Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
en:glossary [2019/01/09 09:05]
sypark1
en:glossary [2023/08/01 17:12] (current)
mwkim
Line 35: Line 35:
 \\ \\
 \\ \\
- 
-  * [[onetoone_auth|1:​1 Authentication]]:​ The authentication process whereby a user's identity is verified. The verification performed involves a one-to-one comparison of the biometric information with previously enrolled Biometric template.\\ 
- 
-  * [[onetomany_auth|1:​N Authentication]]:​ The "One to Many" authentication process whereby a user Biometric is compared to a database. The authentication performed compares the biometric information of an individual with all the information registered on a database. ​ \\ 
  
   * [[access|Access]]:​ The act of accessing a particular zone or particular assets. \\   * [[access|Access]]:​ The act of accessing a particular zone or particular assets. \\
Line 53: Line 49:
        
   * [[acid|ACID]]:​ The ACID represents four main properties that a transaction should have, the terminology stands for Atomicity, Consistency,​ Isolation and Durability. Atomicity, as the very basic operation unit, requires each transaction to be ‘all or nothing’, or simply all-success or all-fail. Consistency ensures any transaction to bring the database from one valid state to another. Isolation ensures the [[transaction|transaction]] in process must remain isolated from any other transactions. Durability ensures integrity that committed data is kept in the drive even in the event of failure for restructure. \\   * [[acid|ACID]]:​ The ACID represents four main properties that a transaction should have, the terminology stands for Atomicity, Consistency,​ Isolation and Durability. Atomicity, as the very basic operation unit, requires each transaction to be ‘all or nothing’, or simply all-success or all-fail. Consistency ensures any transaction to bring the database from one valid state to another. Isolation ensures the [[transaction|transaction]] in process must remain isolated from any other transactions. Durability ensures integrity that committed data is kept in the drive even in the event of failure for restructure. \\
 +
 +  * [[ad_hoc|Ad Hoc Network]]: A network that is autonomously configured by each device without reliance on network infrastructure such as a base station and an access point. In this network, a dynamic and autonomous network topology is formed despite each device communicating through a wireless interface, as each device can be moved freely thanks to a routing function that enables the distance limitations of wireless communication to be overcome. \\
  
   * [[administrator|Administrator]]:​ The user who has full access to the configuration software. \\   * [[administrator|Administrator]]:​ The user who has full access to the configuration software. \\
Line 59: Line 57:
   ​   ​
   * [[alarm|Alarm]]:​ Among events occurred in the system, the type of [[event|event]] that requires action without delay. \\   * [[alarm|Alarm]]:​ Among events occurred in the system, the type of [[event|event]] that requires action without delay. \\
-  ​+
   * [[alarm_action|Alarm action]]: The actions that automatically perform activities such as controlling the device and sending emails when an alarm or a certain event occurs. \\   * [[alarm_action|Alarm action]]: The actions that automatically perform activities such as controlling the device and sending emails when an alarm or a certain event occurs. \\
   ​   ​
Line 85: Line 83:
   ​   ​
   * [[backlight_timeout|Backlight timeout]]: The duration of time the [[backlight|backlight]] remains on. \\   * [[backlight_timeout|Backlight timeout]]: The duration of time the [[backlight|backlight]] remains on. \\
 +
 +  * [[bandwidth|Bandwidth]]:​ A range of frequencies where certain functions can be performed; measured in hertz (Hz). The amount of information that can be transmitted over a wire or another medium over a period of time. The greater the frequency bandwidth, the more information can be sent over a certain period of time. \\
