The classic fingerprint-without-card technology is simple and in many cases what serves our customers’ basic needs best. The fingerprint reader solution replaces codes or passwords.
2-factor authentication:
Precise Biometrics also offers products with 2-factor authentication, combining smart card and fingerprint. With this solution the fingerprint is stored on the smart card. Using templates on a card offers vast scalability, higher security and fast matching times. Using the correct access keys can only access the fingerprint data.
3-factor authentication
A product with 3-factor authentication, combines smart card, fingerprint and PIN code.
26 Bit Format: H10301
The 26-bit format is the industry standard format, and is an open format. The sale of this format is not limited to any one company. The range of card numbers available in this format is limited and therefore there is a potential for card numbers to be duplicated. It is important to understand that HID does not insure that card numbers will not be duplicated. HID does not control or restrict the ordering of cards encoded with the standard 26 bit format. Convenience in ordering cards and universal access control panel acceptance are the primary benefits in using the standard 26 bit card format. It consists of 255 possible facility codes. Within each facility code there is a total of 65,535 unique card numbers.
The standard 26 bit Wiegand format is H10301. It is binary encoded data. The format consists of 2 parity bits, 8 bit facility code and 16 bit card number fields. The format is shown below.
PAAAAAAAABBBBBBBBBBBBBBBBP
EXXXXXXXXXXXX
XXXXXXXXXXXXO
where:
P = Parity
O = Odd Parity
A = Facility code, range = 0 to 255 E = Even Parity
B = Card Number, range = 0 to 65,535 X = Parity mask
125 kHz Credentials- HID Proximity
With over 200 million credentials in use around the world, HID proximity cards are recognized as the industry standard for physical access control. Featuring 125 kHz RFID technology HID prox products are robust, affordable, and seamlessly integrate with access control systems. Some cards are:
1391 MicroProx Tag:- HID Proximity Adhesive Tag; 1324 Adhesive Label, Printable label for ProxCard II Clam-shell Card;
1386 ISOProx II Card. ISO-Thin:- Imageable HID Proximity Access Card.
1598 Smart DuoProx II Card:- Multi-Technology Card with Magnetic Stripe, Contact Smart Chip Embeddable.
16-9 ProxCard Plus:- HID Proximity Card with Wiegand Proximity Key Fob.
1326 ProxCard® II Clamshell Card:- Value Priced HID Proximity Card, 1351 ProxPass II Active Tag ,Long Range Proximity Tag for Vehicle Access Control.
13.56 MHz Credentials - iCLASS Contactless
Optimized to make physical access control more powerful,iCLASS 13.56 MHz read/write contactless smart card technology provides versatile interoperability and supports multiple applications such as biometric authentication, cashless vending and PC log on security.
iCLASS smart cards and readers make access control more powerful, more versatile, and most important of all, offers enhanced security through encryption and mutual authentication. At the same time, iCLASS is user-friendly, delivering the convenience, affordability and reliability of proximity technology for which HID is known worldwide.
Some cards are: 200X iCLASS Card:- For Direct Image & Thermal Transfer;
202X iCLASS Prox Card:- 13.56 MHz iCLASS Card with 125 kHz HID Proximity.
213X iCLASS Embeddable Card and iCLASS Prox Embeddable Card, iCLASS Card with or without 125 kHz HID Proximity and an Optional Contact Smart Chip Module.
204X iCLASS Wiegand Combo Card:- 13.56MHz Contactless Smart Card with Wiegand.
2080 iCLASS Clamshell Card:-Value Price 13.56 MHz Contactless Smart Card.
13.56 MHz Credentials - FlexSmart® Series MIFARE®/DESFire®
FlexSmart Series Credential, MIFARE and DESFire, both offerings encompass the industry’s broadest range of open standard contactless smart card products. Manufactured to the highest quality standards, HID MIFARE and DESFire credentials have the memory structure and capacity to store multiple applications on a single credential. When security and performance count most, HID’s FlexSmart MIFARE and DESFIre credentials can be produced with visual security and anti-counterfeiting features such as holograms, ultra-violet fluorescent inks, micro-printing or a custom logo to quickly and easily identify genuine cards.
Some cards are:
1430 MIFARE® ISO Card:- 13.56 MHz MIFARE, ISO Thick, Photo Imageable.
1431 MIFARE® / HID Prox Combo Card:- ISO Thick, Photo Imageable, MIFARE plus HID Prox.
FPMXI MIFARE® / Indala® Prox Combo Card:- 13.56 MHz ISO Thick, Photo Imageable MIFARE plus Indala Prox.
1434 MIFARE® Keyfob:- 13.56 MHz Contactless KeyFob.
1435 MIFARE® 13.56 MHz Adhesive Tag:- Upgrade for Magstripe and Barium Ferrite Cards.
1451 DESFire® / HID Prox Combo Card:- 13.56 MHz ISO Thick, Photo Imageable DESFire plus HID Prox.
1454 DESFire® Keyfob:- 13.56 MHz Contactless Fob
Access Control
Access Control is a mechanism by which a system grants or revokes the right to access some data, or perform some action. Normally, a user must first Login to a system, using some Authentication system. Next, the Access Control mechanism controls what operations the user may or may not make by comparing the User ID to an Access Control database.
Access Control systems include:
• File permissions, such as create, read, edit or delete on a file server.
• Program permissions, such as the right to execute a program on an application server.
• Data rights, such as the right to retrieve or update information in a database.
Access control topology
Access control decisions are made by comparing the credential to an access control list. This lookup can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the lookup out from a central host to the edge of the system, or the reader. The predominate topology circa 2009 is hub and spoke with a control panel as the hub and the readers as the spokes. The lookup and control functions are by the control panel. The spokes communicate through a serial connection; usually RS485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled and connect to a host and database using standard networks.
          Access control system components
          An access control point, which can be a door, turnstile, parking gate, 
          elevator, or other physical barrier where granting access can be 
          electrically controlled. Typically the access point is a door. An 
          electronic access control door can contain several elements. At its 
          most basic there is a stand-alone electric lock (EM Lock). The lock is 
          unlocked by an operator with a switch. To automate this, operator 
          intervention is replaced by a reader. The reader could be a keypad 
          where a code is entered, it could be a card reader, or it could be a 
          biometric reader. Readers do not usually make an access decision but 
          send a card number to an access control panel that verifies the number 
          against an access list. To monitor the door position a magnetic door 
          switch is used. In concept the door switch is not unlike those on 
          refrigerators or car doors. Generally only entry is controlled and 
          exit is uncontrolled. In cases where exit is also controlled a second 
          reader is used on the opposite side of the door. In cases where exit 
          is not controlled, free exit, a device called a request-to-exit (REX / 
          Egress Switch ) is used. Request-to-exit devices can be a pushbutton 
          or a motion detector. When the button is pushed or the motion detector 
          detects motion at the door, the door alarm is temporarily ignored 
          while the door is opened. Exiting a door without having to 
          electrically unlock the door is called mechanical free egress. This is 
          an important safety feature. In cases where the lock must be 
          electrically unlocked on exit, the request-to-exit device also unlocks 
          the door.
          
          Access Area
          A specific defined area wherein all access points to the area are 
          secured by the system, and the access points can be configured and 
          adjusted to set parameters on occupancy and permission attributes.
          
          Access Credential
          A medium that contains encoded information (which is recognized by the 
          access control system) such as ID cards, key fobs, biometrics, and 
          smart chips.
          
          Access Level
          A logical group of doors paired with a time schedule used to determine 
          when and where a card is granted access in the system.
          
          ACM (Access Control Model)
          A group of objects that when associated together form a point of entry 
          that is normally associated with a door or elevator.
          
          Acquisition device:
          The hardware used to acquire biometric samples.
          
          Active imposter acceptance:
          Acceptance of a biometric sample submitted by someone attempting to 
          gain illegal entry to a biometric system.
          
          ADA (American Disabilities Act)
          Indicates that a setting or card designation is compliant with the 
          American Disabilities Act, which provides specific parameters for 
          access for personnel with disabilities. Cards with the ADA setting 
          checked, enable ADA parameters to take effect when the card is badged.
          
          Administrator
          Person responsible for adding operators and assigning the specific 
          privileges to the operators’ profiles, and determining operator 
          levels.
          
          AFIS: 
          Automated Fingerprint Identification System (or AFIS) is a system to 
          automatically match one or many unknown fingerprints against a 
          database of known prints. This is done for miscellaneous reasons, not 
          the least of which is because the person has committed a crime. With 
          greater frequency in recent years, AFIS like systems have been used in 
          civil identification projects. The intended purpose is to prevent 
          multiple enrollment in an election, welfare, DMV or similar system. 
          The FBI manages a fingerprint identification system and database 
          called IAFIS, which currently holds the fingerprints and criminal 
          records of over fifty-one million criminal record subjects, and over 
          1.5 million civil (non-criminal) fingerprint records. US Visit 
          currently holds a repository of over 50 million persons, primarily in 
          the form of two-finger records (by 2008, US Visit is transforming to a 
          system recording FBI-standard tenprint records).
          
          Algorithm 
          A sequence of instructions that tell a biometric system how to solve a 
          particular problem. An algorithm will have a finite number of steps 
          and is typically used by the biometric engine to compute whether a 
          biometric sample and template are a match.
          
          APB (Anti Pass Back)
          Control prohibiting a card from entering an access area more than once 
          without the system recognizing that the card has first exited the 
          access area.
          Anti-Passback (APB) prevents users from 'tailgating' through 
          controlled areas by tracking the entry and exit counts. A user can 
          only exit an area that they have already entered and can only enter an 
          area that they previously exited. If a user tailgates onto a site, the 
          exit keypad will deny exit to them because they are not logged into 
          the area. If a user is onsite and tailgates off of the site, they will 
          be denied exit next time they try to enter. Anti-Pass back (APB) is a 
          function that should only be used on High Security sites where users 
          can be trained on its use.  
          
          API
          Application Program Interface. A computer code which is a set of 
          instructions or services used to standardize an application. Any 
          system compatible with the API can then be added or interchanged by 
          the application developer.
          
          Alarm Screens 
          - These are standard window screens that have a special wire woven in 
          the screening. They are designed to detect someone cutting the screen.
          
          ASIC
          Application Specific Integrated Circuit. An integrated circuit 
          developed for specific applications to improve performance.
          
          Attempt
          The submission of a biometric sample to a biometric system for 
          identification or verification. A biometric system may allow more than 
          one attempt to identify or verify.
          
          Authentication:
          Any systematic method of confirming the identity of an individual. 
          Some methods are more secure than others. Simple authentication 
          methods include user name and password, while more secure methods 
          include token-based one-time passwords. The most secure authentication 
          methods include layered or "multi-factor biometric procedures. This is 
          independent of authorization.
          
          Authentication Routine
          A cryptographic process used to validate a user, card, terminal, or 
          message contents. Also known as a handshake, the routine uses 
          important data to create a code that can be verified in real time or 
          batch mode.
          
          Authorization Server
          The Authorization Server maintains all client license and 
          sub-controller license info. Also manages concurrent clients.
          
          Automatic ID/Auto ID
          An umbrella term for any biometric system or other security technology 
          that uses automatic means to check identity. This applies to both 
          one-to-one verification and one-to-many identification.
          
          Audit trail
          In computer/network systems: Record of events (protocols, written 
          documents, and other evidence) which can be used to trace the 
          activities and usage of a system. Such material is crucial when 
          tracking down successful attacks/attackers, determining how the 
          attacks happened, and being able to use this evidence in a court of 
          law.
          
          American National Standards Institute (ANSI)
          Established in 1918, ANSI is a voluntary organization that creates 
          standards for the computer industry. The FBI commissioned ANSI to 
          create an image standard for the exchange of fingerprint data between 
          AFIS systems.
          
          ANSI 378
          Interoperability standard for fingerprint templates developed by the 
          American National Standards Institute (ANSI). The US governmental 
          requires the use of ANSI 378 templates for Homeland Security Directive 
          (HSPD-12) and Personal Identity Verification (PIV). The US Federal 
          requirements for ANSI 378 are designed to ensure that all employees 
          and contractors are able to use their badges for identification and 
          access to all government facilities.
          
          Access control system components
          An access control point, which can be a door, turnstile, parking gate, 
          elevator, or other physical barrier where granting access can be 
          electrically controlled. Typically the access point is a door. An 
          electronic access control door can contain several elements. At its 
          most basic there is a stand-alone electric lock (EM Lock). The lock is 
          unlocked by an operator with a switch. To automate this, operator 
          intervention is replaced by a reader. The reader could be a keypad 
          where a code is entered, it could be a card reader, or it could be a 
          biometric reader. Readers do not usually make an access decision but 
          send a card number to an access control panel that verifies the number 
          against an access list. To monitor the door position a magnetic door 
          switch is used. In concept the door switch is not unlike those on 
          refrigerators or car doors. Generally only entry is controlled and 
          exit is uncontrolled. In cases where exit is also controlled a second 
          reader is used on the opposite side of the door. In cases where exit 
          is not controlled, free exit, a device called a request-to-exit (REX) 
          is used. Request-to-exit devices can be a pushbutton or a motion 
          detector. When the button is pushed or the motion detector detects 
          motion at the door, the door alarm is temporarily ignored while the 
          door is opened. Exiting a door without having to electrically unlock 
          the door is called mechanical free egress. This is an important safety 
          feature. In cases where the lock must be electrically unlocked on 
          exit, the request-to-exit device also unlocks the door.
          
          Attendance Management
          Attendance management is the act of managing attendance or presence in 
          a work setting to minimize loss due to employee downtime. Attendance 
          control has traditionally been approached using time clocks, 
          timesheets, and time tracking software, but attendance management goes 
          beyond this to provide a working environment which maximises and 
          motivates employee attendance.
          
          Bit
          A bit or binary digit is the basic unit of information in computing 
          and telecommunications, it is the amount of information that can be 
          stored by a digital device or other physical system that can usually 
          exist in only two distinct states. In information theory, one bit is 
          typically defined as the uncertainty of a binary random variable that 
          is 0 or 1. There are several units of information which are defined as 
          multiples of bits, such as byte (8 bits), kilobit (either 1000 or 210 
          = 1024 bits), megabyte (either 8000000 or 8×220 = 8388608bits), etc.
          
