passing through the other side leads out of that area. For the
purposes of access management, the credentials that are required to pass through a door
in one direction are not necessarily the same that are required to pass through in the
The Door troubleshooter task is
a maintenance task that lists all the cardholders who have access to a particular door
side or elevator floor at a specific date and time.
Driver Development Kit
Driver Development Kit is a SDK for creating device
Driver Development Kit (DDK)
A duress is a special code used to disarm an alarm system. This code
quietly alerts the monitoring station that the alarm system was disarmed under
In a system that uses the Pay-by-Plate
Sync plugin, a dynamic permit holds a list of
vehicles that is updated by a third-party permit provider. For example, in a system
where vehicle owners pay for parking at a kiosk or using a mobile phone app, the list of
vehicles are dynamically managed by a third-party permit provider.
Edge recording is the process of recording and storing
recorded videos on the peripheral device, thus removing the need for a centralized recording
server or unit. With edge recording, you can store video directly on the camera’s internal
storage device (SD card) or on a network attached storage volume (NAS volume).
electric door strike
An electric door strike is an electric device that releases
the door latch when current is applied.
An elevator is an entity that provides access control
properties to elevators. For an elevator, each floor is considered an access
The Elevator activities task is
an investigation task that reports on elevator related activities, such as access
denied, floor accessed, unit is offline, hardware tamper, and so on.
An encryption certificate, also known as a
digital certificate or public-key certificate, is an electronic
document that contains a public and private key pair used in Security Center for fusion stream encryption.
Information encrypted with the public key can only be decrypted with the matching
To enforce is to take action following a confirmed hit. For example, a
parking officer can enforce a scofflaw violation (unpaid parking tickets) by placing a
wheel boot on the vehicle.
Entities are the basic building blocks of Security Center. Everything
that requires configuration is represented by an entity. An entity can represent a
physical device, such as a camera or a door, or an abstract concept, such as an alarm, a
schedule, a user, a role, a plugin, or an add-on.
An entity tree is the graphical representation of Security Center
entities in a tree structure, illustrating the hierarchical nature of their
An event indicates the occurrence of an activity or incident, such
as access denied to a cardholder or motion detected on a camera. Events are
automatically logged in Security Center. Every
event has an entity as its main focus, called the event source.
An event-to-action links an action to an event. For example, you
can configure Security Center to trigger an
alarm when a door is forced open.
An expansion server is any server machine in a Security Center
system that does not host the Directory role. The purpose of the expansion server is to
add to the processing power of the system.
An extension refers to a group of manufacturer-specific
settings found in the Extensions configuration page of a role, such
as Archiver, Access Manager, or Intrusion Manager. Most extensions are built-in to
Security Center, but some require the
installation of an add-on; in those situations, the extension also refers to this
Failover is a backup operational mode in which a role (system
function) is automatically transferred from its primary server to a secondary server
that is on standby. This transfer between servers occurs only if the primary server
becomes unavailable, either through failure or through scheduled downtime.
Federal Agency Smart Credential
A Federal Agency Smart Credential Number (FASC-N) is an identifier
used in the Personal Identity Verification (PIV) credentials issued by US Federal
Agencies. FASC-N credential bit lengths vary based on reader configuration; Security Center natively recognizes 75-bit and 200-bit formats.
Federal Agency Smart Credential Number (FASC-N)
false positive read
False positive plate reads can occur when a license plate
recognition system mistakes other objects in an image for license plates. For example,
lettering on a vehicle or street signs can sometimes create false positive plate
Federal Information Processing Standard
Federal Information Processing Standards (FIPS) are publicly
announced standards developed by the United States federal government for use in
computer systems by non-military government agencies and government
Federal Information Processing Standard (FIPS)
A federated entity is any entity that is imported from an
independent system through one of the Federation™
A federated identity is a security token that is generated outside
of your own realm that you accept. Federated identity enables single sign-on, allowing
users to sign on to applications in different realms without needing to enter
A federated system is a independent system (Omnicast™ or
Security Center) that is unified under your
local Security Center through a Federation™ role, so that the local users can view and
control its entities as if they belong to their local system.
The Federation™ feature
joins multiple, independent Genetec™ IP
security systems into a single virtual system. With this feature, users on the central
Security Center system can view and control entities that belong to remote
The Federation™ host is the Security Center system that
runs Federation™ roles. Users on the Federation™ host can view and control entities that
belong to federated systems directly from their local system.
The Federation™ user is
the local user account on the remote system that the Federation™ host uses to connect to the remote system. The
Federation™ user must have the Federation™ privilege. It is used to control what
the Federation™ host can access on the remote
The first-person-in rule is the additional access
restriction placed on a secured area that prevents anyone from entering the area until a
supervisor is on site. The restriction can be enforced when there is free access (on
door unlock schedules) and when there is controlled access (on access
The Forensic search task is an
investigation task that searches for video sequences based on video analytics
four-port RS-485 module
A four-port RS-485 module is a RS-485
communication component of Synergis™ Master
Controller with four ports
(or channels) named A, B, C, and D. The number of interface modules you can connect to
each channel depends on the type of hardware you have.
A free access is an access point state where no credentials are
necessary to enter a secured area. The door is unlocked. This is typically used during
normal business hours, as a temporary measure during maintenance, or when the access
control system is first powered up and is yet to be configured.
A free exit is an access point state where no credentials are
necessary to leave a secured area. The person releases the door by turning the doorknob,
or by pressing the REX button, and walks out. An automatic door closer shuts the door so
it can be locked after being opened.
Fusion stream is a proprietary data structure of Genetec Inc. for streaming multimedia. Each fusion
stream is a bundle of data (video, audio, and metadata) streams and key streams related
to a single camera. Fusion streams are generated on specific client requests. The key
streams are included only if the data streams are encrypted.
Fusion stream encryption is a proprietary
technology of Genetec Inc. used to protect the privacy of your video archives. The
Archiver uses a two-level encryption strategy to ensure that only authorized client
machines or users with the proper certificates on smart cards can access your private
G64 is a Security Center format used by archiving roles (Archiver and
Auxiliary Archiver) to store video sequences issued from a single camera. This data
format supports audio, bookmarks, metadata overlays, timestamps, motion and event
markers, and variable frame rate and resolution.
G64x is a Security Center format used to store video sequences from
multiple cameras that are exported or backed up simultaneously. This data format
supports audio, bookmarks, metadata overlays, timestamps, motion and event markers,
variable frame rate and resolution, and watermarking.
Genetec Clearance™ Uploader
Genetec Clearance™ Uploader is an application
used to automatically upload media from body-worn cameras, sync folders, or other
devices to Genetec Clearance™, or a Security Center video archive, depending on which
.json config file is used.
is a collaborative decision management system that provides organizations with new
levels of situational intelligence, visualization, and complete incident management
capabilities. It allows security personnel to make the right decision when faced with
routine tasks or unanticipated situations by ensuring a timely flow of information. To
learn more about Genetec Mission
Control™, refer to the
Official name of the map-based Security Center mobile application for Android and
Patroller™ is the software
application installed on an in-vehicle computer that analyzes license plate reads from
Sharp camera units. The application can be
installed to operate in different modes to suit your specific enforcement needs and can
be configured to notify the vehicle operator if immediate action is
is a standard protocol developed by Genetec Inc. that third-party video encoder and IP camera manufacturers can use to integrate their
products to Security Center
Server is the Windows service that is at the core of Security Center architecture, and that must be installed on
every computer that is part of the Security Center's
pool of servers. Every such server is a generic computing resource capable of taking on any
role (set of functions) you assign to it.
Genetec™ Update Service
The Genetec™ Update Service (GUS) is automatically
installed with most Genetec™ products and
enables you to update products when a new release becomes available.
Genetec™ Update Service
a media player that is used to view exported G64 and G64x video files from Security
Desk, or on a computer that does not
have Security Center installed.