   ​   ​
   * [[batch_enrollment|Batch enrollment]]:​ The act of registering a multiple number of access cards on the BioStar server. Registered entry cards can be allocated to individual users. \\   * [[batch_enrollment|Batch enrollment]]:​ The act of registering a multiple number of access cards on the BioStar server. Registered entry cards can be allocated to individual users. \\
Line 97: Line 97:
   ​   ​
   * [[blacklist|Blacklist]]:​ A list of cards that are denied for authentication on the BioStar device. When a card is lost or stolen, misuse can be prevented by registering the ID of the card in the blacklist. \\   * [[blacklist|Blacklist]]:​ A list of cards that are denied for authentication on the BioStar device. When a card is lost or stolen, misuse can be prevented by registering the ID of the card in the blacklist. \\
 +
 +  * [[ble|BLE(Bluetooth Low Energy)]]: A [[bluetooth|Bluetooth]] technology that can transmit and receive low-power, low-volume data within a distance of about 10 m by using the 2.4 GHz frequency band. Low-power Bluetooth technology is mainly applied to small devices where the supply of power is limited due to low power consumption. It is also used in access control in the form of mobile ID cards. \\
 +
 +  * [[bluetooth|Bluetooth]]:​ A communication technology that supports bidirectional transmission and reception of data at close range. Each type of Bluetooth has different characteristics depending on the transmission distance, transmission method, power consumption,​ etc.  \\
   ​   ​
   * [[break|Break]]:​ A brief time taken off for rest during working hours. Each break is calculated as the time between the start and the end of the break. \\   * [[break|Break]]:​ A brief time taken off for rest during working hours. Each break is calculated as the time between the start and the end of the break. \\
-  ​+ 
 +  * [[brute_attack|Brutal attack]]: Also called Brute Force Attack, this term refers to the act of entering all possible values to unlock passwords. \\ 
   * [[bypass_card|Bypass card]]: A card that enables access to a specific zone by bypassing the authentication process. For example, people who possess this card can pass through the door without the need to go through a series of security (authentication) procedures. \\   * [[bypass_card|Bypass card]]: A card that enables access to a specific zone by bypassing the authentication process. For example, people who possess this card can pass through the door without the need to go through a series of security (authentication) procedures. \\
   ​   ​
Line 109: Line 115:
  
   * [[card_mode|Card mode]]: A method for authenticating cardholders. There are two card modes, [[card_id|Card ID]] mode and Template-on-Card mode. The Card ID mode compares the user ID that is stored on the device with fingerprint information,​ in reference to the card ID stored on the card. Whereas the Template-on-Card mode identifies a user by checking whether the fingerprint entered by the user matches the fingerprint information on the card. \\   * [[card_mode|Card mode]]: A method for authenticating cardholders. There are two card modes, [[card_id|Card ID]] mode and Template-on-Card mode. The Card ID mode compares the user ID that is stored on the device with fingerprint information,​ in reference to the card ID stored on the card. Whereas the Template-on-Card mode identifies a user by checking whether the fingerprint entered by the user matches the fingerprint information on the card. \\
 +
 +  * [[card_reader|Card reader]]: A device that reads the information stored on cards and transmits it to the controller.\\
 +
 +  * [[cde|CDE(Conformance Decision Engine)]]: One of the procedures for Suprema'​s fingerprint matching algorithm. This is a step that determines whether the obtained fingerprint image is valid prior to processing the fingerprint image and extracting the [[minutiae|minutiae]] of the fingerprint.