          Byte
          The byte (pronounced /baɪt/) is a unit of digital information in 
          computing and telecommunications. It is an ordered collection of bits, 
          in which each bit denotes the binary value of 1 or 0. Historically, a 
          byte was the number of bits (typically 5, 6, 7, 8, 9, or 16) used to 
          encode a single character of text in a computer and it is for this 
          reason the basic addressable element in many computer architectures. B 
          as the symbol for byte (e.g., MB means megabyte, KB is commonly used 
          for kilobyte).In certain programming languages. The C and C++ 
          programming languages, for example, define byte as "addressable unit 
          of data large enough to hold any member of the basic character set of 
          the execution environment" (clause 3.6 of the C standard). The C 
          standard requires that the char integral data type is capable of 
          holding at least 255 different values, and is represented by at least 
          8 bits (clause 5.2.4.2.1). Various implementations of C and C++ define 
          a byte as 8, 9, 16, 32, or 36 bits
          
          Bit rate
          In telecommunications and computing, bitrate (sometimes written bit 
          rate, data rate or as a variable R ) is the number of bits that are 
          conveyed or processed per unit of time.
          The bit rate is quantified using the bits per second (bit/s or bps) 
          unit, often in conjunction with an SI prefix such as kilo- (kbit/s or 
          kbps), mega- (Mbit/s or Mbps), giga- (Gbit/s or Gbps) or tera- (Tbit/s 
          or Tbps). Note that, unlike many other computer-related units, 1 kbit/s 
          is traditionally defined as 1,000 bit/s, not 1,024 bit/s, etc,
          32 kbit/s – MW (AM) Audio quality
          96 kbit/s – FM Audio quality
          128–160 kbit/s – Standard Bitrate Audio quality
          224–320 kbit/s – VBR to highest MP3 Audio quality
          800 bit/s – minimum necessary for recognizable speech
          8 kbit/s – telephone quality
          32-500 kbit/s -- lossy audio
          256 kbit/s - Digital Audio Broadcasting
          400 kbit/s–1,411kbit/s – lossless audio as used in formats such as 
          Free Lossless Audio Codec, WavPack or Monkey's Audio to compress CD 
          audio
          1,411.2 kbit/s – Linear PCM sound format
          5,644.8 kbit/s – DSD
          16 kbit/s – videophone quality
          1.15 Mbit/s max – VCD quality
          3.5 Mbit/s typ - Standard-definition television quality
          8 to 15 Mbit/s typ – HDTV quality
          24 Mbit/s max - AVCHD
          29.4 Mbit/s max – HD DVD
          40 Mbit/s max – Blu-ray Disc
          
          Baud
          In telecommunications and Access Control electronics, baudis 
          synonymous to symbols per second or pulses per second. It is the unit 
          of symbol rate, also known as baud rate or modulation rate; the number 
          of distinct symbol changes (signaling events) made to the transmission 
          medium per second in a digitally modulated signal or a line code.
          A baud rate of 1 kBd = 1,000 Bd is synonymous to a symbol rate of 
          1,000 symbols per second. In case of a modem, this corresponds to 
          1,000 tones per second, and in case of a line code, this corresponds 
          to 1,000 pulses per second. The symbol duration time is 1/1,000 second 
          = 1 millisecond.
          
          Baud Rate
          In telecommunications and Access Control electronics baud rate is a 
          technical term associated with modems and other technical devices. It 
          is also known as symbol rate and modulation rate. The term roughly 
          means the speed that data is transmitted. It is a derived value based 
          on the number of symbols transmitted per second. Baud can be 
          determined by using the following formula: Baud = (Gross Bit Rate / 
          Number of Bits per Symbol). This can be used to translate baud into a 
          bit rate using the following formula: Bit Rate = (Bits per Symbol * 
          Symbol Rate). Baud can be abbreviated using the shortened form “Bd” 
          when being used for technical purposes. A system using 4800 baud 
          modems that has 4 bits per symbol will send less data than a system 
          using 9600 baud modems that also has 4 bits per symbol. So, all other 
          things being equal, a higher baud rate is generally preferred.
          
          Badge
          An identification card usually displaying a cardholder’s photo, 
          signature or other specific identifying characteristics.
          
          Badging Station
          A hardware and software system used to obtain and save personal data 
          about a cardholder (e.g., photo or signature).
          
          Basic (non-intelligent) Readers
          simply read card number or PIN and forward it to a control panel. In 
          case of biometric identification, such readers output ID number of a 
          user. Typically Wiegand protocol is used for transmitting data to the 
          control panel, but other options such as RS-232, RS-485 and Clock/Data 
          are not uncommon.This is the most popular type of access control 
          readers. Examples of such readers are RF Tiny by RFLOGICS, ProxPoint 
          by HID, and P300 by Farpointe Data.
          
          Bar Code
          A array of machine readable rectangular bars and spaces arranged in a 
          specific way to represent letters, numbers, and other human readable 
          symbols.
          
          Broadband Internet access
          Broadband Internet access, often shortened to just broadband, is a 
          high data rate Internet access—typically contrasted with dial-up 
          access using a 56k modem.
          Dial-up modems are limited to a bit rate of less than 56 kbit/s 
          (kilobits per second) and require the full use of a telephone 
          line—whereas broadband technologies supply more than double this rate 
          and generally without disrupting telephone use.
          Although various minimum bandwidths have been used in definitions of 
          broadband, ranging up from 64 kbit/s up to 2.0 Mbit/s, the 2006 OECD 
          report is typical by defining broadband as having download data 
          transfer rates equal to or faster than 256 kbit/s, while the United 
          States (US) Federal Communications Commission (FCC) as of 2010, 
          defines "Basic Broadband" as data transmission speeds of at least 4 
          megabits per second (Mbps), or 4,000,000 bits per second, downstream 
          (from the Internet to the user’s computer) and 1 Mbps upstream (from 
          the user’s computer to the Internet). The trend is to raise the 
          threshold of the broadband definition as the marketplace rolls out 
          faster services
          
          BioAPI
          BioAPI (Biometric Application Programming Interface) is a key part of 
          the International Standards that support systems that perform 
          biometric enrollment and verification (or identification). It defines 
          interfaces between modules that enable software from multiple vendors 
          to be integrated together to provide a biometrics application within a 
          system, or between one or more systems using a defined Biometric 
          Interworking Protocol (BIP)
          BioAPI V1.0, developed by the BioAPI consortium, and released in March 
          2000. Designed to produce a standard biometric API aiding developers 
          and consumers.
          
          Biometrics
          Biometrics(ancient Greek: bios ="life", metron ="measure") refers to 
          two very different fields of study and application.A machine readable 
          technology that allows for the unique identification of individuals by 
          reading biological features (fingerprints, retina scans, Hand Geometry 
          etc.).
          
          Behavioral Biometric
          A biometric that is characterized by a behavioral trait that is 
          learned and acquired over time, rather than a physical or 
          physiological characteristic.
          
          Boom barrier
          
          
A 
          boom barrier is a bar, or pole pivoted in such a way as to allow the 
          boom to block vehicular access through a controlled point. Typically 
          the tip of a boom gate rises in a vertical arc to a near vertical 
          position. Boom gates are often counter-weighted, so the pole is easily 
          tipped. Boom gates are often paired either end to end, or offset 
          appropriately to block traffic in both directions. Some boom gates 
          also have a second arm, which pivots on links that allow the second 
          arm to hang 300 to 400 mm below the upper arm when it descends into 
          the horizontal position, in order to increase approach visibility.
          Boom gates are typically found at 
          level(rail)crossings,drawbridges,parking facilities, checkpoints and 
          entrances to restricted areas. They are also the usual method for 
          controlling passage through toll booths.
          Some boom gates are automatic and powered, others are manually 
          operated. Manual gates are sometimes hung in the manner of a normal 
          gate (i.e. hinged horizontally).
          
          Bifurcation
          A branch made by more than one finger image ridge.
          
          Biometric Authentication Mode
          The way biometric data (e.g. fingerprints) is used for authentication. 
          The mode chosen for a biometric installation depends on the specific 
          needs of a site, where either convenience or security may be 
          emphasized. BioCert fingerprint devices may use either of two 
          biometric authentication modes, identification or verification.
          
          Biometric Authorization System
          Authorization means whether the user has an authority or permission to 
          access something. This something could be a computer, secured 
          location, etc.
          A good example of authorization is going to a movie theater to watch a 
          movie.Before entering the premise, you are asked to show the movie 
          ticket. If you have the movie ticket, then they let you pass through, 
          else you are denied. Please note the person who is checking the ticket 
          does know who you are, he/she will allow you only if you have a valid 
          ticket. The point is that no identification or verification has taken 
          place. It is assumed that the person who is carrying the movie ticket 
          is the person to whom the movie ticket belongs.
          Let’s look at another example. Let’s say, you sit at a front desk, and 
          your boss hands you file with people’s name, and says, “Please let 
          only these people walk in through the door.” A person walks up to you 
          and says, “Hi, this John and I need to go through the door”. What will 
          you do? You will first verify the person’s identity, and then check if 
          his name is on the list. If you find his name on the list, then it 
          means that he has the permission to go through the door. If his name 
          is not on the list, then you will say, “I am sorry, you don’t have the 
          permission to go through the door.” This is a secured form of 
          authorization. Please note that in this case verification takes place 
          before authorization.
          Let’s consider fingerprint-based computer login system. A person 
          wanting to access the computer system will place the finger on the 
          fingerprint scanner. The biometric system will capture the 
          fingerprints and compare it with the fingerprints of the people who 
          have access to the system. If a match is found, then give the person 
          is given access to the computer system, else the access is denied. In 
          this example, verification is followed by authorization. Placing the 
          finger on the fingerprint scanner means verifying that it is the same 
          person who is asking the access to the system. Authorization happens 
          when the computer returns a yes or a no response to the user’s request 
          for accessing the system.
          Such systems could be are 1:N or 1:1. If the authorization is done 
          using only the fingerprints, then the matching will have to be done 
          with all the fingerprints in the database, hence the system will be of 
          type 1:N. However, if a person is asked to submit a unique identifier 
          (such as, user-id) along with the fingerprints, then only one matching 
          takes place, that is with the fingerprints associated with the unique 
          identifier. Such a system is of type 1:1.
          
          Biometric Identification System
          Identification means you don’t know anything about the person and you 
          are trying to identify them, e.g., you go to a party, someone comes up 
          and says, “hi”. What do you do? You look at the person’s face, and try 
          to recognize them. The same process happens in the biometric 
          identification solution.
          Let’s say, you have pictures of all the users in the database. Now, 
          someone comes up to you and says “Hi”, what you will do? You will take 
          a picture of this person and feed it to your biometric system.The 
          biometric system will compare this picture with all the pictures that 
          are in database & returns the information of that person, whose 
          photograph is the closest match. This is also called 1:N matching, 
          where the biometric system is comparing 1 picture with all the 
          pictures in the database.
          In this example, we have used the face recognition technology to 
          identify a person, but we can use fingerprint, iris, voice or any 
          other biometric technology.
          
          Biometric Verification System
          Verification means verifying a person’s identity.
          When a person walks up to you and says, “Hi, I am Arindam” and shows 
          you his ID card. You look at the person’s face, look at the picture, 
          and try to match them. If they match, then it means that the person is 
          verified, if it doesn’t, then you know that the person is not Arindam 
          but someone else. The same process happens in the biometric 
          verification system.
          A person walks up to you, and says, “Hi, I am Arindam”. As before, you 
          will take the picture of Arindam, and feed it to your biometric 
          system. This time you will inform the system that this person claims 
          to be “Arindam”. The biometric system will then pull up Arindam’s 
          file; try to match Arindam’s face with the picture associated with the 
          file. If the picture matches, then it will return a positive response 
          indicating that the person is “Arindam”, else, a negative response, 
          indicating that the person is not Arindam. This is system is also 
          called 1:1 matching as only one comparison takes place.
          Please note that the verification is not based on only photo IDs. You 
          could also use pass code, userid-password or any information that only 
          that user and the person who is verifying the identity, will know.
          
          Biometric template
          Biometric templates are representations of a fingerprint or other 
          biometric using series of numbers and letters. Templates are created 
          using sophisticated algorithms, a mathematical process.
          
          Biometric Match
          This is the name given to the the decision that a biometric sample and 
          a reference template stored in a biometric database comes from the 
          same human source, based on their high level of similarity. 
 
A biometric match may consist of a score which designates the 
          degree of similarity between the sample and the reference template. 
          Typically, a match should never be identical;freshly gathered samples 
          will inevitably vary somewhat from the reference template, due to 
          subtle changes over time and errors in the process of feature 
          extraction. 
          Some biometric systems may flag an exact match as a potential fraud; 
          presenting an exact match implies that the reference template database 
          has been compromised. The sample must score above the predetermined 
          biometric match threshold.
          
          
          Biometric System
          An automated system capable of capturing a biometric sample from an 
          end user; extracting biometric data from that sample; comparing the 
          biometric data with that contained in one or more reference templates; 
          deciding how well they match; and indicating whether or not an 
          identification or verification of identity has been achieved.
          
          Biometrics
          The automated technique of measuring a physical characteristic or 
          personal trait of an individual and comparing that characteristic to a 
          comprehensive database for purposes of identification.
          
          Biometric sample
 
The identifiable, unprocessed image or recording of a physiological 
          or behavioral characteristic, acquired during submission, used to 
          generate biometric templates.
          
          Biometrics Algorithm
          A biometrics algorithm is sequence of instructions that tell a 
          biometric system how to solve a particular problem. 
 
Typically, biometric systems use these sequences of rules to 
          interpret data that has been abstracted from the original source. For 
          example, rather than work on fingerprint images directly, biometric 
          systems take from a particular print a set of features that best 
          defines differences between individuals. 
          An algorithm will have a finite number of steps and is typically used 
          by the biometric engine to compute whether a biometric sample and 
          template is a match.
          
          Bumping
          Sending an alarm to an alternate site or station following a 
          user-defined time during which the alarm is unacknowledged.
          
          Buffer overflow
          Most common cause of current security vulnerabilities. A buffer 
          overflow occurs when more data is put into a temporary data storage 
          area (buffer) than the buffer can hold. Because buffers can only hold 
          a finite amount of data, the extra information can overflow into 
          adjacent buffers, corrupting or overwriting the data in them. 
          Programming errors are the one of the most frequent causes of buffer 
          overflow problems. In attacks which exploit buffer vulnerabilities, 
          extra data is sent to the buffer with code designed to trigger 
          specific actions, and which can damage files, change data, or disclose 
          confidential information. Buffer overflow attacks may have arisen from 
          poor use of the C programming language.
          
          Cardholder
          Anyone who has been given an access credential.
          
          Card Reader
          A card reader is anything, usually an electronic device, which reads 
          'cards'. There is a wide variety of things called cards and hence 
          there are many things called 'card readers'.
          Access control card readers are used in physical security systems to 
          read a credential that allows access through access control points, 
          typically a locked door. An access control reader can be a magnetic 
          stripe reader, a bar code reader, a proximity reader, a smart card 
          reader, or a biometric reader.
          
          Capacitive Sensors
          Capacitive sensors use an array capacitor plates to image the 
          fingerprint. Skin is conductive enough to provide a capacitive 
          coupling with an individual capacitive element on the array. Ridges, 
          being closer to the detector, have a higher capacitance and valleys 
          have a lower capacitance. Some capacitive sensors apply a small 
          voltage to the finger to enhance the signal and create better image 
          contrast. 
          Capacitive sensors can be sensitive to electrostatic discharge (shock) 
          but they are insensitive to ambient lighting and are more resist 
          contamination issues than some optical designs. 
          
          Capture
          The method of taking a biometric sample from the end user.
          
          Challenge Response
          In biometric identification systems, challenge/response is a method 
          used to confirm the presence of a person by getting some form of 
          direct response from the individual. The response gathered can be 
          either voluntary or involuntary. 
          In a voluntary response, the end user will consciously react to 
          something that the system presents. 
          In an involuntary response, the end user's body automatically responds 
          to a stimulus. A challenge response can be used to protect the system 
          against attacks. 
          
          Classification 
          A scheme for categorizing fingerprints according to their overall 
          patterns. Some fingers do not fit into any of the classes, and some 
          may have attributes of more than one class.
          
          Covert Sampling
          "Covert sampling" refers to a method in which biometric samples are 
          being collected at a location or in a manner that is not known to 
          bystanders or to test subjects. 
          One example of a covert sampling environment would be an airport 
          checkpoint where face images of passengers are captured by 
          surveillance cameras and are then compared to a watchlist without 
          their knowledge.
          
