B
- Backlight: A light that emits from the back of the LCD of a device for readability.
- Bandwidth: A range of frequencies where certain functions can be performed; measured in hertz (Hz). The amount of information that can be transmitted over a wire or another medium over a period of time. The greater the frequency bandwidth, the more information can be sent over a certain period of time.
- Batch enrollment: The act of registering a multiple number of access cards on the BioStar server. Registered entry cards can be allocated to individual users.
- Biometric authentication: The act of determining whether the provided biometric information of an individual matches the information on the individual’s Biometric characteristics previously enrolled.
- Biometric information: Information used to identify each individual. Information concerning the unique physical and behavioral characteristics of an individual, including the individual's fingerprint, signature, vein pattern, face, voice, iris, genes, etc.
- Biometrics: A technology that extracts and analyzes the physical and behavioral characteristics of individuals using an automated device for the identification of each individual.
- Blacklist: A list of cards that are denied for authentication on the BioStar device. When a card is lost or stolen, misuse can be prevented by registering the ID of the card in the blacklist.
- BLE(Bluetooth Low Energy): A Bluetooth technology that can transmit and receive low-power, low-volume data within a distance of about 10 m by using the 2.4 GHz frequency band. Low-power Bluetooth technology is mainly applied to small devices where the supply of power is limited due to low power consumption. It is also used in access control in the form of mobile ID cards.
- Bluetooth: A communication technology that supports bidirectional transmission and reception of data at close range. Each type of Bluetooth has different characteristics depending on the transmission distance, transmission method, power consumption, etc.
- Break: A brief time taken off for rest during working hours. Each break is calculated as the time between the start and the end of the break.
- Brutal attack: Also called Brute Force Attack, this term refers to the act of entering all possible values to unlock passwords.
- Bypass card: A card that enables access to a specific zone by bypassing the authentication process. For example, people who possess this card can pass through the door without the need to go through a series of security (authentication) procedures.