   ​   ​
-  * [[client|Client]]: Entity that requests service from the [[server|server]] through a network.  \\+  * [[clean_room|Clean room]]: A space where suspended particulate matter in air such as dust, viruses, metal powders, and cells can be controlled as required.  \\
   ​   ​
 +  * [[client|Client]]:​ Entity that requests service from the [[server|server]] through a network. ​ \\
 +
   * [[controller|Controller]]:​ A device that examines access rights based on [[credential|credential]] information obtained from a reader and controls the input and output of the reader. \\   * [[controller|Controller]]:​ A device that examines access rights based on [[credential|credential]] information obtained from a reader and controls the input and output of the reader. \\
 +  ​
 +  * [[contact_card|Contact card]]: A card with a gold or silver chip attached to the surface. For data transmission,​ a contact card must be inserted into a card terminal in order to place the chip in direct contact with the card terminal. \\
 +
 +  * [[contactless_card|Contactless card]]: A card that communicates with a card terminal using its built-in coil antenna. This type of card enables transmission of data using a magnetic field without contacting a card terminal. ​ \\
   ​   ​
   * [[credential|Credential]]:​ Data used to identify users. Digital signatures, smart cards, biometric data, user names, passwords, etc. are common examples of credentials. \\   * [[credential|Credential]]:​ Data used to identify users. Digital signatures, smart cards, biometric data, user names, passwords, etc. are common examples of credentials. \\
Line 119: Line 135:
   ​   ​
   * [[daisy_chain|Daisy Chain]]: A daisy chain is a wiring scheme in which hardware devices are connected together in sequence. \\   * [[daisy_chain|Daisy Chain]]: A daisy chain is a wiring scheme in which hardware devices are connected together in sequence. \\
 +
 +  * [[dst|Daylight Saving Time(DST)]]:​ Also called summer time, DST is the practice of moving the clocks forward a certain amount of time from standard time for the purpose of saving energy through more efficient use of the daytime in the summer. \\
   ​   ​
   * [[dbms|DBMS (Database Management System)]]: A DBMS is a software that controls and manages database, and interacts with a user or an application to access data in the database. \\   * [[dbms|DBMS (Database Management System)]]: A DBMS is a software that controls and manages database, and interacts with a user or an application to access data in the database. \\
 +  ​
 +  * [[decryption|Decryption]]:​ The act of recovering encrypted data using decryption keys. Encrypted data can only be decrypted with a symmetric key that pairs with the key used for the encryption of the encrypted data. \\
   ​   ​
   * [[device|Device]]:​ An access control device that can be controlled in the BioStar. \\   * [[device|Device]]:​ An access control device that can be controlled in the BioStar. \\
Line 127: Line 147:
   ​   ​
   * [[dhcp|DHCP]]:​ A communication protocol used for the automatic allocation and management of settings required for TCP/IP communication. \\   * [[dhcp|DHCP]]:​ A communication protocol used for the automatic allocation and management of settings required for TCP/IP communication. \\
-  ​+ 
 +  * [[diode|Diode]]:​ A component that controls the current to flow in a single direction only. This component is used to prevent reverse current flow that momentarily occurs when the door lock operates. \\ 
   * [[dip_switch|DIP switch]]: A DIP switch is an On/Off switch that is used to control the behavior of a device circuit board without hardware alteration. \\   * [[dip_switch|DIP switch]]: A DIP switch is an On/Off switch that is used to control the behavior of a device circuit board without hardware alteration. \\
 +
 +  * [[direct_mode|Direct mode]]: A mode whereby the BioStar 2 client directly searches for connectable devices and connecting to them. In this mode, the client is responsible for communicating with devices and servers. In this mode, a list of connectable devices is shown when a device search is performed on the server, and the administrator can select a device to connect from the list. \\
   ​   ​
   * [[disarm|Disarm]]:​ The act of suspending the operation of an alarm system activated for a specific zone. \\   * [[disarm|Disarm]]:​ The act of suspending the operation of an alarm system activated for a specific zone. \\
Line 139: Line 163:
   ​   ​