Geocoding, sometimes called forward geocoding, is the process
of converting a street address into geographic location, such as a latitude and
Georeferencing is the process of using an object’s
geographic coordinates (latitude and longitude) to determine its position on a
Geographic Information System
Geographic Information System (GIS) is a
system that captures spatial geographical data. Map Manager can connect to third-party
vendors that provide GIS services in order to bring maps and all types of geographically
referenced data to Security Center.
Geographic Information System (GIS)
A ghost camera is an entity used as a substitute camera.
This entity is automatically created by the Archiver when video archives are detected for a
camera whose definition has been deleted from the Directory, either accidentally or because
the physical device no longer exists. Ghost cameras cannot be configured, and only exist so
users can reference the video archive that would otherwise not be associated to any
A ghost patroller entity is automatically created by the
ALPR Manager when the AutoVu™ license includes
the XML Import module. In Security Center, all
ALPR data must be associated to a Genetec
entity or an ALPR unit corresponding to a fixed Sharp camera. When you import ALPR data from an
external source through a specific ALPR Manager using the XML Import module, the system
uses the ghost entity to represent the ALPR data source. You can formulate queries using
the ghost entity as you would with a normal entity.
Global antipassback is a feature that extends the
antipassback restrictions to areas controlled by multiple Synergis™
Global cardholder management
Global cardholder management (GCM) is used to
synchronize cardholders between independent Security Center installations.
With GCM, you can have a central repository of cardholder information
for your entire organization, whether this information is managed from a central office
or by individual regional offices.
Global cardholder management (GCM)
Global Cardholder Synchronizer
The Global Cardholder Synchronizer role ensures the
two-way synchronization of shared cardholders and their related entities between the
local system (sharing guest) where it resides and the central system (sharing
Global Cardholder Synchronizer (GCS)
A global entity is an entity that is shared across multiple
independent Security Center systems by virtue of its membership to a global partition.
Only cardholders, cardholder groups, credentials, and badge templates are eligible for
Global partition is a partition that is shared across multiple
independent Security Center systems by the partition owner, called the sharing
You can add a grace period to a parking session for purposes of
lenient enforcement. Following the expiration of the vehicle’s paid time or convenience
time, the grace period gives extra time before a parking session is flagged as a
Hard antipassback logs the passback event in the
database and prevents the door from being unlocked due to the passback
Hardening is the process of enhancing hardware and software
security. When hardening a system, basic and advanced security measures are put in place
to achieve a more secure operating environment.
hardware integration package
A hardware integration package, or HIP, is an
update that can be applied to Security Center.
It enables the management of new functionalities (for example, new video unit types),
without requiring an upgrade to the next Security Center release.
hardware integration package (HIP)
The Hardware inventory task is a
maintenance task that reports on the characteristics (unit model, firmware version, IP
address, time zone, and so on) of access control, video, intrusion detection, and ALPR
units in your system.
A hardware zone is a zone entity in which the I/O linking is
executed by a single access control unit. A hardware zone works independently of the
Access Manager, and consequently, cannot be armed or disarmed from Security
In cryptography, a hash function uses a mathematical
algorithm to take input data and return a fixed-size alphanumeric string. A hash
function is designed to be a one-way function, that is, a function which is infeasible
The Health history task is a
maintenance task that reports on health issues.
The Health Monitor role monitors system entities such as
servers, roles, units, and client applications for health issues.
The Health statistics task is a
maintenance task that gives you an overall view of the health of your system by
reporting on the availability of selected system entities such as roles, video units,
and access control units.
High availability is a design approach that enables a system
to perform at a higher than normal operational level. This often involves failover and
A hit is a license plate read that matches a hit rule, such as a hotlist,
overtime rule, permit, or permit restriction. A Genetec
Patroller™ user can choose to reject or accept a hit.
An accepted hit can subsequently be enforced.
A hit rule is an ALPR rule used to identify vehicles of interest
(called "hits") using license plate reads. The hit rules include the following types:
hotlist, overtime rule, permit, and permit restriction.
The Hits task is an investigation task that
reports on hits reported within a selected time range and geographic
A hot action is an action mapped to a PC keyboard function key
(Ctrl+F1 through Ctrl+F12) in Security
Desk for quick access.
A hotlist is a list of wanted vehicles, where each vehicle is
identified by a license plate number, the issuing state, and the reason why the vehicle
is wanted (stolen, wanted felon, Amber alert, VIP, and so on). Optional vehicle
information might include the model, the color, and the vehicle identification number
Hotlist and permit
The Hotlist and permit
editor task is an operation task. You can use it to edit an existing hotlist or
permit list. A new list cannot be created with this task, but after an existing list has been
added to Security Center, you can edit, add, or delete
items from the list, and the original text file is updated with the changes.
A hotspot is a map object that represents an area on the map
which requires special attention. Clicking on a hotspot displays associated fixed and
An identity certificate is a digital
certificate used to authenticate one party to another in a secure communication
over a public network. Identity certificates are generally issued by an authority that
is trusted by both parties, called a certificate authority (CA).
An identity provider is a trusted, external system that
administers user accounts, and is responsible for providing user authentication and
identity information to relying applications over a distributed network.
An illuminator is a light in the Sharp unit that illuminates the plate, thereby
improving the accuracy of the images produced by the ALPR camera.
The Import tool is the tool that you can use to import
cardholders, cardholder groups, and credentials from a comma-separated values (CSV)
An inactive entity is an entity that is shaded in red in the
entity browser. It signals that the real world entity it represents is either not
working, offline, or incorrectly configured.
An incident is an unexpected event reported by a Security
Incident reports can use formatted text and include events and entities as support
incident (Genetec Mission
A Genetec Mission
incident is an undesirable or unusual situation that needs investigation and resolution,
or a routine, scheduled task that requires monitoring.
An incident category is an entity that represents a
grouping of incident types that have similar characteristics.
The Incident configuration
task is an administration task that you can use to configure the incident types, the
incident categories, and the support documents for Genetec Mission
Control™. You can also use this task to
generate reports on the changes made to incident types.
The Incident Manager is the central role that recognizes
situational patterns, and triggers incidents in a Genetec Mission
Control™ system. This role manages the
automation workflows and keeps track of all user activities that are related to
The Incident monitoring task is
an operation task that you can use to monitor and respond to incidents. From this task,
you can see the incidents displayed on a map, thus improving your situational
The incident owner is the incident recipient who took
ownership of the incident. Only the incident owner can take actions to resolve the
incident. An incident can only have one owner at a time.
An incident recipient is a user or user group that the
incident has been dispatched to. Incident recipients can see the incident in the
Incident monitoring task.
The Incident report task is an
investigation task that you can use to search, review, and analyze Genetec Mission
An incident supervisor is a user who sees an incident
in the Incident monitoring task because they supervise the incident
recipients. Incident supervisors are not incident recipients themselves. A user cannot
be both supervisor and recipient of the same incident.
An incident trigger is an event or a sequence of events
that can trigger an incident. The Genetec Mission
Control™ Rules Engine looks for specific combinations of events (type, time, correlation, and
frequency) to determine whether to trigger an incident.
An incident type entity represents a situation that
requires specific actions to resolve it. The incident type entity can also be used to
automate the incident detection in Genetec Mission
Control™ and to enforce the standard operating procedures that your security team must
The Incidents task is an investigation
task that you can use to search, review, and modify incident reports created by Security
An interface module is a third-party security device that
communicates with an access control unit over IP or RS-485, and provides additional
input, output, and reader connections to the unit.
An interlock (also known as sally port or airlock) is an
access restriction placed on a secured area that permits only one perimeter door to be
open at any given time.
The Intrusion detection task
is an administration task that you can use to configure intrusion detection roles and
An intrusion detection area entity represents a
zone (sometimes called an area) or a partition (group of sensors) on an intrusion
Intrusion detection area
The Intrusion detection area
activities task is an investigation task that reports on activities
(master arm, perimeter arm, duress, input trouble, and so on) in selected intrusion
An intrusion detection unit entity represents an
intrusion device (intrusion panel, control panel, receiver, and so on) that is monitored
and controlled by the Intrusion Manager role.
