Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision | |||
|
en:e_c [2019/01/09 16:33] sypark1 |
en:e_c [2019/01/09 17:10] (current) sypark1 |
||
|---|---|---|---|
| Line 50: | Line 50: | ||
| | | ||
| * [[client|Client]]: Entity that requests service from the [[server|server]] through a network. \\ | * [[client|Client]]: Entity that requests service from the [[server|server]] through a network. \\ | ||
| - | | + | |
| * [[controller|Controller]]: A device that examines access rights based on [[credential|credential]] information obtained from a reader and controls the input and output of the reader. \\ | * [[controller|Controller]]: A device that examines access rights based on [[credential|credential]] information obtained from a reader and controls the input and output of the reader. \\ | ||
| + | | ||
| + | * [[contact_card|Contact card]]: A card with a gold or silver chip attached to the surface. For data transmission, a contact card must be inserted into a card terminal in order to place the chip in direct contact with the card terminal. \\ | ||
| + | |||
| + | * [[contactless_card|Contactless card]]: A card that communicates with a card terminal using its built-in coil antenna. This type of card enables transmission of data using a magnetic field without contacting a card terminal. \\ | ||
| | | ||
| * [[credential|Credential]]: Data used to identify users. Digital signatures, smart cards, biometric data, user names, passwords, etc. are common examples of credentials. \\ | * [[credential|Credential]]: Data used to identify users. Digital signatures, smart cards, biometric data, user names, passwords, etc. are common examples of credentials. \\ | ||