   * [[dual_auth|Double mode]]: An authentication method where the credentials of two different individuals are entered in sequence in a limited amount of time. \\   * [[dual_auth|Double mode]]: An authentication method where the credentials of two different individuals are entered in sequence in a limited amount of time. \\
 +
 +  * [[dummy_reader|Dummy Reader]]: A device that does not store or assess user data, but performs the role of reading credential data such as faces, fingerprints and cards, and transmits this data to the control device. \\
   ​   ​
   * [[duress|Duress finger]]: A fingerprint chosen to generate a certain event upon fingerprint registration. If a user authenticates himself/​herself with such a fingerprint,​ the authentication gets recorded in a [[log|log]] as duress fingerprint authentication. The system [[administrator|administrator]] can set a separate alarm using the log. \\   * [[duress|Duress finger]]: A fingerprint chosen to generate a certain event upon fingerprint registration. If a user authenticates himself/​herself with such a fingerprint,​ the authentication gets recorded in a [[log|log]] as duress fingerprint authentication. The system [[administrator|administrator]] can set a separate alarm using the log. \\
Line 145: Line 171:
   ​   ​
   * [[encryption|Encryption]]:​ The act of transforming information so that it is impossible to recognize its original meaning. Storing or transferring information in encrypted form is a way of protecting the information. \\   * [[encryption|Encryption]]:​ The act of transforming information so that it is impossible to recognize its original meaning. Storing or transferring information in encrypted form is a way of protecting the information. \\
 +
 +  * [[encryption_key|Encryption Key]]: A certain bit string generated for encryption. Encryption keys are designed using algorithms that prevent guessing. Generally, longer encryption keys make decryption more difficult. \\
   ​   ​
   * [[enrollment|Enrollment]]:​ A series of steps used to record the biometric information of users in a biometrics system. It involves sampling, template creation, storing, etc. \\   * [[enrollment|Enrollment]]:​ A series of steps used to record the biometric information of users in a biometrics system. It involves sampling, template creation, storing, etc. \\
-  ​+ 
 +  * [[entrance_limit_zone|Entrance Limit Zone]]: A zone that restricts access at specific times. This zone can be configured in such a way as to restrict the authentication or the authentication count. \\ 
 + 
 +  * [[epoxy_potted|Epoxy potted]]: A material that protects the circuitry by preventing rainwater from entering the device if the device is installed outdoors. \\ 
   * [[event|Event]]:​ An interaction between a user, the device, and the door. Events are recorded in a log on the BioStar server. They include authentication successes and failures and changes to the status of the door, alarms, etc. \\   * [[event|Event]]:​ An interaction between a user, the device, and the door. Events are recorded in a log on the BioStar server. They include authentication successes and failures and changes to the status of the door, alarms, etc. \\
   ​   ​
Line 156: Line 188:
   * [[face_detection|Face detection]]:​ A function that, after a user's credential has been verified, takes a picture of the user's face before granting them access so that the event and an image of the user's face can be stored together. Authentication fails if the user's face is not detected. When an image of a user's face has been stored, if necessary, it is possible to identify the user by comparing the image of the face with the user ID that was recorded when the event occurred. \\   * [[face_detection|Face detection]]:​ A function that, after a user's credential has been verified, takes a picture of the user's face before granting them access so that the event and an image of the user's face can be stored together. Authentication fails if the user's face is not detected. When an image of a user's face has been stored, if necessary, it is possible to identify the user by comparing the image of the face with the user ID that was recorded when the event occurred. \\
   ​   ​
-  * [[face_recognition|Face ​recognition]]: A technology and authentication system that identifies people based on their facial features. \\+  * [[face_recognition|Face ​authentication]]: A technology and authentication system that identifies people based on their facial features. \\ 
 + 