Intrusion detection unit
The Intrusion detection unit
events task is an investigation task that reports on events (AC fail,
battery fail, unit lost, input trouble, and so on) related to selected intrusion
The Intrusion Manager role monitors and controls
intrusion detection units. It listens to the events reported by the units, provides live
reports to Security Center, and logs the events
in a database for future reporting.
An intrusion panel (also known as alarm
panel or control panel) is a wall-mounted unit where the alarm sensors
(motion sensors, smoke detectors, door sensors, and so on) and wiring of the intrusion
alarms are connected and managed.
Also known as: alarm
The Inventory management task
is an operation task that you can use to add and reconcile license plate reads to a
parking facility inventory.
The Inventory report task is an
investigation task that you can use to view a specific inventory (vehicle location, vehicle
length of stay, and so on) or compare two inventories of a selected parking facility (vehicles
added, vehicles removed, and so on).
The I/O configuration task is a
maintenance task that reports on the I/O configurations (controlled access points,
doors, and elevators) of access control units.
I/O (input/output) linking is controlling an output relay based on
the combined state (normal, active, or trouble) of a group of monitored inputs. A
standard application is to sound a buzzer (through an output relay) when any window on
the ground floor of a building is shattered (assuming that each window is monitored by a
"glass break" sensor connected to an input).
An I/O zone is a zone entity in which the I/O linking can be
spread across multiple Synergis™ units, while one unit acts as the master unit. All
Synergis™ units involved in an I/O zone must be managed by the same Access Manager. The
I/O zone works independently of the Access Manager, but ceases to function if the master
unit is down. An I/O zone can be armed and disarmed from Security
Desk as long as the
master unit is online.
An IP camera is a video encoder unit incorporating a
IPv4 is the first generation Internet protocol using a 32-bit address
IPv6 is a 128-bit Internet protocol that uses eight groups of four
hexadecimal digits for address space.
Keyhole Markup Language
Keyhole Markup Language (KML) is a file format
used to display geographic data in an Earth browser such as Google Earth and Google
Keyhole Markup Language (KML)
KiwiVision™ Camera Integrity Monitor
KiwiVision™ Camera Integrity Monitor is a Security Center module that ensures cameras are
operational at all times by performing regular checks of their video to detect whether
the cameras have been tampered with.
Privacy Protector™ is a Security Center module that ensures the privacy of
individuals recorded by video surveillance cameras while safeguarding potential
Law Enforcement is a Genetec
Patroller™ software installation that is configured
for law enforcement: the matching of license plate reads against lists of wanted license
plates (hotlists). The use of maps is optional.
layout entity represents a snapshot of what is displayed in a Monitoring
task. Only the tile pattern and the tile contents are saved, not the tile
A license key is the software key used to unlock the Security Center software. The license key is specifically generated for each computer where the
Directory role is installed. To obtain your license key, you need the System ID
(which identifies your system) and the Validation key (which identifies your
A license plate inventory is a list of license plate
numbers of vehicles found in a parking facility within a given time period, showing
where each vehicle is parked (sector and row).
license plate read
A license plate read is a license plate number captured from
a video image using ALPR technology.
A live event is an event that Security Center receives when the event occurs.
Security Center processes live events in
real-time. Live events are displayed in the event list in Security
Desk and can be used to trigger
A live hit is a hit matched by the Genetec
Patroller™ and immediately sent to the Security Center over a wireless
A live read is a license plate captured by the patrol vehicle and
immediately sent to Security Center over a
Load balancing is the distribution of workload across multiple
Logical ID is a unique ID assigned to each entity in the system for
ease of reference. Logical IDs are only unique within a particular entity
Logons per Patroller
The Logons per Patroller task is
an investigation task that reports on the logon records of a selected patrol
If you need to monitor long-term parking violations for
vehicles that are parked for more than a certain number of days, you can configure long-term
overtime settings in Genetec
Patroller™ and Security Center.
The Long-Term Support (LTS) release track offers
customers an upgrade path that minimizes changes to software and extends access to
critical bug and security fixes. The LTS track includes major and patch versions. Minor
versions are excluded. Choosing the LTS track limits your access to new capabilities,
but increases stability due to less frequent code change and extends the maintenance
period by two years.
Long-Term Support (LTS)
The License Plate Management (LPM) protocol provides a
Sharp camera with a secure and reliable
connection to Security Center. When The LPM
protocol is enabled on a Sharp camera, the
protocol manages the camera’s connection to the ALPR Manager role.
A macro is an entity that encapsulates a C# program that adds
custom functionalities to Security Center.
The main server is the only server in a Security Center
system hosting the Directory role. All other servers on the system must connect to the
main server to be part of the same system. In a high availability configuration where
multiple servers host the Directory role, it is the only server that can write to the
A major version is a software version that adds new
features, behavioral changes, SDK capabilities, support for new devices, and performance
improvements. Using backward compatibility mode, major versions are compatible with up
to three previous major versions. A license update is required to upgrade to a new major
version. A major version is indicated by a version number with zeros at the third and
fourth positions: X.Y.0.0.
For more information, see our Product Lifecycle
page on GTAP.
In computer security, man-in-the-middle (MITM) is a form of attack
where the attacker secretly relays and possibly alters the communication between two
parties who believe they are directly communicating with each other.
Manual capture is when license plate information is entered into
the system by the user and not by the ALPR.
A map in Security Center is a two-dimensional diagram that helps you
visualize the physical locations of your security equipment in a geographical area or a
The Map designer task is an
administration task that you can use to create and edit maps that represent the physical
locations of your equipment to Security
A map link is a map object that brings you to another map with a
The Map Manager is the central role that manages all mapping
resources in Security Center, including imported
map files, external map providers, and KML objects. It acts as the map server for all
client applications that require maps and as the record provider for all Security Center entities placed on georeferenced
Map mode is a Security
Desk canvas operating mode that replaces tiles
and controls with a geographical map showing all active, georeferenced events in your
system. Switching to Map mode is a feature that comes with
AutoVu™, Correlation, or Genetec Mission
Control™, and requires a license for one of these
Map objects are graphical representations on your maps of
Security Center entities or geographical features, such as cities, highways, rivers, and so
on. With map objects, you can interact with your system without leaving your
A map preset is a saved map view. Every map has at least one
preset, called the default view, that is displayed when a user opens the
A map view is a defined section of a map.
The Maps task is an operation task that
heightens your situational awareness by providing the context of a map to your security
monitoring and control activities.
Master arm is arming an intrusion detection area in such a way that all sensors attributed to the area would set the alarm off if one of them is triggered.
Also known as: Away
master key stream
In fusion stream encryption, the master key
stream is the sequence of symmetric keys generated by the Archiver to encrypt one data
stream. The symmetric keys are randomly generated and change every minute. For security
reasons, the master key stream is never transmitted or stored anywhere as
The max occupancy feature monitors the number of
people in an area, up to a configured limit. Once the limit is reached, the rule will
either deny access to additional cardholders (if set to Hard) or trigger events
while allowing further access (Soft).
maximum session time
Setting a maximum session time helps to improve parking lot
occupancy statistics. When a vehicle exceeds the maximum session time, it is assumed
that the vehicle's plate was not read at the exit and the vehicle is no longer in the
parking zone. The parking session appears in reports generated from the
Parking sessions task with the State reason: Maximum session
The Media Gateway role is used by Genetec™ Mobile and Web
Client to get transcoded video from Security Center. The Media Gateway role supports the Real
Time Streaming Protocol (RTSP), which external applications can use to request raw video
streams from Security Center.
The Media Router role is the central role that handles all
stream requests (audio and video) in Security Center.
It establishes streaming sessions between the stream source, such as a camera or an Archiver,
and its requesters (client applications). Routing decisions are based on the location (IP
address) and the transmission capabilities of all parties involved (source, destinations,
networks, and servers).
A minor version is a software version that adds new
features, SDK capabilities, support for new devices, bug fixes, and security fixes.
