Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
en:e_d [2016/07/08 14:18]
127.0.0.1 external edit
en:e_d [2019/01/09 14:12] (current)
sypark1
Line 8: Line 8:
 <button type="​info"​ size="​xs">​[[e_E|E]]</​button>​ <button type="​info"​ size="​xs">​[[e_E|E]]</​button>​
 <button type="​info"​ size="​xs">​[[e_F|F]]</​button>​ <button type="​info"​ size="​xs">​[[e_F|F]]</​button>​
-<button type="​info"​ size="​xs" disabled="​true">​G</​button>​+<button type="​info"​ size="​xs">​[[e_G|G]]</​button>​
 <button type="​info"​ size="​xs">​[[e_H|H]]</​button>​ <button type="​info"​ size="​xs">​[[e_H|H]]</​button>​
 <button type="​info"​ size="​xs">​[[e_I|I]]</​button>​ <button type="​info"​ size="​xs">​[[e_I|I]]</​button>​
Line 37: Line 37:
  
   * [[daisy_chain|Daisy Chain]]: A daisy chain is a wiring scheme in which hardware devices are connected together in sequence. \\   * [[daisy_chain|Daisy Chain]]: A daisy chain is a wiring scheme in which hardware devices are connected together in sequence. \\
 +
 +  * [[dst|Daylight Saving Time(DST)]]:​ Also called summer time, DST is the practice of moving the clocks forward a certain amount of time from standard time for the purpose of saving energy through more efficient use of the daytime in the summer. \\
   ​   ​
   * [[dbms|DBMS (Database Management System)]]: A DBMS is a software that controls and manages database, and interacts with a user or an application to access data in the database. \\   * [[dbms|DBMS (Database Management System)]]: A DBMS is a software that controls and manages database, and interacts with a user or an application to access data in the database. \\
 +  ​
 +  * [[decryption|Decryption]]:​ The act of recovering encrypted data using decryption keys. Encrypted data can only be decrypted with a symmetric key that pairs with the key used for the encryption of the encrypted data. \\
   ​   ​
   * [[device|Device]]:​ An access control device that can be controlled in the BioStar. \\   * [[device|Device]]:​ An access control device that can be controlled in the BioStar. \\
Line 45: Line 49:
   ​   ​
   * [[dhcp|DHCP]]:​ A communication protocol used for the automatic allocation and management of settings required for TCP/IP communication. \\   * [[dhcp|DHCP]]:​ A communication protocol used for the automatic allocation and management of settings required for TCP/IP communication. \\
-  ​+ 
 +  * [[diode|Diode]]:​ A component that controls the current to flow in a single direction only. This component is used to prevent reverse current flow that momentarily occurs when the door lock operates. \\ 
   * [[dip_switch|DIP switch]]: A DIP switch is an On/Off switch that is used to control the behavior of a device circuit board without hardware alteration. \\   * [[dip_switch|DIP switch]]: A DIP switch is an On/Off switch that is used to control the behavior of a device circuit board without hardware alteration. \\
 +
 +  * [[direct_mode|Direct mode]]: A mode whereby the BioStar 2 client directly searches for connectable devices and connecting to them. In this mode, the client is responsible for communicating with devices and servers. In this mode, a list of connectable devices is shown when a device search is performed on the server, and the administrator can select a device to connect from the list. \\
   ​   ​
   * [[disarm|Disarm]]:​ The act of suspending the operation of an alarm system activated for a specific zone. \\   * [[disarm|Disarm]]:​ The act of suspending the operation of an alarm system activated for a specific zone. \\
Line 57: Line 65:
   ​   ​
   * [[dual_auth|Double mode]]: An authentication method where the credentials of two different individuals are entered in sequence in a limited amount of time. \\   * [[dual_auth|Double mode]]: An authentication method where the credentials of two different individuals are entered in sequence in a limited amount of time. \\
 +
 +  * [[dummy_reader|Dummy Reader]]: A device that does not store or assess user data, but performs the role of reading credential data such as faces, fingerprints and cards, and transmits this data to the control device. \\
   ​   ​
   * [[duress|Duress finger]]: A fingerprint chosen to generate a certain event upon fingerprint registration. If a user authenticates himself/​herself with such a fingerprint,​ the authentication gets recorded in a [[log|log]] as duress fingerprint authentication. The system [[administrator|administrator]] can set a separate alarm using the log. \\   * [[duress|Duress finger]]: A fingerprint chosen to generate a certain event upon fingerprint registration. If a user authenticates himself/​herself with such a fingerprint,​ the authentication gets recorded in a [[log|log]] as duress fingerprint authentication. The system [[administrator|administrator]] can set a separate alarm using the log. \\