          Coding 
          Image processing software for extracting minutiae features from the 
          image.
          
          Closed-set Identification
          "Closed-set identification" refers to a biometric task in which an 
          unidentified individual is known to be in the database of biometric 
          characteristics and the system attempts to determine his/her identity.
          
          Performance is typically measured by the frequency with which the 
          individual appears in the system’s highest ranked possible IDs.
          
          Comparison
          The process of comparing a biometric sample with a previously stored 
          reference template or templates. See one-to-many and one-to-one.
          
          Channel
          The path in which the SSP controller communicates with the host or 
          driver.
          
          
 
 
          Command
          An operator-initiated event that causes a change or action within the 
          access control system.
          
          Contactless card
          Smart cards or memory cards which communicate by a radio signal. The 
          range is normally up to 10 cm from the reader.
          
          Contactless Credit Cards
          Contactless credit cards differ from regular credit cards in the way 
          the information is read from them by the card reader. A regular credit 
          card stores its data on a magnetic stripe that must be physically 
          swiped through a card reader. A contactless credit card, on the other 
          hand, stores its data on a microchip embedded in the card's plastic. 
          The microchip is fitted with a radio antenna that is capable of 
          transmitting the card's data to a card reader without physical 
          contact. Using radio frequency identification (RFID) technology with 
          the ISO 14443 standard, a contactless card can transmit data to a 
          special RFID card reader when the cardholder waves his card within a 
          few inches of the receiver.
          Smart cards or memory cards which communicate by a radio signal. The 
          range is normally up to 10 cm from the reader.
          
          Central or on line processing
          A system where all systems information is stored in a central location 
          and all go or no-go decisions are made by this unit.
          
          Crossover error rate (CER)
          A comparison metric for different biometric devices and technologies; 
          the error rate at which FAR equals FRR. The lower the CER, the more 
          accurate and reliable the biometric device.
          
          Controller
          The data-gathering panel that makes local access decisions. Includes 
          the SSP,SSP-C, and SSPE.
          Cables
          Consider the following points before select the type of cable to be 
          used.
 
1. Current Carrying Capacity - The Current Carrying Capacity / 
          Gauge of a cable is measured as per the American Wire Gauge (AWG) 
          standard for expressing wire diameter.
          2. Shielding - Good shielding provides protection against interference 
          from external sources(usually copper, aluminium, or other conductive 
          material), which are trying to get out of the cable and into the 
          signal in the cable.
          3. Core - Single Conductor /Multi Conductor (Core.
          Connection range depends upon controller make to make. As the AWG 
          number gets smaller, the wire diameter gets larger. This reduces 
          resistance & cable length can be increased. Here Low Resistance means 
          Higher Current Carrying Capacities.
          
          Central or on line processing
          A system where all systems information is stored in a central location 
          and all go or no-go decisions are made by this unit.
          
          Common Biometric Exchange File Format (CBEFF)
          A standard that provides the ability for a system to identify, and 
          interface with, multiple biometric systems, and to exchange data 
          between system components.
          
          DNA Identification Technology 
          Deoxyribonucleic acid (DNA) Biometrics could be the most exact form of 
          identifying any given individual. Every human being has its own 
          individual map for every cell made, and this map, or ‘blueprint’ as it 
          more often is called,can be found in every body cell. Because DNA is 
          the structure that defines who we are physically and intellectually, 
          unless an individual is an identical twin, it is not likely that any 
          other person will have the same exact set of genes.
          DNA can be collected from any number of sources: blood, hair, finger 
          nails, mouth swabs, blood stains, saliva, straws, and any number of 
          other sources that has been attached to the body at some time.DNA 
          matching has become a popular use in criminal trials,especially in 
          proving rape cases.The main problems surrounding DNA biometric is that 
          it is not a quick process to identify someone by their DNA. The 
          process is also a very costly one.
          DNA Biometrics is not a fool proof method of identification. If 
          forensic scientists to not conduct a DNA test properly, a person’s 
          identification code can be skewed. Another problem is matching prior 
          DNA samples to new samples; this is a bigger problem in DNA 
          fingerprinting. The information looks like a bar code, and if not 
          closely inspected an incorrect match could be made .
          
          Download 
          An “update” action to send saved information to the SSP.
          
          Distributed processing 
          An access control system where some of the system information is 
          stored at the individual readers or controllers. This allows the 
          system to operate when the host is down or not communicating.
          
          Door forced open 
          A signal indicating that the door was opened without a valid card or 
          request to exit device. This requires a status switch and some type of 
          rex device.
          
          Door held open 
          A signal that indicates that the door was held open longer than it 
          should have been. This is used to prevent someone from using a card to 
          enter and then leave the door open for others. This requires a status 
          switch on the door.
          
          Door Event
          Software to show the status of door on a list, to alert administrator 
          for any activities happen at the door such as normal door open-close, 
          door ajar, door open time out etc.
          
          Drop bolt/Dead bolt
          
          A dead bolt or dead lock (also deadbolt), is a 
          locking mechanism distinct from a spring bolt lock because a deadbolt 
          cannot be moved to the open position except by rotating the lock 
          cylinder. The more common spring bolt lock uses a spring to hold the 
          bolt in place, allowing retraction by applying force to the bolt 
          itself. A deadbolt can therefore make a door more resistant to entry 
          without the correct key.
          A deadbolt is often used to complement a spring-bolt lock on an entry 
          door to a building.
          
          Data Encryption Standard (DES)
          Data Encryption Standard, a block cipher developed by IBM and the U.S. 
          Government in the 1970s as an official standard.
          
          
 
 
          Demographic Data 
          Census information about an individual, such as name, address, gender, 
          race, and year of birth.
          
          Digital Signature 
          The encryption of a message digest with a private key.
          
          Direct Fingerprint Reader (DFR)
          A device capable of scanning finger images directly from an 
          individual's fingers. 
          
          Dual Interface Card 
          Dual interface cards have contact and contact less interfaces for data 
          and transmission in both directions.
          
          Electric strike (OR)Electric Door strike (OR) Electric Latch 
          Release( EDS / ELR)
 
An electric strike is an access control device used for doors. It 
          replaces the fixed strike faceplate often used with a latchbar (also 
          known as a keeper). Like a fixed strike, it normally presents a ramped 
          surface to the locking latch allowing the door to close and latch just 
          like a fixed strike would. However, an electric strike's ramped 
          surface can, upon command, pivot out of the way of the latch allowing 
          the door to be pushed open (from the outside) without the latch being 
          retracted (that is, without any operation of the knob) or while exited 
          the knob or lever can be turned to allow egress from the secured area. 
          Suitable For: Wooden Door, Metal Door, Fireproof Door. Electric 
          strikes come in many varieties. They can be 12V or 24V or even higher 
          voltage and they may take AC or DC current and some even take both. 
          They may be fail safe or fail secure. A fail safe electric strike 
          needs power to keep it locked. A fail secure electric strike stays 
          locked even without power. The most common by far is a fail secure.
          
          Easy egress 
          A means of exiting where the person wishing to leave simply turns the 
          doorknob to exit.
          
          EXIT button
          A Request to exit button. A device that must be pushed in order to 
          release the door.
          
          Electronic Benefits Transfer (EBT)
          Electronic Benefits Transfer enables automatic benefits distribution. 
          It is currently implemented in WIC and Food Stamps programs.
          
          Employee Recognition
          There are many employee recognition systems available but Biometrics 
          provides a cheaper alternative to most, very few people lose their 
          fingers or eyes when compared with those who lose smart-cards or 
          forget passwords.
          
          End User 
          A person who interacts with a biometric system to enroll or have 
          his/her identity checked.
          
          Enrollee 
          A person who has a biometric reference template on file.
          
          Encryption
          Making information unreadable/difficult-to read for unauthorized 
          persons.
          
          
 
- Micro Size: 300 lbs (1,300 N) holding force**.
 - Mini Size: 600 lbs (2,700 N) holding force
 - Midi Size: 800 lbs (3,600 N) holding force
 - Standard Size: 1,200 lbs (5,300 N) holding force.
 
For safety purposes, electric locks can be designed to operate in one of two modes:
1. Fail-Safe – to protect people: The lock is released if power cuts off.
2. Fail-Secure – to protect property: The lock remains closed if power cuts off.
An electromagnet lock is normally used in Fail-Safe situations.
Enrolling 
          The process of collecting biometric data from the individual, which is 
          later, processed and stored as a template.
          
          Enrollment Time 
          The time a person must spend to have his/her biometric reference 
          template successfully created.
          
          Emergency Card
          It is used during hazards like fire, in which it is required that all 
          employees or visitors should be evacuated from the premise safely. On 
          showing the emergency card, all doors will be opened permanently with 
          immediate effect, thereby allowing everyone in the premises to exit.
          
          Enrollment Station 
          A workstation at which an individual's biometrics (fingerprint, 
          voice-print, etc.) and personal information (name, address, etc.) can 
          be entered into a bio-identification system.
          
          Extraction
          The process of converting a captured biometric sample into biometric 
          data so that it can be compared to a reference template.
          
          Ear Canal Identification Technology 
 
It is known from prior art that the acoustical properties of the 
          ear can be used to identify people uniquely. This kind of biometric 
          feature cannot easily be copied, and can easily be implemented in a 
          mobile phone for remote identification, thus replacing conventional, 
          less reliable methods of identification such as' the PIN code. In the 
          case of acoustic ear canal biometrics, what is of interest is the 
          topology of the ear canal, which is unique for every human. An 
          incoming sound signal is reflected and otherwise modified by the ear 
          canal to give an aurally reflected signal which exits the ear canal.
          
          A sound signal is directed into the ear of a user, and the frequency 
          response of the ear canal is measured and analyzed to extract a 
          feature vector unique to this user. However, since the microphone used 
          to detect the response from the ear canal must also pick up any 
          surrounding sound signals, such a measurement system is particularly 
          prone to error owing to background noise. These unwanted background 
          noise signals can really only be excluded from the measurement 
          described by, for example, enclosing the microphone and the ear in 
          headphones of a size large enough to encompass the entire ear. Since 
          such headphones are generally cumbersome to use and awkward to 
          transport, they are impractical for frequent use, and unsuited to user 
          identification for applications such as telephone banking, telephone 
          brokerage, etc, which a user generally wishes to carry out with a 
          mobile phone, whether at home or underway.
          
          Feature Extraction
          Biometric feature extraction is the process by which key features of 
          the sample are selected or enhanced. Typically, the process of feature 
          extraction relies on a set of algorithms; the method varies depending 
          on the type of biometric identification used. 
          Here are some examples of biometric feature extraction
          A fingerprint feature extraction program will locate, measure and 
          encode ridge edgings and bifurcations in the print. 
          A voice recording may filter out particular frequencies and patterns.
          
          A digital picture may pull out particular measurements, like the 
          relative positions of the ears, forehead, cheekbones and nose. 
          Iris prints will encode the mapping of furrows and striations in the 
          iris. 
          
          FAR 
          False Acceptance Rate Also known as FAR. Measures how frequently 
          unauthorized persons are accepted by the system due to erroneous 
          matching. Potentially serious. The FAR of BioCert devices is currently 
          about 0 .001% and is usually improved by educating users on correct 
          usage of fingerprint recognition devices, especially in high security 
          environments.
          
          Fingerprint Identification Unit (FIU)
          A biometric system capable of capturing, storing and comparing 
          fingerprint data for the purposes of verifying an individual's 
          identity.
          
          Fingerprint Template 
          A description of all the detected minutiae in a fingerprint pattern. 
          The template contains each minutia's x/y coordinate, slope, and type, 
          thus summarizing the characteristics of the fingerprint for purposes 
          of matching the fingerprint against candidates.
 
          Fingerprint Image Enhancement
          A critical step in automatic fingerprint matching is to automatically 
          and reliably extract minutiae from the input fingerprint images. 
          However, the performance of a minutiae extraction algorithm relies 
          heavily on the quality of the input fingerprint images. In order to 
          ensure that the performance of an automatic fingerprint identification 
          /verification system will be robust with respect to the quality of the 
          fingerprint images, it is essential to incorporate a fingerprint 
          enhancement algorithm in the minutiae extraction module. We have 
          developed a fast fingerprint enhancement algorithm, which can 
          adaptively improve the clarity of ridge and furrow structures of input 
          fingerprint images based on the estimated local ridge orientation and 
          frequency. We have evaluated the performance of the image enhancement 
          algorithm using the goodness index of the extracted minutiae and the 
          accuracy of an online fingerprint verification system. Experimental 
          results show that incorporating the enhancement algorithms improves 
          both the goodness index and the verification accuracy.
 
          Furrow
          The lower parts of the fingerprint.
          
          Format
          A proximity card stores numbers. When a card is waved in front of a 
          reader, those numbers are sent to the access controller. However, the 
          controller needs to know how the received information is organized. 
          This is known as the format.
          The 26 bit Wiegand open format is the industry standard. Card 
          manufacturers such as HID, Indala and AWID sell cards with this format 
          to any dealer. This 26 bit format is recognized by all access 
          hardware.
          Over the years, formats with a higher number of bits (33, 37, 48, and 
          50) have been added to increase card security.
          However, some of the higher bit formats are "proprietary", and usually 
          carry a higher price tag. One exception is the HID 37 bit propietary 
          format, priced similarly to a 26 bit card.
          
          Facility code and serial number
          Every card has a consecutive serial number programmed, assigned in 
          your access control software to a card holder. For 26 bit cards, it 
          can be from 0 to 65,535.
          But, what happens if another company has the same card numbers as 
          yours? They could access your building and viceversa. 
          To reduce this risk, a second number, know as the facility or site 
          code is encoded into each card. This number can go from 0 to 255 on a 
          26 bit format card.
          
          Then, if your company has cards numbered from 1 to 1000, with facility 
          code 230, they would be programmed as follows:
          230 - 00001
          230 - 00002
          230 - 00003 .......up to 230 - 01000
          
          The other company could have the same serial numbers, but with 
          facility code 180, and their cards would be:
          180 - 00001
          180 - 00002
          180 - 00003........up to 180 - 01000
          
          To grant access, your system validates the facility code AND the 
          serial number. It will rejecting the other company's cards, even if 
          they have the same serial number, because the facility code does not 
          match.
          Lately, some formats have a greater number of bits, and make obsolete 
          the notion of facility codes, because the card serial number (like the 
          serial number on currency bills) is never duplicated at the factory. 
          This also means faster delivery of cards, even for add-ons to existing 
          sites, right out of stock. 
          Cards ship with a facility code (if used) and serial number 
          programmed.
          
          Fail safe
          Is a locking device that is unlocked when no power is applied. Also 
          called Fail-open. In this configuration, applying electrical current 
          to the strike will cause it to lock. In this configuration, it 
          operates the same as a magnetic lock would. If there is a power 
          failure, the door would open merely by being pushed/pulled open. Fail 
          safe units are always run using DC power. So, is a locking device that 
          is unlocked when no power is applied.
          
          Fail secure
          Is a locking device that is locked when no power is applied. Also 
          called Fail-locked or non-fail safe. In this configuration, applying 
          electrical current to the strike will cause it to open. In this 
          configuration, the strike would remain locked in a power failure, but 
          typically the knob can still be used to open the door from the inside 
          for egress from the secure side. These units can be powered by AC 
          which will cause the unit to "buzz", or DC power which will offer 
          silent operation, except for a "click" while the unit releases. These 
          are not normally used for exit doors since they cannot be unlocked 
          during a power outage.
          