Different system components can run at different minor versions, provided they share the
same major version. No license update is required to upgrade to a new minor version. A
minor version is indicated by a version number with a zero at the fourth position:
For more information, see our Product Lifecycle
page on GTAP.
A missing file is a video file that is still referenced by
an archive database, but cannot be accessed anymore. This situation occurs when video
files are deleted manually without using the Archive storage
details task, creating a mismatch between the number of video files
referenced in the database and the actual number of video files stored on
(Obsolete as of SC 5.8 GA) Mobile Admin is a web-based
administration tool used to configure the Mobile Server.
A mobile credential is a credential on a smartphone that uses
Bluetooth or Near Field Communication (NFC) technology to access secured
Mobile Credential Manager
The Mobile Credential Manager role links
Security Center to your third-party mobile
credential provider so that you can view your subscription status, and manage your
mobile credentials and profiles in Config
mobile credential profile
A mobile credential profile links a part number
from your mobile credential provider to your subscription so that you can create mobile
credentials in Security Center.
Mobile Data Computer
Mobile Data Computer is a tablet computer or
ruggedized laptop used in patrol vehicles to run the Genetec
Patroller™ application. The MDC is typically equipped
with a touch-screen with a minimum resolution of 800 x 600 pixels and wireless
Mobile Data Computer (MDC)
Mobile License Plate Inventory
Mobile License Plate Inventory (MLPI) is
Patroller™ software installation that is
configured for collecting license plates and other vehicle information for creating and
maintaining a license plate inventory for a large parking area or parking
Mobile License Plate Inventory (MLPI)
The Mobile Server role provides Security Center access on mobile
A monitor group is an entity used to designate analog
monitors for alarm display. Besides the monitor groups, the only other way to display
alarms in real time is to use the Alarm monitoring task in Security
Monitor ID is an ID used to uniquely identify a workstation screen
controlled by Security
The Monitoring task is an operation task
that you can use to monitor and respond to real-time events that relate to selected entities.
Using the Monitoring task, you can also monitor and respond to
Motion detection is the feature that watches for changes in a
series of video images. The definition of what constitutes motion in a video can be
based on highly sophisticated criteria.
The Motion search task is an
investigation task that searches for motion detected in specific areas of a camera's
field of view.
A motion zone is a user defined areas within a video image where
motion should be detected.
Move unit tool is used to move units from one manager role to
another. The move preserves all unit configurations and data. After the move, the new
manager immediately takes on the command and control function of the unit, while the old
manager continues to manage the unit data collected before the move.
If you use AutoVu™
Free-Flow to manage transient parking and
contract permit parking in parking zones, you can install the AutoVu™
Free-Flow plugin to manage parking lots where
parking spots are leased to tenants.
Multi-factor authentication (MFA) is a security system that requires
more than one method of authentication from independent categories of credentials to
verify the user’s identity for a login or other transaction.
Multi-Factor Authentication (MFA)
The network entity is used to capture the characteristics of the
networks used by your system so that proper stream routing decisions can be
Network address translation is the process of
modifying network address information in datagram (IP) packet headers while in transit across
a traffic routing device, for the purpose of remapping one IP address space into
network address translation (NAT)
The network view is a browser view that illustrates your network
environment by showing each server under the network they belong to.
The Network view task is an
administration task that you can use to configure your networks and
A new wanted is a manually entered hotlist item in Genetec
Patroller™. When you are looking for a plate that
does not appear in the hotlists loaded in the Genetec
Patroller™, you can enter the plate in order to raise
a hit if the plate is captured.
The notification tray contains icons that allow quick access
to certain system features, and also displays indicators for system events and status
information. The notification tray display settings are saved as part of your user
profile and apply to both Security
Desk and Config
OCR equivalence is the interpretation of OCR (Optical Character
Recognition) equivalent characters performed during license plate recognition. OCR
equivalent characters are visually similar, depending on the plate’s font. For example,
the letter “O” and the number “0”, or the number “5” and the letter “S”. There are
several pre-defined OCR equivalent characters for different languages.
An officer, or wearable camera user, is an entity that
identifies a person who holds a body-worn camera license and uploads video evidence to
Genetec Clearance™ or a Security Center video archive. Officers are
automatically added when a camera is connected to the Genetec Clearance™ Uploader, but can also be
added and modified manually.
An offline event is an event that occurs while the event
source is offline. Security Center only receives
the offline events when the event source is back online.
Omnicast™ is the IP video management system
(VMS) that provides organizations of all sizes the ability to deploy a surveillance
system adapted to their needs. Supporting a wide range of IP cameras, it addresses the
growing demand for HD video and analytics, all the while protecting individual
Omnicast™ compatibility pack is the software component
that you need to install to make Security Center
compatible with an Omnicast™ 4.x system. Please note Omnicast™ 4.8 has reached End of Life.
For more information, see the Genetec™ Product Lifecyle
Federation™ role connects an Omnicast™ 4.x system to Security Center. That way, the Omnicast™ entities and events can be used in your
Security Center system. Please note
Omnicast™ 4.8 has reached End of Life. For more information, see the Genetec™ Product Lifecyle page.
An orphan file is a video file that is no longer referenced
by any archive database. Orphan files remain on the disk until they are manually
deleted. This situation occurs when the archive database is changed inadvertently,
creating a mismatch between the number of video files referenced in the database and the
actual number of video files stored on disk.
An output behavior is an entity that defines a custom
output signal format, such as a pulse with a delay and duration.
An overtime rule is an entity that defines a parking time
limit and the maximum number of violations enforceable within a single day. Overtime
rules are used in city and university parking enforcement. For university parking, an
overtime rule also defines the parking area where these restrictions
The paid time stage of a parking session begins when the convenience time expires. Vehicle owners can purchase parking time through a pay station or mobile app, and the payment system can be provided by integrated third-party parking permit providers.
A parking facility entity defines a large parking area
as a number of sectors and rows for the purpose of inventory tracking.
A parking lot is a polygon that defines the location and
shape of a parking area on a map. By defining the number of parking spaces inside the parking
lot, Security Center can calculate its percentage of
occupancy during a given time period.
A parking rule defines how and when a parking session is either
considered to be valid or in violation.
Free-Flow feature in Security Center uses parking sessions to track each vehicle's stay in a parking zone. A parking session is divided into four states: Valid (including convenience time, paid time, and grace period), Violation, Enforced, and Completed.
parking session states
A vehicle's parking session is divided into four states:
Valid (including convenience time, paid time, and grace period),
Violation, Enforced, and Completed. When a vehicle parks in a
parking zone, its parking session progresses through the parking session states based on
the timing that is configured for the parking rule, the validity of the paid time, and
whether the vehicle's parking session incurs a violation.
The Parking sessions task is an
investigation task that you can use to generate a list of vehicles that are currently in
violation. You can create a vehicle inventory report for the current parking zone occupancy or
for a specific time in the past based on the selected time filter.
The parking zones that you define in Security Center represent off-street parking lots
where the entrances and exits are monitored by Sharp cameras.
The Parking zone activities
task is an investigation task that you can use to track the parking zone-related events
that occur between the time the vehicle's plate is read at the entrance and at the exit
of the parking zone.
parking zone capacity
The parking zone capacity is the maximum number of
vehicles that can be parked in a parking zone.
parking zone capacity threshold
The parking zone capacity threshold setting determines at what point a capacity threshold reached event is generated. For example, if you lower the threshold to 90%, the system generates an event when the parking zone reaches 90% capacity.
A partition is an entity in Security Center that defines a set of entities that
are only visible to a specific group of users. For example, a partition could include
all areas, doors, cameras, and zones in one building.
A patch version is a software version that adds support for
new devices, bug fixes, and security fixes. Patch versions do not affect system
compatibility, as long as all your system components are at the same major version. If
you are on the Long-Term Support (LTS) track, patch versions only include critical bug
and security fixes. A patch version is indicated by a version number where the fourth
position is not a zero.
For more information, see our Product Lifecycle
page on GTAP.