 +  * [[fail_safe_lock|Fail Safe Lock]]: This means that the system enters safe mode in the event of a power outage. In the event that the power supplied to the doors is cut off due to a fire, etc., the lock will be released, thereby opening the doors. \\ 
 + 
 +  * [[fail_secure_lock|Fail Secure Lock]]: This means that the system enters security mode in the event of a power outage. In the event that the power supplied to the doors of a critical site such as a bank is cut off, the doors will be locked. \\
  
   * [[fake_fp|Fake fingerprint]]:​ A fake fingerprint made from paper, silicone, rubber, etc. to emulate another individual'​s fingerprint. \\   * [[fake_fp|Fake fingerprint]]:​ A fake fingerprint made from paper, silicone, rubber, etc. to emulate another individual'​s fingerprint. \\
Line 173: Line 209:
   ​   ​
   * [[fp_template|Fingerprint template]]: A collection of fingerprint information that consists of a series of [[minutiae|minutiae]],​ such as the [[bifurcation|bifurcations]] and the end points of [[ridge|ridges]] observed in fingerprint images. Fingerprint templates are used for the identification of fingerprints,​ which is carried out by comparing the locations and number of minutiae. \\   * [[fp_template|Fingerprint template]]: A collection of fingerprint information that consists of a series of [[minutiae|minutiae]],​ such as the [[bifurcation|bifurcations]] and the end points of [[ridge|ridges]] observed in fingerprint images. Fingerprint templates are used for the identification of fingerprints,​ which is carried out by comparing the locations and number of minutiae. \\
-  ​+ 
 +  * [[fire_alarm_zone|Fire alarm zone]]: A zone set to open or lock all the doors or elevators located within it in the event of a fire. \\ 
 + 
 +  * [[firmwall|Firmwall]]:​ An electronically controlled device that opens/​closes electrical contacts in order to affect other devices. \\ 
   * [[firmware|Firmware]]:​ A micro program or file stored on a ROM to control the hardware of the product. \\   * [[firmware|Firmware]]:​ A micro program or file stored on a ROM to control the hardware of the product. \\
 +
 +  * [[floating_shift|Floating Shift]]: One of the attendance rules provided by BioStar. This method does not involve preset arrival and exit times, but instead applies the attendance rules of the day according to the user's arrival time. \\
   ​   ​
   * [[forced_open|Forced open]]: A status in which the opening of the [[door|door]] has been detected by the door sensor without the occurrence of a normal door open event, such as user authentication or use of the exit button. \\   * [[forced_open|Forced open]]: A status in which the opening of the [[door|door]] has been detected by the door sensor without the occurrence of a normal door open event, such as user authentication or use of the exit button. \\
   ​   ​
   * [[frr|FRR (False Rejection Rate)]]: A criterion used when comparing the accuracy of different biometrics systems. It represents the probability of mistakenly recognizing a registered person as a non-registered person. \\   * [[frr|FRR (False Rejection Rate)]]: A criterion used when comparing the accuracy of different biometrics systems. It represents the probability of mistakenly recognizing a registered person as a non-registered person. \\
 +
 +  * [[global_zone|Global Zone]]: A zone where a server and a master device are connected via TCP/IP, and the master device and a slave device are connected via RS-485. The server performs the master role for the zone. \\
  
   * [[grace|Grace]]:​ Allowable time for time and attendance rules. For instance, if you set the work start time to 9:00 and the allowable time to 10 minutes, personnel who have arrived between 9:00 and 9:10 are not deemed to have been late for work. \\   * [[grace|Grace]]:​ Allowable time for time and attendance rules. For instance, if you set the work start time to 9:00 and the allowable time to 10 minutes, personnel who have arrived between 9:00 and 9:10 are not deemed to have been late for work. \\
 +
 +  * [[graphic_map|Graphic map]]: One of the monitoring methods provided by BioStar. This function enables you to check and control the status of doors in real time from the map. \\
   ​   ​
   * [[held_open|Held open]]: A status in which the [[door|door]] has remained open longer than maximum set time. Can trigger an [[alarm|alarm]]. \\   * [[held_open|Held open]]: A status in which the [[door|door]] has remained open longer than maximum set time. Can trigger an [[alarm|alarm]]. \\
 +