          Factory default settings
          These are the settings that originally applied for a device when it 
          was first delivered from the factory. If it should become necessary to 
          reset a device to its factory default settings, this will, for many 
          devices, completely reset any settings that were changed by the user.
          
          Gait Biometrics
          Gait Biometrics is based on the way a person walks. It is a behavioral 
          type of biometrics. It does not get affected by the speed of the 
          person's walk.
          
          
          Advantages of Gait Biometrics:
          *Can recognize a person at a distance where other biometrics are 
          obscured. 
          **Effective where only low image resolution footage is available,as 
          with CCTV Cameras.
          ***Non-invasive biometrics.
          
          Disadvantages of Gait Biometrics:
          *It will not work if a person as worn an attire, such as a trench 
          coat, or a footwear, such as flip-flops, that affects a persons 
          walking style. 
          **Sometimes walking surface, downhill, uphill, etc could also cause a 
          problem 
          
          Dongle 
          A dongle is a small piece of hardware that connects to a laptop or 
          desktop computer for the purpose of copy protection or authentication 
          of software to be used on that system.
          Electrically, dongles mostly appear as two-interface security tokens 
          with transient data flow that does not interfere with other dongle 
          functions and a pull communication that reads security data from the 
          dongle. These are used by some proprietary vendors as a form of copy 
          protection or digital rights management, because it is generally 
          harder to replicate a dongle than to copy the software it 
          authenticates. Without the dongle, the software may run only in a 
          restricted mode, or not at all. Vendors of software-protection dongles 
          (and dongle-controlled software) often use terms such as "hardware 
          key", "hardware token", or "security device" instead of "dongle", but 
          the term "dongle" is much more common in day-to-day use. Modern 
          dongles include built-in strong encryption and use fabrication 
          techniques designed to thwart reverse engineering. Typical dongles 
          also now contain non-volatile memory — key parts of the software may 
          actually be stored and executed on the dongle. Thus dongles have 
          become secure cryptoprocessor that execute inaccessible program 
          instructions that may be input to the cryptoprocessor only in 
          encrypted form.
          
          DHCP
          In simple terms, DHCP determines if your IP is static or dynamic and 
          the length of time an IP address is assigned.
          Dynamic Host Configuration Protocol is controlled by a DHCP server. 
          Your router can be a DHCP server...and if you're on a home network, it 
          most likely serves this purpose.
          I know this might be confusing because the word dynamic is in the 
          term, but just because you have DHCP enabled on your computer doesn't 
          mean you can't be assigned a static IP. DHCP enabled on your computer 
          simply means you're letting a DHCP server assign its IP. Having it 
          enabled DOES NOT mean it's a DHCP server.
          A true DHCP server (not your Linksys router) gives the LAN Admin a ton 
          of control with IP assigning.
          Ever print to a network printer? Ever wonder how that printer keeps 
          its network assignment? Each network device has a MAC address. You can 
          assign a static IP at the server to a specific MAC address. This 
          allows the network printer to always get the same IP even after it 
          reboots and without assigning the IP at the printer. If you print the 
          network configuration at the printer, it will probably tell you that 
          DHCP is enabled and no static IP is assigned. That's because the IP 
          assignment is handled at the server.
          Your ISP has a DHCP server. They can assign IPs by modem MAC 
          addresses. When your modem comes online, it communicates to the 
          network indicating it is looking for an IP address. The DHCP server 
          listens to this communication and starts talking to the modem. The 
          modem then transmits its MAC address to the DHCP server. At that 
          point, either an IP has been reserved for the modem or one is assigned 
          at that time. Hence cloning your MAC address to get a new IP from your 
          ISP.
          Routers and DHCP - Under the General Setup or LAN Setup tab in your 
          router, you'll see a settings option for DHCP. You can control how 
          many IPs are assigned or to enable/disable the DHCP server portion of 
          the router. If you disable it, you'll have to statically assign IPs to 
          each computer, or have a DHCP server or your network. This goes for 
          wired and wireless. Any connection on your network has an IP address.
          
          Glass break station 
          A device mounted near the exit door that can be used to release the 
          door in the event of an emergency.
          
          Global Anti-Passback
          Allows the server to assign any number of readers to the Anti-Passback 
          function. The server must be online and communicating to the readers 
          for this to work.
          
          Group 
          A logical set of common data objects such as cardholders or hardware 
          points.
          
          GSA APL 
          In order to eliminate the need for every agency to test and certify 
          products to implement into HSPD-12, The General Services 
          Administration (GSA) was asked to create an Approved Products List 
          (APL). The GSA APL will serve as the buying guide for all of the US 
          Federal Government Agencies. As agencies begin to implement their 
          HSPD-12 and PIV solutions they will use the GSA APL to provide 
          assurance that the products they are purchasing meet guidelines and 
          technical specifications.
          
          Hand Geometry 
          Measurement of the layout of the physical characteristics of the hand. 
          A lesser used biometric technology.
          
          Advantages of Hand Geometry Biometrics:
          * Simple, relatively easy to use and inexpensive.
          * Hand geometry data is easier to collect, unlike the fingerprints 
          where a good frictional skin is required by imaging systems, and 
          retinal data where special lighting is required.
          * Environmental factors, such as, dry weather that causes the drying 
          of the skin is not an issue.
          * Usually considered less intrusive than fingerprints, retinal, etc.
 
          Disadvantages of Hand Geometry Biometrics:
          * The hand geometry is not unique and cannot be used in identification 
          systems
          * Not ideal for growing children.
          * Jewelry (rings, etc), limited dexterity (arthritis, etc) etc may 
          pose a challenge in extracting the hand geometry information.
          * The data size of hand geometry biometrics is large and is not ideal 
          for using it in embedded systems.
          
          HSPD-12 
          Abbreviation for US Federal government's Homeland Security 
          Presidential Directive, which is a set of requirements for government 
          agencies to improve their security infrastructure.
          
          HTML (Hypertext Markup Language)
          HTML is the set of "markup" symbols or codes inserted in a file 
          intended for display in web browser. The markup tells the browser how 
          to display the page's words and images for the user.
          
          HTTP (Hypertext Transfer Protocol)
          HTTP is the set of rules for exchanging files (text, graphic images, 
          sound, video, and other multimedia files) on the web. The HTTP 
          protocol runs on top of the TCP/IP suite of protocols.
          
          HTTPS (Hypertext Transfer Protocol over SSL)
          HTTPS is a web protocol used by browsers and web servers to encrypt 
          and decrypt user page requests and the pages returned by the server.
          
          The encrypted exchange of information is governed by the use of an 
          HTTPS certificate (issued by a Certificate Authority), which 
          guarantees the authenticity of the server.
          
          HID Proprietary 37 Bit Format: H10302
          In an effort to provide an open format to the industry, while at the 
          same time provide assurance that the numbers are unique and will not 
          be duplicated, the 37 bit format was developed. Under this format, HID 
          controls the issuing of card numbers and does not duplicate the 
          numbers.
          The 37-bit format can be used to program a wide range of unique card 
          numbers. Although it is available to all customers, not all access 
          control systems can handle such a large data length format. In 
          addition, many systems are unable to handle a format that does not 
          have a facility code. Just like the 26 bit format, the 37 bit format 
          can be sold to any customer. Although it is available to all 
          customers, HID controls the numbers to be generated for each order. 
          Confirm that the system that the cards are to be utilized on is 
          capable of using a 37-bit number with no facility code.
          
          HID 1326 ProxCard II (26-bit)
          The most affordable card from HID and the long-standing industry 
          choice for proximity access control. The HID ProxCard II card is 
          approximately the size of a standard credit card and is thin and 
          flexible enough to be carried in a wallet or on a strap clip. Print to 
          an adhesive backed PVC card and attach it to the HID ProxCard II in 
          order to combine your identification card with your proximity card.
          HID ProxCard II Key Features 
          Offers universal compatibility with all HID proximity readers.
          Provides durable packaging and consistent read range.
          Provides an external number for easy identification and control.
          Supports formats up to 85 bits, with over 137 billion codes.
          Custom pre-printed artwork available.
          A PVC overlay allows for on-site photo ID using most direct image 
          printers.
          Thin enough to carry in a wallet or purse.
          Create Photo ID card with model 1324 Printable Adhesive Label
          Specifications 
          Typical Maximum* Read Range for HID ProxCard II
          ProxPoint® Plus reader-up to 3" (7.5 cm)
          MiniProx® reader-up to 5.5" (14 cm)
          ThinLine II® reader-up to 5.5" (14 cm)
          ProxPro® reader-up to 8" (20 cm)
          ProxPro® II reader-up to 9"(22.9 cm)
          Prox80™-up to 5.5" (14 cm)
          MaxiProx® reader-up to 24" (60 cm)
          
          *Dependent on local installation conditions.
          
          HID 1336 DuoProx II Card (26-bit)
          This card provides a solution for companies desiring to use one card 
          incorporating proximity, magnetic stripe and photo identification 
          technologies for multiple applications.
          HID DuoProx II multiple technology proximity card offers proximity, 
          magnetic stripe and photo identification technologies on a single 
          access control card. HID DuoProx II card is ISO 7810 compliant, with a 
          nominal thickness of .030". It features a graphics quality surface 
          optimized for Photo ID printing.
          The card is available in standard PVC construction, or a composite 
          polyester/PVC construction for more demanding high wear and tear 
          environments( 2.125" x 3.370" x 0.030" ± 0.003" (5.4 x 8.6 x 0.076 ± 
          0.0076 cm)). For Like all HID ISO cards, the HID DuoProx II card can 
          be produced with visual security and anti-counterfeiting features such 
          as holograms, ultra-violet fluorescent inks, micro-printing, or a 
          custom logo to quickly and easily identify genuine cards. 
          Specifications
          Typical Maximum* Read Range
          ProxPoint® Plus reader-up to 2.5" (6.35 cm)
          MiniProx® reader-up to 5" (12.7 cm)
          ThinLine II® reader-up to 5" (12.7 cm)
          ProxPro® reader-up to 7" (17.8 cm)
          ProxPro® II reader-up to 8" (20 cm)
          Prox80TM Card reader-up to 5" (12.7 cm)
          MaxiProx® reader-up to 20" (50.8 cm)
          EntryProx reader-up to 2.5" (6.35 cm)
          pcProxTM Desktop reader-up to 2.5" (6.35 cm)
          
          *Dependent on local installation conditions.
          
          HID Smart DuoProx II Cards
          A longer read range and is able to have a contact smart chip. 
          Functions just like the DuoProx II cards.
          
          HID 1391 MicroProx Tag (26-bit)
          Provides the convenience of HID's proximity technology in a small 
          disk-shaped( 1.285" / 3.264 cm) transponder. Simply attach the 
          adhesive-backed Tag to any nonmetallic card or device, and you 
          instantly have a proximity card!
          With the HID MicroProx Tag you can upgrade from magnetic stripe or 
          barium ferrite technologies by simply adhering the Tag to your 
          existing access card. Easily and cost-effectively turn a plastic ID 
          badge or contact smartchip card into a proximity credential!
          The Tag can be programmed in any HID proximity format, and is 
          compatible with all HID proximity readers. Add proximity access 
          control capability to users' cell phones, PDAs and other similar 
          nonmetallic devices. Experience the convenience of proximity without 
          the expense of rebadging!The Tag is RF-programmable for ease of 
          encoding with HID's ProxProgrammer.
          Specifications
          Typical Maximum* Read Range
          ProxPoint™ reader up to 1.0" (2.5cm)
          MiniProx™ reader-up to 2" (5cm)
          ThinLine II® reader-up to 1.5" (3.7cm)
          ProxPro® reader-up to 3" (7.5cm)
          MaxiProx® reader-up to 4.5" (11.4cm)
          
          *Dependent on local installation conditions.
          
          HID 1386 ISOProx II Card (26-bit) 
          One of the most popular cards available from HID, the ISOProx II 
          allows you to print identification information on the same card that 
          you use for access control, eliminating the need to have two cards for 
          your employees.
          The HID ISOProx II Card offers proximity technology with photo 
          identification capability on a single card. It is ISO 7810 compliant, 
          with a nominal thickness of .030" (2.125" x 3.370" x 0.030" ± 0.003" 
          (5.4 x 8.6 x 0.076 ± 0.0076 cm)). The card features a graphics quality 
          surface optimized for Photo ID printing, and is available in standard 
          PVC construction, or a composite polyester/PVC construction for more 
          demanding high wear and tear environments. Like all HID ISO cards, the 
          HID ISOProx II card can be produced with visual security and 
          anti-counterfeiting features such as holograms, ultra-violet 
          fluorescent inks, micro-printing, or a custom logo to quickly and 
          easily identify genuine cards.
          Specifications
          Typical Maximum* Read Range
          ProxPoint® Plus reader-up to 2.5" (6.25 cm)
          MiniProx® reader-up to 5" (12.5 cm)
          ThinLine II® reader-up to 5" (12.5 cm)
          ProxPro® reader-up to 7" (17.5 cm)
          ProxPro® II reader-up to 8" (20 cm)
          Prox80™-up to 5" (12.7 cm)
          MaxiProx® reader-up to 20" (50 cm)
          
          *Dependent on local installation conditions.
          
          HID Smart ISOProx II Cards
          Have a longer read range and are able to have a contact smart chip. 
          Functions just like the ISOProx II cards.RF-programmable, 125 kHz, 
          customer-specified ID numbers,locations marked for horizontal and 
          vertical slot punch.
          
          HID 1346 ProxKey II (26-bit)
          is a proximity keyfob offering HID proximity technology in a 
          convenient, pocket size device(1.90" x 0.90" x 0.35" (4.83 x 2.29 x 
          0.89 cm)). It easily attaches to a key ring, badge clip or lanyard. 
          The HID ProxKey II is built to withstand harsh operating environments 
          or handling. The HID ProxKey II is suited for use in access control 
          applications where a Photo ID is not required.
          HID ProxKey II Keyfobs Features
          1.Small enough to fit on a key ring.
          2.Universal compatibility with HID proximity readers.
          3.Offers universal compatibility with all HID proximity readers.
          4.Provides an external number for easy identification and control Can 
          be placed on a key ring for convenient entry.
          5.Supports formats up to 85 bits, with over 137 billion codes.
          6.Using HID's ProxProgrammer, card vendors can ship proximity keyfobs, 
          custom programmed to their customers' requirements, from their own 
          inventory.
          Specifications 
          Typical Maximum* Read Range
          ProxPoint® Plus reader-up to 1.5" (3.7 cm)
          MiniProx™- reader-up to 2" (5 cm)
          ThinLine II® reader-up to 2" (5 cm)
          ProxPro® reader-up to 3" (7.5 cm)
          ProxPro®II reader-up to 4" (10.2 cm)
          Prox80™-up to 2" (5.1 cm)
          MaxiProx® reader-up to 12" (28 cm)
          
          *Dependent on local installation conditions.
          
          HID ProxPass II Active Tags
          HID ProxPass tags are made distinctively for vehicle access control. 
          The HID ProxPass tags make it a lot easier and convenient for fleet 
          management and parking applications to function(Up to Up to 6 (1.8 
          m)). The ProxPass tag(9.25cm x 6.75cm x .76cm) can easily be 
          integrated into a new or existing HID proximity application. Any HID 
          format can be encoded onto the HID tag. Two to five year battery life, 
          depending on usage. Compatible with MaxiProx reader and all HID card 
          formats.
          