A patrol vehicle monitors parking lots and city streets
for parking violations or wanted vehicles. A patrol vehicle includes one or more
Sharp automatic license plate recognition
(ALPR) cameras and an in-vehicle computer running Genetec
A patroller entity in Security Center represents a patrol vehicle equipped
with an in-vehicle computer running Genetec
Patroller Config Tool
Patroller™ Config Tool is the Genetec
Patroller™ administrative application used to configure
Patroller-specific settings, such as adding Sharp
cameras to the in-vehicle LAN, enabling features such as Manual Capture or New Wanted, and
specifying that a username and password are needed to log on to Genetec
The Patroller tracking task is an
investigation task that you can use to replay the route followed by a patrol vehicle on
a given date on a map, or view the current location of patrol vehicles on a
The People counting task is an
operation task that keeps count in real-time of the number of cardholders in all secured
areas of your system.
Perimeter arm is arming an intrusion detection area in such a way that only sensors attributed to the area perimeter set the alarm off if triggered. Other sensors, such as motion sensors inside the area, are ignored.
A permit is an entity that defines a single parking permit holder
list. Each permit holder is characterized by a category (permit zone), a license plate number,
a license issuing state, and optionally, a permit validity range (effective date and expiry
date). Permits are used in both city and university parking enforcement.
A permit hit is a hit that is generated when a read (license plate
number) does not match any entry in a permit or when it matches an invalid
A permit restriction is an entity that applies time
restrictions to a series of parking permits for a given parking area. Permit restrictions can
be used by patrol vehicles configured for University Parking Enforcement and for systems that
use the AutoVu™
In cryptography, plaintext is the data that is not
(Obsolete) Plan Manager is a module of Security Center that provides interactive mapping
functionality to better visualize your security environment. The Plan Manager module has
been replaced by the Security Center role, Map
Manager, since version 5.4 GA.
Plate Reader is the software component of the Sharp unit that processes the images captured by the
ALPR camera to produce license plate reads, and associates each license plate read with a
context image captured by the context camera. The Plate Reader also handles the
communications with the Genetec
Patroller™ and the ALPR
Manager. If an external wheel imaging camera is connected to the Sharp unit, the Plate Reader also captures wheel
images from this camera.
A plugin (in lowercase) is a software component that adds a
specific feature to an existing program. Depending on the context, plugin can refer
either to the software component itself or to the software package used to install the
A plugin role adds optional features to Security Center. A plugin role is created by using
the Plugin role template. By default, it is represented by an orange puzzle piece
in the Roles view of the System task.
Before you can create a plugin role, the software
package specific to that role must be installed on your system.
Plugin (with an uppercase, in singular) is the role
template that serves to create specific plugin roles.
The Plugins task is an administration
task that you can use to configure plugin-specific roles and related
The primary server is the default server chosen to perform
a specific function (or role) in the system. To increase the system's fault-tolerance, the
primary server can be protected by a secondary server on standby. When the primary server
becomes unavailable, the secondary server automatically takes over.
In Security Center, privacy protection is software that
anonymizes or masks parts of a video stream where movement is detected. The identity of
individuals or moving objects is protected, without obscuring movements and actions or
The Privacy Protector™ role requests original video
streams from Archiver roles and applies data anonymization to the original video
streams. The privacy-protected (anonymized) video stream is then sent back to the
Archiver role for recording.
private IP address
A private IP address is an IP address chosen from a
range of addresses that are only valid for use on a LAN. The ranges for a private IP
address are: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.16.255.255, and 192.168.0.0
to 192.168.255.255. Routers on the Internet are normally configured to discard any
traffic using private IP addresses.
In cryptography, a private or secret key is either an
encryption or decryption key known only to one of the parties that exchange secret
A private task is a saved task that is only visible to the
user who created it.
Privileges define what users can do, such as arming zones,
blocking cameras, and unlocking doors, over the part of the system they have access
The Privilege troubleshooter is a tool that
helps you investigate the allocation of user privileges in your Security Center system.
With this tool, you can
- Who has permission to work with a selected entity
- What privileges are granted to selected users or groups
- Who has been granted a privilege, has access to a specific entity, or both
In cryptography, a public key is a value provided by a
designated authority as an encryption key that, combined with a private key that is
generated at the same time, can be used to effectively encrypt messages and verify
Public-key encryption, also known as asymmetric
encryption, is a type of encryption where two different keys are used to encrypt and
decrypt information. The private key is a key that is known only to its owner, while the
public key can be shared with other entities on the network. What is encrypted with one
key can only be decrypted with the other key.
A public-key infrastructure (PKI) is a set of hardware, software,
people, policies, and procedures needed to support the distribution and identification
of public encryption keys. This enables users and computers to securely exchange data
over networks such as the Internet and verify the identity of the other
public-key infrastructure (PKI)
A public task is a saved task that can be shared and reused among multiple Security Center users.
A reader is a sensor that reads the credential for an access control
system. For example, this can be a card reader, or a biometrics scanner.
The read rate measures the speed at which a license plate
recognition system can correctly detect and read all of the characters in an image of a
The Reads task is an investigation task that
reports on license plate reads performed within a selected time range and geographic
Reads/hits per day
The Reads/hits per day task is an
investigation task that reports on license plate reads performed within a selected time
range and geographic area.
Reads/hits per zone
The Reads/hits per zone task is an
investigation task that reports on the number of reads and hits per parking area for a
selected date range.
In identity terms, a realm is the set of applications,
URLs, domains, or sites for which a token is valid. Typically a realm is defined using
an Internet domain such as genetec.com, or a path within that domain, such as
genetec.com/support/GTAC. A realm is sometimes described as a security domain because it
encompasses all applications within a specified security boundary.
The record cache is the database where the Record Caching
Service role keeps copies of records ingested from external data sources in Security Center. You can generate reports on the
cached records using the Records investigation
Record Caching Service
The Record Caching Service role is used for data
ingestion. Using this role, you can import records from external data sources
into Security Center. You can share the ingested
data across the entire unified platform to enhance awareness and response, to provide
contextual information on dynamic maps, or to visualize in operational
Record Fusion Service
The Record Fusion Service is the central role that
provides a unified querying mechanism for data records that come from a wide variety of
sources, such as Security Center modules or
third-party applications. All record requests go through this role, which then queries
their respective record providers.
A record provider is either a Security Center role or an SDK application that
connects a data source to the Record Fusion Service role.
In Security Center, a
record type defines the data format and display properties of a set of records that you
can share across the entire system through the Record Fusion Service
Recording mode is the criteria by which the system
schedules the recording of video streams.
There are four possible recording modes:
- Continuous. Records continuously.
- On motion/Manual. Records according to motion detection settings, and when a user
or system action requests it.
- Manual. Records only when a user or system action requests it.
- Off. No recording is permitted.
Recording state is the current recording status of a given
camera. There are four possible recording states: Enabled, Disabled,
Currently recording (unlocked), and Currently recording
The Records task in an investigation
task that you can use to query the record providers registered in Security Center and find relevant information based
on known or suspected correlations.
A redirector is a server assigned to host a redirector agent
created by the Media Router role.
A redirector agent is an agent created by the Media Router
role to redirect data streams from one IP endpoint to another.
Redundant archiving is an option to enhance the
availability of video and audio archives during failover and to protect against data
loss. If you enable this option, all servers assigned to an Archiver role archive video,
and audio, at the same time.
The Remote task is an operation task that
you can use to remotely monitor and control other Security
Desk applications in your system that
are running the Monitoring task or the Alarm
The Remote configuration task
is an administration task that you can use to configure federated Security Center entities without logging off from
your local Config
Rendering rate is the comparison of how fast the workstation
renders a video with the speed the workstation receives that video from the
The Report Manager role automates report emailing and
printing based on schedules.