 +  * [[hf_card|HF(High Frequency) Card]]: An electronic card that operates in the 13.56 MHz band and is capable of both reading and writing data. An HF card can be fitted with various security functions, such as data encryption and allowing it to be read by a specific reader only. \\
 +
 +  * [[http|HTTP]]:​ Short for Hypertext Transfer Protocol, this term refers to the protocol whereby a web client and a web server exchange data via a web browser. \\
 +
 +  * [[https|HTTPS]]:​ Short for Hypertext Transfer Protocol over Secure Sockets Layer. This term refers to a protocol that provides enhanced security compared to [[http|HTTP]]. All data transmitted and received through HTTPS is encrypted, so HTTPS provides better security than HTTP. \\
   ​   ​
 +  * [[ic_card|IC card(integrated circuit card)]]: A card with a built-in semiconductor-based integrated circuit. Also called a [[smart_card|smart card]]. IC cards are capable of both reading and writing data, and have a larger storage capacity and greater durability than [[mag_card|magnetic cards]], so the data stored on them is not damaged by contact with magnets. In addition, because IC cards can be fitted with various security functions such as data [[encryption|encryption]] and configured to be compatible only with readers that have particular specifications,​ they are also excellent in terms of security and functionality. \\
 +
 +  * [[io|I/O]]: Short for input/​output. \\
 +
   * [[io_device|I/​O device]]: A device that performs an information input/​output function. \\   * [[io_device|I/​O device]]: A device that performs an information input/​output function. \\
   ​   ​
 +  * [[ik_rating|IK rating]]: An international rating system that defines the degree of product protection against physical impacts. \\
 +
 +  * [[ip_rating|IP rating]]: An international rating system that defines the degree of product protection against solids and liquids. \\
 +
   * [[import|Import]]:​ The act of transferring data from one computer into its own system. \\   * [[import|Import]]:​ The act of transferring data from one computer into its own system. \\
-   +
-  * [[intelligent_reader|Intelligent reader]]: A [[device|device]] that can read [[credential|credentials]] and grant access to users based on their user information and access control rules. It acts as a [Reader + Controller]. \\ +
-  ​+
   * [[intercom|Intercom]]:​ A communication system that is generally installed in a building or institution by using a Private Branch eXchange (PBX). ​ \\   * [[intercom|Intercom]]:​ A communication system that is generally installed in a building or institution by using a Private Branch eXchange (PBX). ​ \\
 +
 +  * [[interlock_zone|Interlock Zone]]: A zone between two or more doors. In this zone, if one door is open or has been unlocked, the rest of the doors will be locked. This zone is generally applied to laboratories and manufacturing facilities where suspended particulate matter in the air such as dust needs to be controlled, or places where this is required for security and safety reasons. ​ \\
   ​   ​
 +  * [[intrusion_alarm_zone|Intrusion Alarm Zone]]: A zone set to emit a warning sound or relay signal if an unauthorized person attempts an intrusion after [[arm|Arm]]. This zone normally begins monitoring after the day's work, and emits a preset alarm or signal when an intrusion attempt is detected. ​ \\
 +
   * [[iso19749-2|ISO 19749-2]]: An international standard published by ISO that defines the fingerprint format information using the minutiae of fingerprints. \\   * [[iso19749-2|ISO 19749-2]]: An international standard published by ISO that defines the fingerprint format information using the minutiae of fingerprints. \\
   ​   ​
Line 201: Line 263:
   ​   ​
   * [[vacation|Leave]]:​ The act of taking a leave of absence from work with a pre-specified reason/​permission or the period of leave itself. \\   * [[vacation|Leave]]:​ The act of taking a leave of absence from work with a pre-specified reason/​permission or the period of leave itself. \\
 +
 +  * [[leave_manage|Leave Management]]:​ The act of managing personnel absence due to vacations, business trips, external duties, etc. \\
 +
 +  * [[lf_card|LF(Low Frequency) Card]]: An electronic card operating in a low-frequency band of 120-140 kHz. \\
 +
 +  * [[live_face_detection|Live Face Detection(LFD)]]:​ A technology that detects forged faces, e.g., masks and photographs. \\
 +
 +  * [[live_fp_detection|Live Finger Detection(LFD)]]:​ A technology that detects [[fake_fp|Fake fingerprint]] copied using rubber, silicone, clay, glue, film, and so on. \\