          Host 
          Generally, it is the machine on which the driver resides. Sometimes 
          refers to a given client machine, e.g. in reference to a host-based 
          macro.
          
          HID Proprietary 37 Bit Format with Facility Code: H10304 
          The 37-bit format with facility code differs from the 37-bit format 
          only in that it also contains a facility code. Just like the 37 bit 
          without facility code, this format provides the customer with an open 
          format in which card numbers will not be duplicated, because HID 
          tracks the manufacture of cards to prevent duplication.
          This 37-bit format has 65,535 facility codes available and over 
          500,000 card numbers within each facility code. Just like the 37-bit 
          format without facility code, many systems are not capable of handling 
          a format as large as 37 bits. In addition, many systems are not 
          capable of handling a facility code as large as 65,535. The 37 bit 
          format with facility code is ideal for dealers who would like to have 
          their own format. This allows them to have the security of no 
          duplication of cards, while at the same time they are not dependent on 
          any system supplier for a format. This format is reserved for those 
          customers with a requirement for a large population of cards.
          
          Host Settings 
          The settings which determine the behavior of the application at the 
          host or workstation.
          
          HID Long Format Card Programming
          HID Long Format Card Programming allows up to 84 bits of user data to 
          be encoded on a card and transmitted by a reader to the OEM access 
          control panel or other host controller.
          Applications 
          Long Format allows HID compatibility with longer Wiegand formats sold 
          in Europe, allows emulation of existing Clock and Data (magstripe) 
          formats and allows new OEM formats to be created with longer 
          bitstreams for more security.
          Although identified by the reader hardware interface typically used, 
          any available hardware interface (Wiegand, Clock and Data or Serial) 
          can be used with any data structure type.
          
          HID Corporate 1000 Program
          The Corporate 1000 Program allows HID to provide end-user customers 
          with a 35-bit card format that is developed specifically for each 
          individual end-user customer. Within this program,HID can provide the 
          enduser with just over 1,000,000 individual card numbers within the 
          assigned format. Card numbers are tracked in the manufacturing process 
          to ensure that card numbers are not duplicated.
          Benefits of the Corporate 1000 Program
          * Security of the card and associated data is increased due to the 
          customized 35-bit format that is proprietary to each individual 
          end-user.
          * HID tracks card number sequences to prevent card number duplication; 
          the end-user is guaranteed that the card can be used on standard HID 
          proximity card readers throughout the world. Individual employees can 
          carry just one card to gain access to any facility in which they have 
          been authorized. In addition, the end-user may order cards from 
          multiple sources (as designated by the end-user) and be guaranteed 
          that card number duplication will not occur.
          * Due to the size of the available card population, the end-user is 
          assured that cards in the desired format will be available for years 
          to come.
          * The end-user is free to choose the access control hardware/software 
          platform that best meets the needs of individual sites, while insuring 
          that the same HID reader and card can be used. This provides the 
          end-user with maximum flexibility in choosing the access control 
          system and integrator/dealer that best meets their requirements. The 
          common component is the HID reader and card.
          * The end-user has the flexibility to choose the vendor(s) that they 
          wish to purchase cards from at any time. The end-user may choose to 
          have one source of supply or many.
          
          Human Biometric Characteristics
          Biometric characteristics can be divided in two main classes, as 
          represented in figure on the right:
 
• physiological are related to the shape of the body. The oldest 
          traits, that have been used for more than 100 years, are fingerprints. 
          Other examples are face recognition, hand geometry and iris 
          recognition. Visit: www.arindamcctvaccesscontrol.blogspot.com 
          • behavioral are related to the behavior of a person. The first 
          characteristic to be used, still widely used today, is the signature. 
          More modern approaches are the study of keystroke dynamics and of 
          voice. Visit: www.arindamcctvaccesscontrol.blogspot.com
          Strictly speaking, voice is also a physiological trait because every 
          person has a different pitch, but voice recognition is mainly based on 
          the study of the way a person speaks, commonly classified as 
          behavioral.
          Other biometric strategies are being developed such as those based on 
          gait (way of walking), retina, hand veins, ear canal, facial 
          thermogram, DNA, odor and scent and palm prints.
          
          Infrared cards
          Infrared cards contain a series of bar codes, similar to standard bar 
          code cards, that are only visible when exposed to special infrared 
          light. When the card is exposed to the special light, the bars cast a 
          shadow behind the card which is then read by the reader. They are 
          relatively low in cost, very reliable, not easily duplicated, and 
          offer a good level of security but can be difficult to laminate for 
          use as an ID card.
          
          Identification Algorithm
          The algorithm used for making a one-to-many search for user identity.
          
          Identification Algorithm
          The algorithm used for making a one-to-many search for user identity. 
          An input fingerprint is first matched at a coarse level to one of the 
          pre-specified types and then, at a finer level, it is compared to the 
          subset of the database containing that type of fingerprints only. We 
          have developed an algorithm to classify fingerprints into five 
          classes, namely, whorl, right loop, left loop, arch, and tented arch. 
          The algorithm separates the number of ridges present in four 
          directions (0 degree, 45 degree, 90 degree, and 135 degree) by 
          filtering the central part of a fingerprint with a bank of Gabor 
          filters. This information is quantized to generate a FingerCode which 
          is used for classification. Our classification is based on a two-stage 
          classifier which uses a K-nearest neighbor classifier in the first 
          stage and a set of neural networks in the second stage. The classifier 
          is tested on 4,000 images in the NIST-4 database. For the five-class 
          problem, classification accuracy of 90% is achieved. For the 
          four-class problem (arch and tented arch combined into one class), we 
          are able to achieve a classification accuracy of 94.8%. By 
          incorporating a reject option, the classification accuracy can be 
          increased to 96% for the five-class classification and to 97.8% for 
          the four-class classification when 30.8% of the images are rejected.
          
          ISO
          ISO(International Organization for Standardization)is the world's 
          largest developer and publisher of International Standards.
          ISO is a network of the national standards institutes of 163 
          countries, one member per country, with a Central Secretariat in 
          Geneva, Switzerland, that coordinates the system. 
          ISO is a non-governmental organization that forms a bridge between the 
          public and private sectors. On the one hand, many of its member 
          institutes are part of the governmental structure of their countries, 
          or are mandated by their government. On the other hand, other members 
          have their roots uniquely in the private sector, having been set up by 
          national partnerships of industry associations. 
          Therefore, ISO enables a consensus to be reached on solutions that 
          meet both the requirements of business and the broader needs of 
          society.
          
          ISO 7816-1 Smart Card Standard
          This part describes the physical charcteristics of integrated circuit 
          cards. It includes accomodation of exposure limits for a number of 
          electromagnetic phenomena such as X-rays, UV light, elacromagnetic 
          fields, static electrical fields, and ambient temperature of the card.
          
          ISO7816-1 defines the characteristics of a card when it is bent or 
          flexed. This is to make sure that plastic cards with embedded chips 
          are manufactured in a way that guarantees flawless operation over the 
          expected life time of a card. Connections beween the surface 
          connectors and the I/O pins of the embedded silicon die must be 
          maintaned and withstand mechanical stress. Bending and flexing 
          procedures are standardised in ISO 7816. 
          
          ISO 7816-2 Smart Card Standard
          ISO 7816 part 2 defines the dimensions and location of the contacts. 
          This part includes standards about number, function and position of 
          the electrical contacts. 
          The integrated circuit card (ICC) has 8 electrical contacts. They are 
          referred to as C1 through C8. However, not all 8 contacts are 
          electrically connected to the embedded microprocessor chip and 
          therefore remain unused.
          The following table contains the contact definition according to 
          ISO7816-2: 
          C1-- Vcc --Power connection through which operating power is supplied 
          to the microprocessor chip in the card
          C2 --RST =Reset line through which the IFD can signal to the smart 
          card's microprocessor chip to initiate its reset sequence of 
          instructions
          C3 CLK Clock signal line t hrough which a clock signal can be provided 
          to the microprocessor chip. This line controls the operation speed and 
          provides a common framework for data communication between the IFD and 
          the ICC
          C4-- RFU Reserved for future use
 
C5- GND Ground line providing common electrical ground between the 
          IFD and the ICC 
          C6-- Vpp Programming power connection used to program EEPROM of first 
          generation ICCs.
          C7-- I/O Input/output line that provides a half-duplex communication 
          channel between the reader and the smart card 
          C8-- RFU Reserved for future use
          
          Iris Recognition 
          Iris recognition is a method of biometric authentication that uses 
          pattern recognition techniques based on high-resolution images of the 
          irides of an individual's eyes. Not to be confused with another less 
          prevalent ocular-based technology, retina scanning, iris recognition 
          uses camera technology, and subtle IR illumination to reduce specular 
          reflection from the convex cornea to create images of the detail-rich, 
          intricate structures of the iris. These unique structures converted 
          into digital templates, provide mathematical representations of the 
          iris that yield unambiguous positive identification of an individual.
          Iris recognition efficacy is rarely impeded by glasses or contact 
          lenses. Iris technology has the smallest outlier (those who cannot 
          use/enroll) group of all biometric technologies. The only biometric 
          authentication technology designed for use in a one-to many search 
          environment, a key advantage of iris recognition is its stability, or 
          template longevity as, barring trauma, a single enrollment can last a 
          lifetime.
          
          Info-Ready Reporting
          A software development architecture that presents relevant system data 
          directly within the application rather than having to run multiple 
          external reports.No Power DNA allows operators to filter system events 
          through simple drag and drop function as well as making common 
          reports, such as "who has access", available from the right click 
          context menu.
          
          Image Database
          The database that contains all fingerprint templates in the system. 
          The image database can contain images of the fingerprints, as well as 
          photograph and signature images.
          
          IP controllers
          Controllers are connected to a host PC via Ethernet LAN or WAN. IP 
          access controller is an electronic security device designed to 
          identify users and control entry to or exit from protected areas. A 
          typical IP access controller supports 2 or 4 basic access control 
          readers. It may have an internal web server and support configuration 
          via a browser or via software installed on a host PC.
          The main features that distinguish IP controllers from older 
          generation of serial controllers are: 1. IP controllers connect 
          directly to LAN/WAN and have all the inputs and outputs necessary for 
          controlling readers, monitoring door inputs and controlling locks. 2. 
          IP controllers have an on-board network interface and does not require 
          the use of a terminal server. 
          
          Advantages:
          • An existing network infrastructure is fully utilized, there is no 
          need to install new communication lines.
          • There are no limitations regarding the number of controllers (32 per 
          line in case of RS-485).
          • Special RS-485 installation, termination, grounding and 
          troubleshooting knowledge is not required.
          • Communication with controllers may be done at the full network 
          speed, which is important if transferring a lot of data (databases 
          with thousands of users, possibly including biometric records).
          • In case of an alarm controllers may initiate connection to the host 
          PC. This ability is important in large systems because it allows to 
          reduce network traffic caused by unnecessary polling.
          • Simplifies installation of systems consisting of multiple sites 
          separated by large distances. Basic Internet link is sufficient to 
          establish connections to remote locations.
          • Wide selection of standard network equipment is available to provide 
          connectivity in different situations (fiber, wireless, VPN, dual path, 
          PoE).
          Disadvantages:
          • The system becomes susceptible to network related problems, such as 
          delays in case of heavy traffic and network equipment failures.
          • Access controllers and workstations may become accessible to hackers 
          if the network of the organization is not well protected. This threat 
          may be eliminated by physically separating the access control network 
          from the network of the organization. Also it should be noted that 
          most IP controllers utilize either Linux platform or proprietary 
          operating systems, which makes them more difficult to hack. Industry 
          standard data encryption is also used.
          • Maximum distance from a hub or a switch to the controller is 100 
          meters (330 ft).
          • Operation of the system is dependent on the host PC. In case the 
          host PC fails, events from controllers are not retrieved and functions 
          that required interaction between controllers (i.e. anti-passback) 
          stop working. Some controllers, however, have peer-to-peer 
          communication option in order to reduce dependency on the host PC.
          
          IP Reader
          Readers are connected to a host PC via Ethernet LAN or WAN. IP reader 
          is an electronic security device designed to identify users and 
          control entry to or exit from protected areas.
          An IP reader has two features that distinguish it from other access 
          control readers:
          1. Unlike basic readers, IP readers do not require control panels and 
          operate independently. A basic reader simply sends card numbers to a 
          panel and does not control an electric lock, door contact or exit 
          button. If the control panel fails, the basic reader stops working. An 
          IP reader has inputs for monitoring a door contact, exit button and a 
          relay for controlling an electric lock. It also has internal memory 
          for storing the database of users, configuration parameters and 
          recording events. Such readers are sometimes referred to as 
          "intelligent readers" or "readers with built-in controllers".
          2. IP readers have an on-board network interface (10/100BaseT Ethernet 
          or Wi-Fi).
          The first IP reader was introduced in 1999 by Isonas Security Systems 
          Inc.
          Advantages:
          • Most IP readers are PoE capable. This feature makes it very easy to 
          provide battery backed power to the entire system, including the locks 
          and various types of detectors (if used).
          • IP readers eliminate the need for controller enclosures.
          • There is no wasted capacity when using IP readers (i.e. a 4-door 
          controller would have 25% unused capacity if it was controlling only 3 
          doors).
          • IP reader systems scale easily: there is no need to install new main 
          or sub-controllers.
          • Failure of one IP reader does not affect any other readers in the 
          system.
          Disadvantages:
          • In order to be used in high-security areas IP readers require 
          special input/output modules to eliminate the possibility of intrusion 
          by accessing lock and/or exit button wiring. Not all IP reader 
          manufacturers have such modules available.
          • Being more sophisticated than basic readers IP readers are also more 
          expensive and sensitive, therefore they should not be installed 
          outdoors in areas with harsh weather conditions or high possibility of 
          vandalism.
          • The variety of IP readers in terms of identification technologies 
          and read range is much lower than that of the basic readers.
          
          Internet service provider(ISP) 
          An Internet service provider (ISP), also sometimes referred to as an 
          Internet access provider (IAP), is a company that offers its customers 
          access to the Internet. The ISP connects to its customers using a data 
          transmission technology appropriate for delivering Internet Protocol 
          Paradigm, such as dial-up, DSL, cable modem, wireless or dedicated 
          high-speed interconnects.
          ISPs may provide Internet e-mail accounts to users which allow them to 
          communicate with one another by sending and receiving electronic 
          messages through their ISP's servers. ISPs may provide services such 
          as remotely storing data files on behalf of their customers, as well 
          as other services unique to each particular ISP.
          
          Key
          A string of bits used widely in cryptography, allowing people to 
          encrypt and decrypt data; a key can be used to perform other 
          mathematical operations as well. 
          
          Keypads
          Keypads use a numeric pad, similar to that of a telephone. The user 
          simply presses his code into the keypad and the system reads the 
          numbers. This system does not require the user to carry any special 
          card or token but can less secure since unless the user is very 
          careful someone may see which numbers are being pressed. Certain 
          keypads overcome this drawback by scrambling the number layout each 
          time the keypad is used. Keypads can be use either by themselves or 
          for high security in conjunction with some card reader technology. In 
          this manner the user must both present a card and enter a code before 
          access is granted.
          