The report pane is one of the panes found in the Security
Desk workspace. It displays query
results or real-time events in a tabular form.
request to exit
Request to exit (REX) is a door release button normally located
on the inside of a secured area that when pressed, allows a person to exit the secured
area without having to show any credential. This can also be the signal from a motion
detector. It is also the signal received by the controller for a request to
request to exit (REX)
Restricted cameras are cameras that Genetec Inc. has identified as cybersecurity
Reverse geocoding is the process of converting a
geographic location, such as a latitude and longitude pair, into a human-readable
A reverse tunnel is a private communication channel open
between a server inside a secured LAN and a client outside. In the Security Center implementation, certificate
authentication is used to protect against man-in-the-middle attacks.
Reverse tunneling is a technique used on servers
protected behind a firewall to avoid having to open inbound ports to receive requests from
clients found on the other side of the firewall. Instead of having the client contact the
server, the communication is reversed. The client generates a keyfile that includes an
identity certificate about itself that the server uses to contact the client, hence,
eliminating the need to open any inbound port on the server.
A role is a software component that performs a specific job within
Security Center. To execute a role, you must assign one or more servers to host
roles and units view
The roles and units view is a browser view that lists the
roles on your system with the units they control as child entities.
A route is a setting that configures the transmission capabilities
between two end points in a network for the purpose of routing media
The Rules Engine is the component of the Genetec Mission
Control™ system that analyzes and correlates
the events collected by Security Center, based
on predefined rules. The Rules Engine uses these events to detect and trigger incidents
in the Genetec Mission
The same position regulation is a type of parking
regulation characterizing an overtime rule. A vehicle is in violation if it is seen parked at
the exact same spot over a specified period of time. Genetec
Patroller™ must be equipped with GPS capability to enforce
this type of regulation.
A schedule is an entity that defines a set of time constraints
that can be applied to a multitude of situations in the system. Each time constraint is
defined by a date coverage (daily, weekly, ordinal, or specific) and a time coverage (all day,
fixed range, daytime, and nighttime).
A scheduled task is an entity that defines an action that
executes automatically on a specific date and time, or according to a recurring
An SDK certificate is what an SDK application (or plugin)
needs to connect to Security Center. The
certificate must be included in the Security Center license key for the SDK application
A secondary server is an alternative server on standby
intended to replace the primary server in case the latter becomes
Also known as: standby
Secure Socket Layer
The Secure Sockets Layer (SSL) is a computer networking protocol
that manages server authentication, client authentication and encrypted communication
between servers and clients.
Secure Socket Layer (SSL)
A secured area is an area entity that represents a physical
location where access is controlled. A secured area consists of perimeter doors (doors
used to enter and exit the area) and access restrictions (rules governing the access to
is a truly unified platform that blends IP video surveillance, access control, automatic
license plate recognition, intrusion detection, and communications within one intuitive and
modular solution. By taking advantage of a unified approach to security, your organization
becomes more efficient, makes better decisions, and responds to situations and threats with
The Security Center
Federation™ role connects a remote independent Security Center system to your local Security Center system. That way, the remote system's
entities and events can be used in your local system.
Security Center Mobile
(Obsolete) See Mobile Server and Genetec™ Mobile.
Security Center Mobile application
(Obsolete) See Genetec™ Mobile.
Security Center SaaS
The Security Center SaaS edition is Security Center offered by subscription.
Subscription-based ownership simplifies the transition to cloud services and provides an
alternative way to purchase, deploy, and maintain the Genetec™
Security Center unified
A security clearance is a numerical value used to further
restrict the access to an area when a threat level is in effect. Cardholders can only
enter an area if their security clearance is equal or higher than the minimum security
clearance set on the area.
is the unified user interface of Security Center. It
provides consistent operator flow across all of the Security Center main systems, Omnicast™, Synergis™,
and AutoVu™. The unique task-based design of Security
Desk lets operators efficiently control and
monitor multiple security and public safety applications.
An on-the-wire representation of claims that is
cryptographically signed by the issuer of the claims, providing strong proof to any
relying party as to the integrity of the claims and the identity of the issuer.
The Security video
analytics task is an investigation task that reports on video analytics
events that are triggered based on analytics scenarios.
A self-signed certificate is an identity
certificate that is signed by the same entity whose identity it certifies, as
opposed to a certificate authority (CA). Self-signed certificates are easy to
make and do not cost money. However, they do not provide all of the security properties
that certificates signed by a CA aim to provide.
In Security Center, a
server entity represents a computer on which the Genetec™
Server service is
A server certificate is an identity certificate
used to authenticate the server's identity to the client. Server certificates are also
used to encrypt data-in-transit to ensure data confidentiality.
The server mode is a special online operation mode restricted
to Synergis™ units, in which the unit allows the Access Manager (the server) to make all
access control decisions. The unit must stay connected to the Access Manager at all
times to operate in this mode.
is the web application running on every server machine in Security Center that you use to configure the Genetec™
Server settings. You use this same application
to configure the Directory role on the main server.
A sharing guest is a Security Center system that has been
given the rights to view and modify entities owned by another Security Center system,
called the sharing host. Sharing is done by placing the entities in a global
A sharing host is a Security Center system that gives the right to other
Security Center systems to view and modify
its entities by putting them up for sharing in a global partition.
is a web-based administration tool used to configure Sharp cameras for AutoVu™ systems. From a web browser, you log on to a specific
IP address (or the Sharp name in certain cases) that
corresponds to the Sharp you want to configure. When
you log on, you can configure options such as selecting the ALPR context (for example,
Alabama, Oregon, Quebec), selecting the read strategy (for example, fast moving or slow moving
vehicles), viewing the Sharp’s live video feed, and
The Sharp unit is a
proprietary ALPR unit of Genetec Inc. that
integrates license plate capturing and processing components, as well as digital video
processing functions, inside a ruggedized casing.
SharpOS is the
software component of a Sharp unit. SharpOS is responsible for everything related to plate
capture, collection, processing, and analytics. For example, a SharpOS update can include new ALPR contexts, new
Portal updates, and updates to
the Sharp's Windows services (Plate Reader, HAL, and
SharpV is a Sharp unit that is specialized for fixed
installations and is ideally suited for a range of applications, from managing
off-street parking lots and facilities to covering major city access points to detect
wanted vehicles. SharpV combines two
high-definition cameras (1.2MP) with onboard processing and illumination in a
ruggedized, environmentally sealed unit. Both lenses are varifocal for ease of
installation and the camera is powered via PoE+.
SharpX is the camera
component of the SharpX system. The SharpX camera unit integrates a pulsed LED illuminator that
works in total darkness (0 lux), a monochrome ALPR camera (1024 x 946 @ 30 fps), and a color
context camera (640 x 480 @ 30 fps). The ALPR data captured by the SharpX camera unit is processed by a separate hardware
component called the AutoVu™ ALPR Processing
Single sign-on (SSO) is the use of a single user
authentication for multiple IT systems or even organizations.
single sign-on (SSO)
Software Development Kit
The Software Development Kit (SDK) is what end-users use to develop
custom applications or custom application extensions for Security Center.
Software Development Kit (SDK)
Soft antipassback only logs the passback events in the
database. It does not restrict the door from being unlocked due to the passback
Standalone mode is an operation mode where the interface
module makes autonomous decisions based on the access control settings previously
downloaded from the Synergis™ unit. When the module is online, activity reporting occurs
live. When the module is offline, activity reporting occurs on schedule, or when the
connection to the unit is available. Not all interface modules can operate in standalone
A standard schedule is a schedule entity that can be
used in all situations. Its only limitation is that it does not support daytime or
In a system that uses the Pay-by-Plate
Sync plugin, a static permit holds a list of
vehicle license plates that is not updated by a third-party permit provider. For
example, a list of employee vehicles that are authorized to park in the lot are manually
maintained as a static list.
A strict antipassback is an antipassback option. When
enabled, a passback event is generated when a cardholder attempts to leave an area that
they were never granted access to. When disabled, Security Center only generates
passback events for cardholders entering an area that they never exited.