 +
 +  * [[lvv|Live Video View]]: A video-based monitoring method. BioStar provides IP camera screens and event logs in real time, and supports the ability to manually open/lock doors. \\
 +
 +  * [[local_zone|Local Zone]]: A zone set via an inter-device RS-485 connection. The master role for the zone is not performed by the server but by the master device. \\
   ​   ​
   * [[lock|Lock]]:​ An electro-mechanical device that connects to the access control system to be used for locking the door. It refers to all electronic devices either built into or fitted to the door. \\   * [[lock|Lock]]:​ An electro-mechanical device that connects to the access control system to be used for locking the door. It refers to all electronic devices either built into or fitted to the door. \\
Line 207: Line 281:
   ​   ​
   * [[lsb|LSB (Least Significant Bit)]]: The bit at the lowest position of binary data (the right-most bit) or its content. It is the opposite of the [[msb|Most Significant Bit (MSB)]]. \\   * [[lsb|LSB (Least Significant Bit)]]: The bit at the lowest position of binary data (the right-most bit) or its content. It is the opposite of the [[msb|Most Significant Bit (MSB)]]. \\
 +  ​
 +  * [[mag_card|Magnetic stripe card]]: A card that stores data by altering the magnetism of its magnetic tape. For data transmission,​ the magnetic tape attached on one side of a magnetic stripe card must be read by a card terminal. Only limited types and small amounts of data can be stored on this type of card, and the data recorded on magnetic stripe cards can be altered or damaged upon contact with a magnet. In addition, because magnetic stripe cards do not provide sufficient security due to the fact that they do not use data [[encryption|encryption]],​ they are increasingly being replaced by [[ic_card|IC cards]] in various fields, including access control. \\
 +
 +  * [[man_trap|Man-trap]]:​ A physical access control system for preventing unauthorized access and separating security zones from non-security zones. \\
   ​   ​
   * [[master_device|Master device]]: Among the devices that are connected through [[rs485|RS-485]],​ the device that plays the role of a controller. It processes data by periodically monitoring the [[slave_device|slave device]]. It is also called a host device. \\   * [[master_device|Master device]]: Among the devices that are connected through [[rs485|RS-485]],​ the device that plays the role of a controller. It processes data by periodically monitoring the [[slave_device|slave device]]. It is also called a host device. \\
   ​   ​
   * [[matching_timeout|Matching timeout]]: The time limit given to device matching or server matching. Matching fails if the matching does not get completed within the time limit. \\   * [[matching_timeout|Matching timeout]]: The time limit given to device matching or server matching. Matching fails if the matching does not get completed within the time limit. \\
 +
 +  * [[meal_deduct|Meal deduction]]:​ The act of excluding meal times when calculating the total number of daily working hours. \\
   ​   ​
   * [[message_timeout|Message timeout]]: The duration of time a message is displayed when there is no user interaction. \\   * [[message_timeout|Message timeout]]: The duration of time a message is displayed when there is no user interaction. \\
   ​   ​
   * [[minutiae|Minutiae]]:​ The specific details in the [[ridge|ridges]] of a fingerprint used to recognize the fingerprint. \\   * [[minutiae|Minutiae]]:​ The specific details in the [[ridge|ridges]] of a fingerprint used to recognize the fingerprint. \\
 +
 +  * [[mobile_card|Mobile card]]: A card that stores user data and [[credential|credential]] data on a mobile device and performs authentications through [[nfc|NFC]] or [[ble|BLE]] technology. Mobile cards provide higher levels of security and convenience than plastic cards, and have the advantage of reducing card issuance and management expenses because they use mobile devices used by most people daily. \\
   ​   ​
   * [[model_number|Model number]]: A generic number given to a [[device|device]] by the manufacturer in order to identify its type. \\   * [[model_number|Model number]]: A generic number given to a [[device|device]] by the manufacturer in order to identify its type. \\
 +
 +  * [[monitoring|Monitoring]]:​ A surveillance activity for specific purposes. Monitoring access control and time and attendance management refers to checking access control events and user time and attendance events, as well as checking and controlling the status of devices, doors and zones in real time. \\
  