          Key Management
          The various processes that deal with the creation, distribution, 
          authentication, and storage of keys.
          
          Keystroke Dynamics Identification Technology 
 
The behavioral biometric of Keystroke Dynamics uses the manner and 
          rhythm in which an individual types characters on a keyboard or 
          keypad. The keystroke rhythms of a user are measured to develop a 
          unique biometric template of the users typing pattern for future 
          authentication. Raw measurements available from most every keyboard 
          can be recorded to determine Dwell time (the time a key pressed) and 
          Flight time (the time between “key down” and the next “key down” and 
          the time between “key up” and the next “key up”). The recorded 
          keystroke timing data is then processed through a unique neural 
          algorithm, which determines a primary pattern for future comparison.
          Data needed to analyze keystroke dynamics is obtained by keystroke 
          logging. Normally, all that is retained when logging a typing session 
          is the sequence of characters corresponding to the order in which keys 
          were pressed and timing information is discarded. When reading email, 
          the receiver cannot tell from reading the phrase "I saw 3 zebras!" 
          whether:
          •that was typed rapidly or slowly 
          •the sender used the left shift key, the right shift key, or the 
          caps-lock key to make the "i" turn into a capitalized letter "I" 
          •the letters were all typed at the same pace, or if there was a long 
          pause before the letter "z" or the numeral "3" while you were looking 
          for that letter 
          •the sender typed any letters wrong initially and then went back and 
          corrected them, or if he got them right the first time 
          
          Landscape
          Horizontal orientation of pages, screen displays or badges.
          
          Latent Fingerprint
          Latent fingerprints are "left over" fragments usually caused by the 
          build-up of oily residues on the optic sensor window after repeated 
          use. The technique used by BioCert devices to defeat "faked" 
          fingerprints also prevents latent fingerprints from being incorrectly 
          validated by the system.
          
          Logical Access Control
          Logical access refers to the collection of policies, procedures, 
          organizational structure and electronic access controls designed to 
          restrict access to computer software and data files.
          Logical access encompasses a number of PC- and network-related 
          applications including secure authentication and/or log-in to the PC 
          or network, secure email, data encryption, file / folder encryption, 
          single sign-on and remote VPN access. By collaborating with IT 
          industry leaders, HID Global has complemented its physical access 
          control offerings with an extensive portfolio of logical access 
          offerings enabling a wide range of logical/physical convergence 
          solutions.
          In addition to having HID technology seamlessly integrated into the 
          new Dell® Latitude™ E-Family of laptops, the company’s portfolio of 
          logical access products, solutions and capabilities extends the 
          company’s strategy of providing solutions for the delivery of secure 
          identity.
          
          Logo
          A graphic symbol used to represent a company or organization.
          
          Live Biometric Capture
          A "live biometric capture" refers to a device that obtains biometric 
          information immediately, typically in a digital format, ready for 
          comparison to a database.
          Here are some examples of live biometric capture:
          • A fingerprint capture device that electronically captures 
          fingerprint images using a sensor (rather than scanning ink-based 
          fingerprint images from a card, or attempting to scan images lifted 
          from a surface).
          • An iris or retinal scanner that immediately provides appropriate 
          information for database comparison.
          • A digital photograph of the person's face.
          
          Liveness Detection
          "Liveness detection" is a biometric capture technique used to ensure 
          that the biometric sample submitted is from an end user. A liveness 
          detection method can help protect the system against some types of 
          spoofing attacks.
          
          MAC address
          A MAC address is a physical hardware address assigned to each device 
          that has the capability of connecting to a network. The internet is 
          nothing more than a large network. The MAC address is something that 
          is assigned in the chip on the device and is not something the user 
          can change.
          
          MAC Cloning
          MAC cloning can only be done at your router providing it has those 
          capabilities. Most ISPs assign their IPs based on the MAC address in 
          your equipment. If the MAC address of your router is 00-11-22-33-44-55 
          and you connect to your ISP, the DHCP server records your MAC and 
          assigns an IP. If you disconnect from the ISP, you lose your IP 
          address. The next time you connect, the DHCP server sees your MAC, 
          looks to see if it has assigned an IP address to you before. If it has 
          and the lease time has not expired, it will most likely give you the 
          same IP address you had before disconnecting. Why clone a MAC address? 
          New MAC address most likely equals new IP. How to clone your MAC and 
          if your router has this feature is dependent on the router itself. 
          You’ll need to find the instructions on the manufacturer’s website.
          
          Machine Readable
          A code or characters that can be read by machines.
          
          Magnetic lock
          
          
A 
          magnetic lock is a simple locking device that consists of an 
          electromagnet and armature plate. By attaching the electromagnet to 
          the door frame and the armature plate to the door, a current passing 
          through the electromagnet attracts the armature plate holding the door 
          shut. Unlike an electric strike a magnetic lock has no interconnecting 
          parts and is therefore not suitable for high security applications 
          because it is possible to bypass the lock by disrupting the power 
          supply. Nevertheless, the strength of today's magnetic locks compares 
          well with that of conventional door locks and they cost less than 
          conventional light bulbs to operate. Power supplies incorporating a 
          trickle-charged lead-acid battery pack can be used to retain security 
          for short-term power outages. All magnetic locks(300LBS, 600LBS, 
          1200LBS ETC) will work only with DC current, usually 12 to 24 volts. 
          Never connect a magnetic lock to AC current of any voltage.
          The magnetic lock should always be installed on the inside (secure 
          side) of the door. Installation is as simple as installing on the 
          header of the door frame for out-swinging doors or using a Z-bracket 
          for in-swinging doors. It is important to make sure the armature plate 
          and the electromagnet align as closely as possible to ensure efficient 
          operation. Magnetic locks are almost always part of a complete 
          electronic security system. Such a system may simply consist of an 
          attached keycard reader or may be more complex involving connection to 
          a central computer that monitors the building's security. Whatever the 
          choice of locking system, fire safety is an important consideration
          
          Magnetic Stripe
          Magnetic material, usually applied as a stripe on a card, used to 
          encode cardholder information.
          
          Magnetic stripe cards
          Magnetic stripe cards use the same technology that is employed in 
          credit cards, and are probably the most common type of card in use. 
          There are two types of magnetic cards, low-coercivity and high-coercivity. 
          The high-coercivity types are less prone to accidental erasure and 
          damage. Magnetic stripe cards require that the card come in direct 
          contact with the reader head causing wear and a shorter life span. 
          This direct contact requirement also can cause misreads due to dirt 
          and debris accumulation in the reader. Certain access control systems 
          allow the user to utilize their existing credit cards, eliminating the 
          need to purchase cards. The cards are low in cost but are easily 
          duplicated, are affected by outside magnetic fields, and the readers 
          require occasional cleaning to remove any dirt buildup on the read 
          heads.
          A number of International Organization for Standardization standards, 
          ISO/IEC 7810, ISO/IEC 7811, ISO/IEC 7812, ISO/IEC 7813, ISO 8583 and 
          ISO/IEC 4909, define the physical properties of the card, including 
          size, flexibility, location of the mag-stripe, magnetic 
          characteristics, and data formats.They also provide the standards for 
          financial cards, including the allocation of card number ranges to 
          different card issuing institutions.
          
          Macro
          A defined set of actions or commands that can be manually executed by 
          the operator or is based on a trigger event.
          
          Matching 
          Biometric data (e.g. fingerprints) are matched to another sample to 
          confirm a person’s identity (authentication). For example, useing 
          optic scanners to collect fingerprint minutiae, then create 
          mathematical templates based on that information for storage. New 
          input fingerprints are scanned and compared to the stored samples. If 
          the minutiae matching threshold is met, the person is authenticated.
          The matching step is classified into 1:1 and 1:N matching according to 
          its purpose and/or the number of reference templates. 1:1 matching is 
          also called personal identification or verification. It is a procedure 
          in which a user claims his/her identity by means of an ID and proves 
          it with a fingerprint. The comparison occurs only once between the 
          input fingerprint image and the selected one from the database 
          following the claim by the user.
          On the contrary, 1:N matching denotes a procedure where the system 
          determines the user's identity by comparing the input fingerprint with 
          the information in the database without asking for the user's claim. A 
          good example of this is AFIS(Automated Fingerprint Identification 
          System) frequently used in criminal investigation.
          The output result of the matching step is whether or not the input 
          fingerprint is identical to the one being compared in the database. 
          Then how could the accuracy of the matching procedure be represented 
          in number? The simplest measures are FRR(False Reject Rate) and 
          FAR(False Accept Rate). The former is the rate of genuine user's 
          rejection and the latter is the rate of impostor's acceptance.
          
          Memory Cards
          Although referred to as smart cards, memory cards are typically much 
          less expensive and much less functional than microprocessor cards. 
          They contain erasable programmable read-only memory (EEPROM) and 
          read-only memory (ROM), as well as some address and security logic. In 
          the simplest designs, logic exists to prevent writing and erasing of 
          the data. More complex designs allow memory read access to be 
          restricted. Typical memory card applications are pre-paid telephone 
          cards and health insurance cards.
          
          Mifare
          Mifare is an interface for contact less smart cards and smart card 
          readers. It has been developed by Philips and influencing the ISO14443 
          Standard.
          
          MIFARE Ultralight
          Low-cost ICs that employ the same protocol as MIFARE Classic, Only 512 
          bits of memory (i.e. 64 bytes), without cryptographic security and 
          slightly different commands.
          
          MIFARE Plus 
          Drop-in replacement for MIFARE Classic with certified security level 
          AES 128 based. 2Kbytes or 4Kbytes of memory, Security upgrade with 
          cards in the field.
          
          MIFARE Classic
          The MIFARE Classic card is fundamentally just a memory storage device, 
          where the memory is divided into segments and blocks with simple 
          security mechanisms for Access Control. The MIFARE Classic 1K offers 
          1024 bytes of data storage, split into 16 sectors; each sector is 
          protected by two different keys, called A and B. They can be 
          programmed for operations like reading, writing, increasing value 
          blocks etc.). MIFARE Classic 4K offers 4096 bytes split into forty 
          sectors, of which 32 are same size as in the 1K with eight more that 
          are quadruple size sectors. MIFARE Classic mini offers 320 bytes split 
          into five sectors. For each of these card types, 16 bytes per sector 
          are reserved for the keys and access conditions and can not normally 
          be used for user data. Also, the very first 16 bytes contain the 
          serial number of the card and certain other manufacturer data and are 
          read only. That brings the net storage capacity of these cards down to 
          752 bytes for Classic 1k, 3440 bytes for Classic 4k, and 224 bytes for 
          Mini.
          
          Minutiae
          The unique, measurable physical characteristics scanned as input and 
          stored for matching by biometric systems. For fingerprints, minutiae 
          include the starting and ending points of ridges, bifurcations and 
          ridge junctions among other features.
          
          Minutiae Database
          The database that contains all fingerprint templates in the system. 
          The minutiae database is contained within the image database.
          
          Masking 
          Hiding or suppressing alarms that the operator does not wish to be 
          viewed.
          
          MPG (Monitor Point Group) 
          A collection of monitor points that typically have been grouped for 
          common manageability.
          
          NIST 
          Abbreviation for the National Institute for Standardization of 
          Technology, which is an agency of the US Federal Government which 
          establishes standards and guidelines for private and public sector 
          purposes.
          
          NAT (Network address translation)
          When a network device with a private IP address wants to send 
          information via the Internet, it must do so using a router that 
          supports NAT. Using this technique, the router can translate a private 
          IP address into a public IP address without the sending host’s 
          knowledge.
          
          Non-cooperative User
          An individual who is not aware that his/her biometric sample is being 
          collected. The phrase denotes a person who has not explicitly agreed 
          to provide biometric information.
          Example: A traveler passing through a security line at an airport is 
          unaware that a camera is capturing his/her face image.
          
          Network-enabled main controllers
          The topology is nearly the same as described in the second and third 
          paragraphs. The same advantages and disadvantages apply, but the 
          on-board network interface offers a couple valuable improvements. 
          Transmission of configuration and users to the main controllers is 
          faster and may be done in parallel. This makes the system more 
          responsive and does not interrupt normal operations. No special 
          hardware is required in order to achieve redundant host PC setup: in 
          case the primary host PC fails, the secondary host PC may start 
          polling network controllers.
          
          Odor Identification Technology 
          The body odor biometrics is based on the fact that virtually each 
          human smell is unique. The smell is captured by sensors that are 
          capable to obtain the odor from non-intrusive parts of the body such 
          as the back of the hand. Methods of capturing a person’s smell are 
          being explored by Mastiff Electronic Systems. Each human smell is made 
          up of chemicals known as volatiles. They are extracted by the system 
          and converted into a template.
          The use of body odor sensors brings up the privacy issue as the body 
          odor carries a significant amount of sensitive personal information. 
          It is possible to diagnose some diseases or activities in the last 
          hours (like sex, for example) by analyzing the body odor.
          
          Operator
          Anyone with access to the application. The Administrator is also an 
          Operator, though generally distinguished in the documentation due to 
          the difference in responsibility and permissions.
          
          Overt Collection
          This term describes biometric sample collection where end users 
          (subjects) know they are being collected and at what location. 
          An example of an overt environment is the US-VISIT program where non-U.S. 
          citizens entering the United States submit their fingerprint data.
          
          One-to-One
          A phrase used in the biometrics community to describe a system that 
          compares one reference to one enrolled reference to make a decision.
          
          typically, the phrase "one-to-one" refers to the verification task 
          (though not all verification tasks are truly one-to-one) and the 
          identification task can be accomplished by a series of one-to-one 
          comparisons.
          
          One-to-Many
          Fingerprint search that compares the minutiae from a candidate 
          fingerprint image against the fingerprint minutiae database to 
          determine whether or not the candidate exists in the database.
          
          OEM (Original Equipment Manufacturer)
          This is a designation for companies that manufacture equipment that is 
          then marketed and sold to other companies under their own names.
          
          OEM Proprietary Formats
          OEM formats are a unique data format reserved for the exclusive use of 
          an HID OEM customer. The OEM format structure is defined by the OEM 
          customer and HID. OEM formats are available in a number of different 
          data lengths with various data field definitions. The OEM format is 
          the HID customer's way of providing their customers with a unique 
          card, and unduplicated card numbers.
          
          Optical Sensors 
          Optical sensors use arrays of photo-diode or photo-transistor 
          detectors to convert the energy in light incident on the detector into 
          electrical charge. The sensor package usually includes a 
          light-emitting-diode (LED) to illuminate the finger. 
          There are two detector types used by optical sensors, 
          charge-coupled-devices (CCD) and CMOS based optical imagers. CCD 
          detectors are sensitive to low light levels and are capable of making 
          excellent gray-scale pictures. However, CCD fabrication is relatively 
          expensive and neither low-light sensitivity or gray-scale imaging are 
          required for fingerprint recognition. CMOS optical imagers are 
          manufactured in quantity and can be made with some of the image 
          processing steps built into the chip resulting in a lower cost. 
          Optical sensors for fingerprints may be affected by a number of real 
          world factors such as stray light and surface contamination, possibly 
          even a fingerprint impression left by a prior user. Common 
          contaminates that deteriorate image quality include oil and dirt, 
          scratches on the sensor surface, and condensation or ice. Some 
          suppliers have tried to sidestep the contamination problem by directly 
          taking a 3D image from the surface of a finger. 3D imaging technology 
          is more hygienic but introduces a whole new set of problems and was 
          not included in this study. 
          Impostor prints are more of a problem for optical sensors than it is 
          for other detectors because it is relatively easy to present the 
          scanner with a convincing picture of a fingerprint. Suppliers have 
          come up with several techniques to validate a live finger. For example 
          optical sensors can be enhanced and made more resistant to deception 
          with Electro-Optical imaging. This works by placing a voltage across a 
          light-emitting polymer film. When a finger is presented, the ridges 
          provide a ground to the polymer surface creating a small current that 
          generating light. The fingerprint valleys remain dark so a high 
          contrast image is produced. The polymer is directly coupled to an 
          optical detector.
          