Supervised mode is an online operation mode of the
interface module where the interface module makes decisions based on the access control
settings previously downloaded from the Synergis™ unit. The interface module reports its
activities in real time to the unit, and allows the unit to override a decision if it
contradicts the current settings in the unit. Not all interface modules can operate in
A Streamvault™ is a turnkey appliance that comes with an
embedded operating system and Security Center
pre-installed. You can use Streamvault™ appliances to quickly deploy a unified or
standalone video surveillance and access control system.
Control Panel is a user interface application
that you can use to configure your Streamvault™ appliance to work with Security Center access control and video
Symmetric encryption is a type of encryption where
the same key is used for both encryption and decryption.
A synchronous video is a simultaneous live video or playback
video from more than one camera that are synchronized in time.
Synergis™ is the IP access control system (ACS) that
heightens your organization’s physical security and increases your readiness to respond to
threats. Synergis™ supports an ever-growing portfolio
of third-party door control hardware and electronic locks. Using Synergis™, you can leverage your existing investment in
network and security equipment.
appliance is an IP-ready security appliance manufactured by Genetec Inc. that is dedicated to access control
functions. All Synergis™ appliances come
pre-installed with Synergis™
Softwire and are enrolled as
access control units in Security Center.
Synergis™ Appliance Portal
The Synergis™ Appliance Portal
is the web-based administration tool used to configure and administer the Synergis™ appliance and upgrade its
Link is an
intelligent PoE-enabled IoT gateway designed to address the demand for a non-proprietary
access control solution. Synergis™ Cloud
Link provides native
support for a wide variety of intelligent controllers and electronic
clustering is a feature designed for large systems to optimize the way that cardholder
synchronization is handled between Access Manager roles and Synergis™ Cloud
Link units. When the feature is enabled, only active
cardholders managed by the same Access Manager, based on access rules, are synchronized
to the Synergis™ Cloud
Synergis™ IX (pronounced
"eye-ex") is a family of hybrid controllers and downstream modules used to manage both
access control points and intrusion points. The Synergis™ IX product line is only available to the Australian
and New Zealand markets.
(SMC) is an access control appliance of Genetec Inc. that supports various third-party
interface modules over IP and RS-485. SMC is seamlessly integrated with Security Center and can make access control decisions
independently of the Access Manager.
Softwire is the
access control software developed by Genetec Inc. to run on various IP-ready security
Softwire lets these appliances
communicate with third-party interface modules. A security appliance running Synergis™
Softwire is enrolled as an access control unit in
A Synergis™ unit is a Synergis™ appliance that is
enrolled as an access control unit in Security Center.
Availability Monitor (SAM) running, you can
collect health information and view the health status of your Security Center systems to prevent and proactively
resolve technical issues.
Availability Monitor Agent
Availability Monitor Agent (SAMA) is the
component of SAM that is installed on every Security Center main server. SAMA collects
health information from Security Center and
sends health information to the Health Monitoring Services in the cloud.
Availability Monitor Agent
The System task is an administration
task that you can use to configure roles, macros, schedules, and other system entities
A system event is a predefined event that indicates the occurrence
of an activity or incident. System events are defined by the system and cannot be
renamed or deleted.
The System status task is a
maintenance task that you can use to monitor the status of all entities of a given type
in real time and to interact with them.
A task is the central concept on which the entire Security Center user interface is built. Each task
corresponds to one aspect of your work as a security professional. For example, use a
monitoring task to monitor system events in real-time, use an investigation task to discover
suspicious activity patterns, or use an administration task to configure your system. All
tasks can be customized and multiple tasks can be carried out simultaneously.
A taskbar is a user interface element of the Security Center client application window, composed
of the Home tab and the active task list. The taskbar can be
configured to be displayed on any edge of the application window.
A task cycling is a Security
Desk feature that automatically
cycles through all tasks in the active task list following a fixed dwell
A task workspace is an area in the Security Center client application window reserved
for the current task. The workspace is typically divided into the following panes:
canvas, report pane, controls, and area view.
temporary access rule
A temporary access rule is an access rule that has
an activation and an expiration time. Temporary access rules are suited for situations
where permanent cardholders need to have temporary or seasonal access to restricted
areas. These access rules are automatically deleted seven days after they expire to
avoid cluttering the system.
Third-party authentication uses a trusted,
external identity provider to validate user credentials before granting access to one or
more IT systems. The authentication process returns identifying information, such as a
username and group membership, that is used to authorize or deny the requested
Threat level is an emergency handling procedure that a Security
Desk operator can enact on one area or the entire system to deal promptly with a
potentially dangerous situation, such as a fire or a shooting.
A tile is an individual window within the canvas, used to display a
single entity. The entity displayed is typically the video from a camera, a map, or
anything of a graphical nature. The look and feel of the tile depends on the displayed
The tile ID is the number displayed at the upper left corner of the
tile. This number uniquely identifies each tile within the canvas.
Tile mode is the main Security
Desk canvas operating mode that
presents information in separate tiles.
The tile pattern is the arrangement of tiles within the
A tile plugin is a software component that runs inside a
Desk tile. By default, it is
represented by a green puzzle piece in the area view.
Time and attendance
The Time and attendance task is
an investigation task that reports on who has been inside a selected area and the total
duration of their stay within a given time range.
Timed antipassback is an antipassback option. When
Security Center considers a cardholder to be already in an area, a passback event is
generated when the cardholder attempts to access the same area again during the time
delay defined by Presence timeout. When the time delay has expired, the
cardholder can once again pass into the area without generating a passback
A timeline is a graphic illustration of a video sequence,
showing where in time, motion and bookmarks are found. Thumbnails can also be added to
the timeline to help the user select the segment of interest.
A transfer group is a persistent archive transfer scenario
that lets you run a video transfer without redefining the transfer settings. These
transfers can be scheduled or executed on demand. Transfer groups define which cameras
or archiving roles are included in the transfer, when the archives are transferred, what
data is transferred, and so on.
Transient parking is a parking scenario where the driver must
purchase parking time as soon as the vehicle enters the parking lot.
Transmission Control Protocol
A connection-oriented set of rules (protocol) that, along with the
IP (Internet Protocol), is used to send data over an IP network. The TCP/IP protocol
defines how data can be transmitted in a secure manner between networks. TCP/IP is the
most widely used communications standard and is the basis for the Internet.
Transmission Control Protocol (TCP)
Transport Layer Security
Transport Layer Security (TLS) is a protocol that provides
communications privacy and data integrity between two applications communicating over a
network. When a server and client communicate, TLS ensures that no third party may
eavesdrop or tamper with any message. TLS is the successor to the Secure Sockets Layer
Transport Layer Security (TLS)
A twilight schedule is a schedule entity that supports
both daytime and nighttime coverages. A twilight schedule cannot be used in all
situations. Its primary function is to control video related behaviors.
The two-person rule is the access restriction placed on a door
that requires two cardholders (including visitors) to present their credentials within a
certain delay of each other in order to gain access.
A unit is a hardware device that communicates over an IP network that can
be directly controlled by a Security Center role.
We distinguish four types of
units in Security Center
- Access control units, managed by the Access Manager role
- Video units, managed by the Archiver role
- ALPR units, managed by the ALPR Manager role
- Intrusion detection units, managed by the Intrusion Manager role
The Unit Assistant is the central role that manages
system-wide security operations, such as updating unit passwords and renewing unit
certificates, on supported access control and video units.
Unit discovery tool
Starting with Security Center 5.4 GA the Unit discovery tool has
been replaced by the Unit enrollment tool.
Unit enrollment is a tool that you can use to
discover IP units (video and access control) connected to your network, based on their
manufacturer and network properties (discovery port, IP address range, password, and so on).
After you discovered a unit, you can add it to your system.
Unit replacement is a tool that you can use to replace a
failed hardware device with a compatible one, while ensuring that the data associated to the
old unit gets transferred to the new one. For an access control unit, the configuration of the
old unit is copied to the new unit. For a video unit, the video archive associated to the old
unit is now associated to the new unit, but the unit configuration is not
Unit synchronization is the process of downloading
the latest Security Center settings to an access control unit. These settings, such as
access rules, cardholders, credentials, unlock schedules, and so on, are required so
that the unit can make accurate and autonomous decisions in the absence of the Access
University Parking Enforcement is a Genetec
Patroller™ software installation that is configured
for university parking enforcement: the enforcement of scheduled parking permits or
overtime restrictions. The use of maps is mandatory. Hotlist functionality is also
An unlock schedule defines the periods of time when free access
is granted through an access point (door side or elevator floor).