   * [[msb|MSB (Most Significant Bit)]]: The bit at the highest position of binary data (the left-most bit) or its content. It is the opposite of the [[lsb|Least Significant Bit (LSB)]]. \\   * [[msb|MSB (Most Significant Bit)]]: The bit at the highest position of binary data (the left-most bit) or its content. It is the opposite of the [[lsb|Least Significant Bit (LSB)]]. \\
   ​   ​
   * [[mtu|MTU (Maximum Transmission Unit)]]: The maximum amount of packets that can be transmitted through the network. \\   * [[mtu|MTU (Maximum Transmission Unit)]]: The maximum amount of packets that can be transmitted through the network. \\
 +
 +  * [[multi_rfid|Multi-RFID technology]]:​ A technology that allows cards operating in different frequency bands, such as 125 kHz and 13.56 MHz, to be read from a single device. \\
 +
 +  * [[muster_zone|Muster Zone]]: A zone designated for the gathering of members in case of an emergency such as a fire. This is used to monitor the number and roster of personnel in a certain zone, and to notify administrators via an alarm or alert if a user has remained in a particular zone for a certain period of time. \\
   ​   ​
   * [[nc|NC (Normally Closed)]]: An action where the [[relay|relay]] remains closed in normal status but opens when the device operates. The current flows through the connected circuit because the relay remained closed earlier. \\   * [[nc|NC (Normally Closed)]]: An action where the [[relay|relay]] remains closed in normal status but opens when the device operates. The current flows through the connected circuit because the relay remained closed earlier. \\
 +
 +  * [[nfc|NFC(Near Field Communication)]]:​ An [[rfid|RFID]] technology applied to mobile terminals to enable bidirectional transmission/​reception of data at close range. With the rise in the smartphone penetration rate, this technology is increasingly used in various fields such as finance and communications,​ and it is also applied in access control in the form of mobile ID cards. ​ \\
   ​   ​
   * [[no|NO (Normally Open)]]: An action where the [[relay|relay]] remains open in normal status but closes when the device operates. The current does not flow through the circuit because the relay remained open earlier. ​ \\   * [[no|NO (Normally Open)]]: An action where the [[relay|relay]] remains open in normal status but closes when the device operates. The current does not flow through the circuit because the relay remained open earlier. ​ \\
 +
 +  * [[nvr|NVR(Network Video Record)]]: A function that records and monitors videos of access points using cameras or video devices installed on the network, and manages events that occur. ​ \\
   ​   ​
   * [[noise|Noise]]:​ The electrical signals that obscure or make it difficult to identify signals. ​ \\   * [[noise|Noise]]:​ The electrical signals that obscure or make it difficult to identify signals. ​ \\
   ​   ​
 +  * [[open|Open]]:​ A state in which no current flows because a wire has been broken, causing the circuit to open. \\
 +
   * [[optical_fp_sensor|Optical fingerprint sensor]]: A sensor that extract fingerprint information using light. \\   * [[optical_fp_sensor|Optical fingerprint sensor]]: A sensor that extract fingerprint information using light. \\
 +
 +  * [[osdp|OSDP(Open Supervised Device Protocol)]]:​ The standard RS-485 protocol developed by enhancing the Wiegand interface, through which only unidirectional communication from a reader to a controller was possible. This protocol enables processing of large amounts of data in a bidirectional reader-controller communication environment,​ as well as transmitting biometric data. Supporting this protocol also enables connectivity between third-party devices, so you can simply replace an existing system'​s items as necessary. \\
 +
 +  * [[output_relay|Output relays]]: An electronically controlled device that opens/​closes electrical contacts in order to affect other devices. \\
   ​   ​
   * [[overtime|Overtime]]:​ The time worked that is more than the daily working hours set by the Labor Standards Act or the company regulations. Overtime may include early work, extra work, holiday work, etc. \\   * [[overtime|Overtime]]:​ The time worked that is more than the daily working hours set by the Labor Standards Act or the company regulations. Overtime may include early work, extra work, holiday work, etc. \\