          ONVIF (Open Network Video Interface Forum)
          ONVIF is an open industry forum for the development of a global 
          standard for the interface of network video products.
          
          PEM (Privacy Enhanced Mail)
          An early standard for securing electronic mail. The PEM-format is 
          often used for representing an HTTPS certificate or certificate 
          request.
          
          Palmprint 
          Palmprint is based on ridges, principal lines and wrinkles on the 
          surface of the palm 
          Ridges: When you look closely to you palm and fingers, you will notice 
          that the skin is not smooth, but has some sort of a pattern. You will 
          also notice that this pattern is actually formed by the raised portion 
          of the skin. This raised portion is called ridges. When pattern is 
          captured from your palm, then it is called a palmprint, and when 
          captured from the tip of the finger then it is called fingerprints.
          Advantages of Palmprint Biometrics:
          • Since the palm area is much larger, hence more distinctive features 
          can be captured compared to fingerprints. This makes it more even more 
          suitable in identification systems than fingerprints. 
          Disadvantages of Palmprint Biometrics:
          • The palmprint scanners are usually bulkier and expensive since they 
          need to capture a larger area than the fingerprints scanners. 
          
          
          
 
          Passive RFID tag
          A passive tag is an RFID tag that does not contain a battery; the 
          power is supplied by the reader. When radio waves from the reader are 
          encountered by a passive RFID tag, the coiled antenna within the tag 
          forms a magnetic field. The tag draws power from it, energizing the 
          circuits in the tag. The tag then sends the information encoded in the 
          tag's memory. The advantages of a passive RFID tag are: The tag 
          functions without a battery; these tags have a useful life of twenty 
          years or more.
          The tag is typically much less expensive to manufacture 
          The tag is much smaller (some tags are the size of a grain of rice). 
          These tags have almost unlimited applications in consumer goods and 
          other areas. The major disadvantages of a passive RFID tag are: 
          The tag can be read only at very short distances, typically a few feet 
          at most. This greatly limits the device for certain applications. It 
          may not be possible to include sensors that can use electricity for 
          power. The tag remains readable for a very long time, even after the 
          product to which the tag is attached has been sold and is no longer 
          being tracked.
          
          PIV-card
 
              
              ![]()  | 
            
| PIV Card | 
Personal Identity Verification Card required to be issued to all US 
          Federal employees and contractors under HSPD-12.
          
          Precise Match-on-Card 
          The company's technology for storing and matching fingerprints on 
          smart cards. The smart card has built-in software which matches the 
          template saved on the card against the input biometric image. As such, 
          the template never leaves the secure environment of the smart card, 
          protecting both the biometric information and the user's personal 
          privacy.
          
          Palm Vein Identification Technology
          The pattern of blood veins is unique to every individual, even among 
          identical twins. Palms have a broad and complicated vascular pattern 
          and thus contain a wealth of differentiating features for personal 
          identification. Furthermore, it will not vary during the person's 
          lifetime. It is a very secure method of authentication because this 
          blood vein pattern lies under the skin. This makes it almost 
          impossible for others to read or copy.
 
An individual's vein pattern image is captured by radiating his/her 
          hand with near-infrared rays. The reflection method illuminates the 
          palm using an infrared ray and captures the light given off by the 
          region after diffusion through the palm. The deoxidized hemoglobin in 
          the in the vein vessels absorbs the infrared ray, thereby reducing the 
          reflection rate and causing the veins to appear as a black pattern. 
          This vein pattern is then verified against a preregistered pattern to 
          authenticate the individual.
          As veins are internal in the body and have a wealth of differentiating 
          features, attempts to forge an identity are extremely difficult, 
          thereby enabling a high level of security. In addition, the sensor of 
          the palm vein device can only recognize the pattern if the deoxidized 
          hemoglobin is actively flowing within the individual's veins.
          This system is not dangerous; a near infrared is a component of 
          sunlight: there is no more exposure when scanning the hand than by 
          walking outside in the sun.
          
          Password
          The permission level of the operator environment. Required for 
          permission to log on to the application.
          
          Password Bank
          A database for storing username, password and other personal 
          information, to be released upon verification of an individual's 
          identity.
          
          Portrait
          Vertical orientation of pages, screen display or badges
          
          Pressure Sensors
 
Pressure sensing scanners can be made very thin and are often used 
          in electronic devices. Early pressure sensing scanners had to make a 
          tradeoff between durability and quality because any protective layer 
          on the detector surface would diminish the contrast of the impression. 
          There are two types of pressure sensing detectors available, 
          conductive film detectors and micro electro-mechanical devices (MEMS). 
          Conductive film sensors use a double-layer electrode on flexible 
          films. MEMS is a newer technology that uses extremely tiny silicon 
          switches on a silicon chip. When a fingerprint ridge touches a switch, 
          it closes and is detected electronically 
          
          Pre-Alarm Held
          An alert given before an opened door reports “held open” alarm.
          
          Physical/Physiological Biometric
          A biometric that is characterized by a physical characteristic rather 
          than a behavioral trait. (contrast with behavioral biometric)
          
          Proximity
          The most common reader is called Proximity. These systems use cards or 
          tokens as a means of identification. As the name implies, no direct 
          contact is required between the card and the reader for the system to 
          operate, the card must only be in the proximity of the reader. The 
          read range will vary depending upon the card/token and the type of 
          reader, from 1/2 inch to up to 33 feet. The reader generates an RF 
          field which causes specially designed wires in the card to resonate, 
          transferring the card information to the reader. These cards are 
          immune to electromagnetic and RF interference, and they can offer 
          "hands free" operation.
          
          Proximity card(Proximity Access card)
          Proximity card (or Prox Card) is a generic name for contactless 
          integrated circuit devices used for security access. It can refer to 
          the older 125 kHz devices or the newer 13.56 MHz contactless RFID 
          cards, most commonly known as contactless smartcards.
 
Modern proximity cards are covered by the ISO/IEC 14443 (Proximity 
          Card) standard. There is also a related ISO/IEC 15693 (Vicinity Card) 
          standard. Proximity cards are powered by resonant energy transfer and 
          have a range of 0-3 inches in most instances. The user will usually be 
          able to leave the card inside a wallet or purse. Proximity cards use 
          an LC circuit. An IC, capacitor, and coil are connected in parallel. 
          The card reader presents a field that excites the coil and charges the 
          capacitor, which in turn energizes and powers the IC. The IC then 
          transmits the card number via the coil to the card reader. The card 
          readers communicate in Wiegand protocol that consists of a data 0 and 
          a data 1 circuit (or binary or simple on/off (digital) type circuit). 
          The earliest cards were 26 bit. As demand has increased bit size has 
          increased to continue to provide unique numbers. Often, the first 
          several bits can be made identical; these are called facility or site 
          code. The idea is that company Alice has a facility code of xn and a 
          card set of 0001 through 1000 and company Bob has a facility code of 
          yn and a card set also of 0001 through 1000.
          
          Proximity card Reader
          A Proximity reader radiates a 1" to 20" electrical field around 
          itself. Cards use a simple LC circuit. When a card is presented to the 
          reader, the reader's electrical field excites a coil in the card. The 
          coil charges a capacitor and in turn powers an integrated circuit. The 
          integrated circuit outputs the card number to the coil which transmits 
          it to the reader.
          
          
A 
          common proximity format is 26 bit Wiegand. This format uses a facility 
          code, sometimes also called a site code. The facility code is a unique 
          number common to all of the cards in a particular set. The idea is 
          that an organization will have their own facility code and a set of 
          numbered cards incrementing from 1. Another organization has a 
          different facility code and their card set also increments from 1. 
          Thus different organizations can have card sets with the same card 
          numbers but since the facility codes differ, the cards only work at 
          one organization. This idea worked fine for a while but there is no 
          governing body controlling card numbers, and different manufacturers 
          can supply cards with identical facility codes and identical card 
          numbers to different organizations. Thus there is a problem of 
          duplicate cards. To counteract this problem some manufacturers have 
          created formats beyond 26 bit Wiegand that they control and issue to 
          organizations.
          In the 26 bit Wiegand format, bit 1 is an even parity bit. Bits 2-9 
          are a facility code. Bits 10-25 are the card number. Bit 26 is an odd 
          parity bit. Other formats have a similar structure of a leading 
          facility code followed by the card number and including parity bits 
          for error checking.
          
          PIN
          A Personal Identification Number assigned to a user. It is used either 
          by itself or in conjunction with a card.
          
          Ping 
          Ping is a basic network program used diagnostically to check the 
          status of a network host or device. Ping can be used to see if a 
          particular network address (IP address or host name) is occupied or 
          not, or if the host at that address is responding normally. Ping can 
          be run from e.g. the Windows Command prompt or the command line in 
          Unix.
          
          Port forwarding
          Port forwarding or port mapping commonly refers to the change of 
          destination address and/or port on the packet with subsequent regular 
          routing in a network address translator (NAT) gateway to reach a host 
          within a masqueraded, typically private, network based on the port 
          number on which it was received from the originating host. It may also 
          refer to replaying the packet or stream through a secondary socket 
          (e.g. like rinetd) to reach its intended destination.
          The technique is used to permit communications by external hosts with 
          services provided within a private local area network (LAN).
          Port forwarding allows remote computers (e.g., public machines on the 
          Internet) to connect to a specific computer within a private LAN.
          For example:
          •Running a public HTTP server within a private LAN (port 80)
          •Permitting Secure Shell access on the private LAN from the Internet 
          (port 22)
          •Permitting FTP access to hosts on a private LAN from the Internet 
          (port 21)
          Port forwarding can also be used within a single machine. Port 
          forwarding is necessary for a standalone computer if any of the 
          following conditions are true:
          •The computer is using a shared IP address.
          •Internet Connection Sharing is enabled.
          •A router is being used with network address translation (NAT) 
          enabled.
          
           Purge database
           This function is used to remove the unnecessary data from the 
          database. For removing the data select date, so that all the access 
          transactions which occurred before that date will be erased from the 
          database.
          
          QoS (Quality of Service)
          QoS provides the means to guarantee a certain level of a specified 
          resource to selected traffic on a network. Quality can be defined as 
          e.g. a maintained level of bandwidth, low latency, no packet losses, 
          etc. The QoS in Axis network video products marks the data packets for 
          various types of network traffic originating from the product. This 
          makes it possible for network routers and switches to e.g. reserve a 
          fixed amount of bandwidth for these types of traffic
          
          Reader
          A device that can read the encoding on a card or badge.
          
          RS232
          RS-232 (Recommended Standard 232) is a standard for serial binary 
          single-ended data and control signals connecting between a DTE (Data 
          Terminal Equipment) and a DCE (Data Circuit-terminating Equipment). It 
          is commonly used in computer serial ports. 
          Mode of Operation: SINGLE-ENDED
          Total Number of Drivers and Receivers on One Line: 1 DRIVER-1 RECVR
          Maximum Cable Length: 15Mtr (50 FT).
          Maximum Data Rate: 20kb/s
          Receiver Input Resistance: 3KΩ - 7 KΩ
          
          RS 485 / EIA-485
          RS485 are serial communication methods for computers and devices. Most 
          versatile communication standard in the standard series defined by the 
          EIA, as it performs well on all four points. That is why RS485 is 
          currently a widely used communication interface in data acquisition 
          and control applications where multiple nodes communicate with each 
          other.
          Max number of drivers/receivers : 32
          Physical Media Twisted : Pair
          Modes of operation : half duplex
          Available Signals Tx+/Rx+, Tx-/Rx- (Half Duplex) & Tx+, Tx-, Rx+, Rx- 
          (Full Duplex)
          Network topology: Point-to-point, Multi-dropped, Multi-point
          Max distance (acc. standard): 1200 m (4000 feet)
          Max speed at 12 m: 35 Mbs & 1200 m: 100 kbs
          Receiver input resistance: ≥12 kΩ
          Driver load impedance: 54 Ω
          RS485 is the only of the interfaces capable of internetworking 
          multiple transmitters and receivers in the same network. When using 
          the default RS485 receivers with an input resistance of 12 kΩ it is 
          possible to connect 32 devices to the network. Currently available 
          high-resistance RS485 inputs allow this number to be expanded to 256. 
          RS485 repeaters are also available which make it possible to increase 
          the number of nodes to several thousands, spanning multiple 
          kilometers.
          
          Remote Host
          A system where the main computer that controls the system is remotely 
          located. It allows a single computer to control multiple systems.
          
          Reference Template
          Data that represents the biometric measurement of an enrollee used by 
          a biometric system for comparison against subsequently submitted 
          biometric samples.
          
          Registration
          Process of registering biometric data with a Fingerprint 
          Identification Unit (FIU) or other biometric system.
          
          Rejection/False Rejection 
          When a biometric system fails to identify an enrollee or fails to 
          verify the legitimate claimed identity of an enrollee. Also known as a 
          Type I error. 
          
          Response Time/Processing Time 
          The time period required by a biometric system to return a decision on 
          identification or verification of a biometric sample.
          
          Retinal Biometrics
          Retinography/Retinal Biometrics is a sophisticated means for 
          identifying people by the pattern of blood vessels on the retina (the 
          innermost coat of the back part of the eye). It requires the use of a 
          special scanner about the size of a shoe-box that can map the unique 
          pattern of blood vessels on the retina. The pattern is so complex that 
          even identical twins do not have the same blood vessel configuration. 
          Those who favor its use claim Retinography has an error rate of only 
          one in a million.
          
          
          
Retina 
          Scanning
          A retinal scanner uses infrared light for mapping. As a person looks 
          into the eyepiece, an invisible beam of low-energy infrared light 
          traces a circular path on the retina at the back of the eye. The 
          blood-filled capillaries absorb more of the infrared light than the 
          surrounding tissue. Because of this, there is a variation in the 
          intensity of the reflection. The scanner measures this reflection at 
          320 points along the beam path. It then assigns an intensity grade 
          between zero and 4,095. The resulting numbers are compressed into an 
          80-byte computer code. This code can then be compared with patterns 
          that have already been entered into the computer's database.
          Retina scans are already in use in the Pentagon and government and 
          corporate organizations where people need to be identified before they 
          can enter an area. New concerns about security from terrorism and bank 
          and credit card fraud have caused many organizations to think 
          seriously of using retina scans or other biometric means to identify 
          people at airports and ATM machines.
          
          RF Sensors
          A low radio frequency (RF) signal is applied to the user’s finger and 
          then read by the detector array, with each pixel operating like a tiny 
          antenna. The advantage of this detector is that it reads the 
          fingerprint from the dermal layer underneath the surface making it 
          less susceptible to damaged or dry fingertips.
          