An unreconciled read is an MLPI license plate read that
has not been committed to an inventory.
A user is an entity that identifies a person who uses Security Center applications and defines the rights
and privileges that person has on the system. Users can be created manually or imported
from an Active Directory.
A user group is an entity that defines a group of users who
share common properties and privileges. By becoming member of a group, a user automatically
inherits all the properties of the group. A user can be a member of multiple user groups. User
groups can also be nested.
user level (Security Center)
A user level is a numeric value assigned to users to restrict their ability to perform certain operations, such as controlling a camera PTZ, viewing the video feed from a camera, or staying logged on when a threat level is set. Level 1 is the highest user level, with the most privileges.
The User management task is an
administration task that you can use to configure users, user groups, and
A validation key is a serial number uniquely identifying a
computer that must be provided to obtain the license key.
The Vault is a tool that displays your saved snapshots and
exported G64, G64x, and GEK (encrypted) video files. From the Vault, you can view the video
files, encrypt and decrypt files, convert files to ASF, or package files with the Genetec™ Video
vehicle identification number
A vehicle identification number (VIN) is an
identification number that a manufacturer assigns to vehicles. This is usually visible
from outside the vehicle as a small plate on the dashboard. A VIN can be included as
additional information with license plate entries in a hotlist or permit list, to
further validate a hit and ensure that it is the correct vehicle.
vehicle identification number (VIN)
Video analytics is the software technology that is used
to analyze video for specific information about its content. Examples of video analytics
include counting the number of people crossing a line, detection of unattended objects,
or the direction of people walking or running.
A video archive is a collection of video, audio, and
metadata streams managed by an Archiver or Auxilliary Archiver role. These collections
are catalogued in the archive database that includes camera events linked to the
A video decoder is a device that converts a digital video stream
into analog signals (NTSC or PAL) for display on an analog monitor. The video decoder is
one of the many devices found on a video decoding unit.
video encoder (Security Center)
A video encoder is a device that converts an analog video
source to a digital format by using a standard compression algorithm, such as H.264, MPEG-4,
MPEG-2, or M-JPEG. The video encoder is one of the many devices found on a video encoding
A video file is a file created by an archiving role (Archiver
or Auxiliary Archiver) to store archived video. The file extension is G64 or G64x. You
Desk or the Genetec™ Video
Player to view video files.
Video file explorer
The Video file explorer is an
investigation task that you can use to browse through your file system for video files
(G64 and G64x), and to play, convert to ASF, and verify the authenticity of these
Video can be protected against deletion. Protection is applied
on all video files needed to store the protected video sequence. Because no video file
can be partially protected, the actual length of the protected video sequence depends on
the granularity of the video files.
A video sequence is any recorded video stream of a certain
A video stream is an entity representing a specific video
quality configuration (data format, image resolution, bit rate, frame rate, and so on)
on a camera.
The Video task is an administration task
that you can use to configure video management roles, units, analog monitors, and
A video unit is a video encoding or decoding device that is
capable of communicating over an IP network and that can incorporate one or more video
The high-end encoding models also include their own recording and video analytics
capabilities. Cameras (IP or analog), video encoders, and video decoders are all
examples of video units. In Security Center, a video unit refers to an entity
that represents a video encoding or decoding device.
Video watermarking adds visible text to live, playback,
and exported video processed by Security Center. This text includes identifying information
that is intended to deter unauthorized users from leaking video recordings.
Beginning in Security Center 220.127.116.11, video watermarking no longer refers to the use of
digital signatures for tampering protection. Tampering protection is now called digital
We call virtual alarm, an alarm on an intrusion
detection area that is activated through a virtual input.
A virtual input is an input on an intrusion detection unit
that is physically connected to an output so that Security Center can trigger it through the Trigger
A virtual zone is a zone entity where the I/O linking is done by
software. The input and output devices can belong to different units of different types.
A virtual zone is controlled by the Zone Manager and only works when all the units are
online. It can be armed and disarmed from Security
The Visit details task is an
investigation task that reports on the stay (check-in and check-out time) of current and
The Visitor activities task is an
investigation task that reports on visitor activities (access denied, first person in,
last person out, antipassback violation, and so on).
visitor escort rule
The visitor escort rule is the additional access
restriction placed on a secured area that requires visitors to be escorted by a
cardholder during their stay. Visitors who have a host are not granted access through
access points until both they and their assigned host (cardholder) present their
credentials within a certain delay.
The Visitor management task is
the operation task that you can use to check in, check out, and modify visitors, as well
as manage their credentials, including temporary replacement cards.
Visual reporting is dynamic charts or graphs in Security
that deliver insights that you act on. You can perform searches and investigate
situations using these visual and user-friendly reports. The visual report data can be
analyzed to help identify activity patterns and enhance your
Visual tracking is a Security Center feature that lets you follow an individual in
live or playback mode through areas of your facility that are monitored by
The VSIP port is the name given to the discovery port of Verint
units. A given Archiver can be configured to listen to multiple VSIP
is a Security Center service installed alongside the
Server service on every server
computer. Genetec™ Watchdog monitors the Genetec™
Server service, and restarts it if abnormal
conditions are detected.
Wearable Camera Manager
The Wearable Camera Manager role is used to
configure and manage body-worn camera (BWC) devices in Security Center, including configuring camera stations,
adding officers (wearable camera users), uploading content to an Archiver, and setting the
retention period for uploaded evidence.
Web-based authentication (also known as passive
authentication) is when the client application redirects the user to a web form managed by a
trusted identity provider. The identity provider can request any number of credentials
(passwords, security tokens, biometric verifications, and so on) to create a multi-layer
defense against unauthorized access. This is also known as multi-factor
The Web-based SDK role exposes the Security Center SDK methods and
objects as web services to support cross-platform development.
Client is the web application that
gives users remote access to Security Center so
that they can monitor videos, investigate events related to various system entities,
search for and investigate alarms, and manage cardholders, visitors, and credentials.
Users can log on to Web Client from any computer that has a supported web browser
The Web Server role is used to configure the Web
Client, a web application that gives users remote
access to Security Center. Each role created defines a
unique web address (URL) that users enter in their web browser to log on to the Web Client and
access information from Security Center.
Web Map Service
Web Map Service (WMS) is a standard protocol for serving
georeferenced map images over the Internet that are generated by a map server using data
from a GIS database.
Web Map Service (WMS)
Wheel imaging is a virtual tire-chalking technology that takes
images of the wheels of vehicles to prove whether they have moved between two license
A whitelist is a hotlist that is created to grant a group of
license plates access to a parking lot. A whitelist can be compared to an access rule where
the secured area is the parking lot. Instead of listing the cardholders, the whitelist applies
to license plate credentials.
A widget is a component of the graphical user interface (GUI) with
which the user interacts.
Windows Communication Foundation
Windows Communication Foundation (WCF) is
a communication architecture used to enable applications, in one machine or for multiple
machines connected by a network, to communicate. Genetec
Patroller™ uses WCF to communicate wirelessly with
Windows Communication Foundation (WCF)
X.509 certificate and digital certificate are
synonyms. In Security Center, these two terms
are used interchangeably.
A zone is an entity that monitors a set of inputs and triggers
events based on their combined states. These events can be used to control output
The Zone activities task is an
investigation task that reports on zone related activities (zone armed, zone disarmed,
lock released, lock secured, and so on).
The Zone Manager role manages virtual zones and triggers
events or output relays based on the inputs configured for each zone. It also logs the zone
events in a database for zone activity reports.
The Zone occupancy task is an
investigation task that reports on the number of vehicles parked in a selected parking
area, and the percentage of occupancy.