          Radio frequency identification (RFID)
          Radio frequency identification (RFID) is a generic term for 
          technologies that use radio waves to automatically identify people or 
          objects. It commonly works with a compute information system as 
          advanced means to control or manage terminal articles or people.
          RFID is composed of microchip and antenna with various encapsulations 
          to adapt different environment in application. The antenna enables the 
          chip to communicate with the identification information to a reader in 
          air by contactless digital information transfer. For long lifespan and 
          low cost thinking, most of RFID product in common use are passive RFID, 
          it means no battery enclosed in, and it get the power from 
          corresponding frequency wave energy of reader.
          RFID is a new technique emerging to business application with 10ten 
          year. We have great confidence from these years experience and 
          progress with process of innovation which rapidly accumulated. 
          Nevertheless, the advent of high-performance, facile, low-cost, RFID 
          technology is absolutely central to the ability to conduct information 
          warfare and information operations today. applications for RFID: RFID 
          is used for everything from tracking cows and pets to triggering 
          equipment down oil wells. It may sound trite, but the applications are 
          limited only by people's imagination. The most common applications are 
          payment systems (Mobil Speedpass and toll collection systems, for 
          instance), access control and asset tracking. Increasingly, retail/CPG 
          and pharma companies are looking to use RFID to track goods within 
          their supply chain, to work in process and for other applications.
          
          Reverse port forwarding
          Reverse port forwarding, or reverse port tunnelling, is 
          done by two components, usually software-based, where one component 
          acts as a session-server—listening on a session-port, while the other 
          component acts as a session-client to the session-server 
          component—connecting to the session-server. After a session is 
          established, the session-server will often listen on (accept 
          connections on) a port that is to be forwarded, and when a connection 
          is made to this port, the connection traffic will be forwarded to the 
          session-client (through the session-connection that was previously 
          initiated by the session-client), usually with a destination of the 
          session-client machine or another machine accessible from the 
          session-client.
          A common situation where this type of forwarding is used is where a 
          port needs to be accessed that is on a machine located behind a 
          gateway/router or firewall that is not configurable by those wanting 
          to access that port. This functionality is built-in to some 
          implementations of SSH (Secure Shell), and there are also software 
          systems available that are designed more specifically for this type of 
          forwarding.
          
          RTCP (Real-Time Control Protocol)
          RTCP provides support for real-time conferencing of groups of any size 
          within an intranet. This support includes source identification and 
          support for gateways like audio and video bridges as well as 
          multicast-to-unicast translators.
          It offers quality-of-service feedback from receivers to the multicast 
          group as well as support for the synchronization of different media 
          streams.
          
          RTP (Real-Time Transport Protocol)
          RTP is an Internet protocol for the transport of real-time data, e.g. 
          audio and video. It can be used for media-on-demand as well as 
          interactive services such as Internet telephony.
          
          RTSP (Real Time Streaming Protocol)
          RTSP is a control protocol, and a starting point for negotiating 
          transports such as RTP, multicast and Unicast, and for negotiating 
          codecs.
          RTSP can be considered a “remote control” for controlling the media 
          stream delivered by a media server. RTSP servers typically use RTP as 
          the protocol for the actual transport of audio/video data.
          
          Ridge
          The raised skin areas which make up a fingerprint
          
          Server
          In general, a server is a computer program that provides services to 
          other computer programs in the same or other computers. A computer 
          running a server program is also frequently referred to as a server. 
          In practice, the server may contain any number of server and client 
          programs. A web server is the computer program that supplies the 
          requested HTML pages or files to the client (browser).
          
          Switch
          A switch is a network device that connects network segments together, 
          and which selects a path for sending a unit of data to its next 
          destination. In general, a switch is a simpler and faster mechanism 
          than a router, which requires knowledge about the network and how to 
          determine the route. Some switches include the router function.
          
          Subnet & subnet mask
          A subnet is an identifiably separate part of an organization's 
          network. Typically, a subnet may represent all the machines at one 
          geographic location, in one building, or on the same local area 
          network (LAN). Having an organization's network divided into subnets 
          allows it to be connected to the Internet with a single shared network 
          address.
          The subnet mask is the part of the IP address that tells a network 
          router how to find the subnet that the data packet should be delivered 
          to. Using a subnet mask saves the router having to handle the entire 
          32-bit IP address; it simply looks at the bits selected by the mask.
          
          SSL/TLS (Secure Socket Layer/Transport Layer Security)
          These two protocols (SSL is succeeded by TLS) are cryptographic 
          protocols that provide secure communication on a network. SSL is 
          commonly used over HTTP to form HTTPS, as used e.g. on the Internet 
          for electronic financial transactions. SSL uses public key 
          certificates to verify the identity of the server.
          
          Strong Passwords
          A strong password is sufficiently long, random, or otherwise 
          producible only by the user who chose it, that successfully guessing 
          it will require too long a time. The length of time deemed to be too 
          long will vary with the attacker, the attacker's resources, the ease 
          with which a password can be tried, and the value of the password to 
          the attacker. A student's password might not be worth more than a few 
          seconds of computer time, whilst a password controlling access to a 
          large bank's electronic money transfer system might be worth many 
          weeks of computer time.
          Examples of stronger passwords include:
          t3wahSetyeT4
          4pRte!ai@3
          #3kLfN2x
          MoOoOfIn245679
          
          Semi-intelligent readers
          Have all inputs and outputs necessary to control door hardware (lock, 
          door contact, exit button), but do not make any access decisions. When 
          a user presents a card or enters PIN, the reader sends information to 
          the main controller and waits for its response. If the connection to 
          the main controller is interrupted, such readers stop working or 
          function in a degraded mode. Usually semi-intelligent readers are 
          connected to a control panel via an RS-485 bus.
          
          Serial controllers
          Controllers are connected to a host PC via a serial RS485 
          communication line (or via 20mA current Loop in some older systems). 
          External RS-232/485 converters or internal RS-485 cards have to be 
          installed as standard PCs do not have RS-485 communication ports. In 
          larger systems multi-port serial IO boards are used, Digi 
          International being one of most popular options.
          Advantages:
          RS-485 standard allows long cable runs, up to 4000 feet (1200 m)
          Relatively short response time. The maximum number of devices on an 
          RS-485 line is limited to 32, which means that the host can frequently 
          request status updates from each device and display events almost in 
          real time.
          High reliability and security as the communication line is not shared 
          with any other systems.
 
          Disadvantages:
          • RS-485 does not allows Star-type wiring unless splitters are used
          • RS-485 is not well suited for transferring large amounts of data 
          (i.e. configuration and users). The highest possible throughput is 
          115.2 kbit/s, but in most system it is downgraded to 56.2 kbit/s or 
          less to increase reliability.
          • RS-485 does not allow host PC to communicate with several 
          controllers connected to the same port simultaneously. Therefore in 
          large systems transfers of configuration and users to controllers may 
          take a very long time and interfere with normal operations.
          • Controllers cannot initiate communication in case of an alarm. The 
          host PC acts as a master on the RS-485 communication line and 
          controllers have to wait till they are polled.
          • Special serial switches are required in order to build a redundant 
          host PC setup.
          • Separate RS-485 lines have to be installed instead of using an 
          already existing network infrastructure.
          • Cable that meets RS-485 standards is significantly more expensive 
          than the regular Category 5 UTP network cable.
          • Operation of the system is highly dependent on the host PC. In case 
          the host PC fails, events from controllers are not retrieved and 
          functions that required interaction between controllers (i.e. anti-passback) 
          stop working.
          
          Serial main and sub-controllers
          All door hardware is connected to sub-controllers (Door controllers or 
          door interfaces). Sub-controllers usually do not make access 
          decisions, and forward all requests to the main controllers. Main 
          controllers usually support from 16 to 32 sub-controllers.
          Advantages:
          • Work load on the host PC is significantly reduced, because it only 
          needs to communicate with a few main controllers.
          • The overall cost of the system is lower, as sub-controllers are 
          usually simple and inexpensive devices.
          • All other advantages listed in the Serial controllers index 
          advantage apply.
 
          Disadvantages:
          • Operation of the system is highly dependent on main controllers. In 
          case one of the main controllers fails, events from its 
          sub-controllers are not retrieved and functions that require 
          interaction between sub controllers (i.e. anti-passback) stop working.
          • Some models of sub-controllers (usually lower cost) have no memory 
          and processing power to make access decisions independently. If the 
          main controller fails, sub-controllers change to degraded mode in 
          which doors are either completely locked or unlocked and no events are 
          recorded. Such sub-controllers should be avoided or used only in areas 
          that do not require high security.
          • Main controllers tend to be expensive, therefore such topology is 
          not very well suited for systems with multiple remote locations that 
          have only a few doors.
          • All other RS-485-related disadvantages listed in the Serial 
          controllers index apply.
          
          Serial main Controllers & Intelligent Readers:
          
          All 
          door hardware is connected directly to intelligent or semi-intelligent 
          readers. Readers usually do not make access decisions, and forward all 
          requests to the main controller. Only if the connection to the main 
          controller is unavailable, the readers use their internal database to 
          make access decisions and record events. Semi-intelligent reader that 
          have no database and cannot function without the main controller 
          should be used only in areas that do not require high security. Main 
          controllers usually support from 16 to 64 readers. All advantages 
          and disadvantages are the same as the ones listed in the Serial 
          main and sub-controllers paragraph.
          
          Serial Controllers with Terminal Servers
          In spite of the rapid development and increasing use of computer 
          networks, access control manufacturers remained conservative and did 
          not rush to introduce network-enabled products.
 
          When pressed for solutions with network connectivity, many chose the 
          option requiring less effort: addition of a terminal server, a device 
          that converts serial data for transmission via LAN or WAN. Terminal 
          servers manufactured by Lantronix and Tibbo Technology are popular in 
          the security industry.
          Advantages:
          • Allows utilizing existing network infrastructure for connecting 
          separate segments of the system.
          • Provides convenient solution in cases when installation of an RS-485 
          line would be difficult or impossible.
          Disadvantages:
          • Increases complexity of the system.
          • Creates additional work for installers: usually terminal servers 
          have to be configured independently, not through the interface of the 
          access control software.
          • Serial communication link between the controller and the terminal 
          server acts as a bottleneck: even though the data between the host PC 
          and the terminal server travels at the 10/100/1000Mbit/s network speed 
          it then slows down to the serial speed of 112.5 kbit/s or less. There 
          are also additional delays introduced in the process of conversion 
          between serial and network data.
          • All RS-485-related advantages and disadvantages also apply.
          
          Signature Recognition
          Signature recognition systems measure and analyze the physical 
          activity of signing such as stroke order, pressure applied and the 
          speed of the pen while signing. It differs substantially from the way 
          signature recognition on paper is done which compares the visual 
          aspects of the signature.
          
          Speaker Identification Technology
          Speaker recognition (also known as voice recognition) is the 
          computing task of recognizing people (which may involve identifying 
          them and/or authenticating their identity) from their voices. Such 
          systems extract features from speech, model them, and use them to 
          recognize the person from his/her voice.
          Note that there is a difference between speaker recognition 
          (recognizing who is speaking) and speech recognition 
          (recognizing what is being said). These two terms are frequently 
          confused, as is voice recognition. Voice recognition is a 
          synonym for speaker, and thus not speech, recognition.
          Speaker recognition has a history dating back some four decades, where 
          the output of several analog filters was averaged over time for 
          matching. Speaker recognition uses the acoustic features of speech 
          that have been found to differ between individuals. These acoustic 
          patterns reflect both anatomy (e.g., size and shape of the throat and 
          mouth) and learned behavioral patterns (e.g., voice pitch, speaking 
          style). This incorporation of learned patterns into the voice 
          templates (the latter called "voiceprints") has earned speaker 
          recognition its classification as a "behavioral biometric."
          
          Save
          An action to record information in the database. See Download in this 
          post.
          
          Spoofing
          Spoofing refers to the ability to fool a biometric sensor into 
          recognizing an illegitimate user as a legitimate user (verification) 
          or into missing an identification of someone that is in the database.
          
          Silicon technology scanners:
          Silicon technology has gained considerable acceptance since its 
          introduction in the late 90's. Most silicon, or chip, technology is 
          based on DC capacitance. The silicon sensor acts as one plate of a 
          capacitor, and the finger is the other. The capacitance between platen 
          and the finger is converted into an 8-bit grayscale digital image. 
          With the exception of AuthenTec, whose technology employs AC 
          capacitance and reads to the live layer of skin, all silicon 
          fingerprint vendors use a variation of this type of capacitance. 
          
          Silicon generally produces better image quality, with less surface 
          area, than optical. Since the chip is comprised of discreet rows and 
          columns - between 200-300 lines in each direction on a 1cmx1.5cm wafer 
          - it can return exceptionally detailed data. The reduced size of the 
          chip means that costs should drop significantly, now that much of the 
          R&D necessary to develop the technology is bearing fruit. Silicon 
          chips are small enough to be integrated into many devices which cannot 
          accommodate optical technology.
          
          Silicon's durability, especially in sub-optimal conditions, has yet to 
          be proven. Although manufacturers use coating devices to treat the 
          silicon, and claim that the surface is 100x more durable than optical, 
          this has to be proven. Also, with the reduction in sensor size, it is 
          even more important to ensure that enrolment and verification are done 
          carefully - a poor enrollment may not capture the center of the 
          fingerprint, and subsequent verifications are subject to the same type 
          of placement. Many major companies have recently moved into the 
          silicon field. Infineon (the semiconductor division of Siemens) and 
          Sony have developed chips to compete with Veridicom (a spin-off of 
          Lucent), the leader in silicon technology.
          
          Shunt
          Length of time an input will be ignored when it goes active during an 
          access granted event. This only applies to inputs that are specified 
          as the Door Contact.
          
          Smart Card
          A smart card, chip card, or integrated circuit card (ICC), is 
          any pocket-sized card with embedded integrated circuits. There are two 
          broad categories of ICCs. Memory cards contain only non-volatile 
          memory storage components, and perhaps dedicated security logic. 
          Embedded microchip cards contain volatile memory. The card is made of 
          plastic, generally polyvinyl chloride, but sometimes acrylonitrile 
          butadiene styrene or polycarbonate. which can be used to store 
          information about the cardholder or record card transactions as they 
          occur.
          Dimensions are normally credit card size. ID-1 of the ISO/IEC 7810 
          standard defines them as nominally 85.60 by 53.98 millimetres (3.370 × 
          2.125 in). Another popular size is ID-000 which is nominally 25 by 15 
          millimetres (0.984 × 0.591 in) (commonly used in SIM cards). 
          Both are 0.76 millimetres (0.030 in) thick.
          
          Smart Cards Advantages
          Compared to magnetic stripe cards, smart cards have many advantages:
          
          • Smart cards can hold up to 32 KB of data while magnetic cards as 
          seen earlier can hold only around 1000 bits. This allows the 
          card-transaction participants (card company, acquiring bank, issuing 
          bank, retailers etc.) to store a lot of additional information on the 
          card.
          • Data on a smart card can be protected against unauthorized viewing. 
          As a result of this confidential data (PIN, Passwords) can be stored 
          on a smart card. This means, merchants do not have to go online every 
          time to authenticate a transaction.
          • A single smart card can house multiple applications. Just one card 
          can be used as your license, passport, credit card, ATM card, ID Card 
          etc. 
          • Life of a smart card is longer.
          • Smart cards cannot be easily replicated and are, as a general rule 
          much more secure that magnetic stripe cards.
          
          Given these advantages, smart cards have really caught on in the 
          telephony segment. But unfortunately, they have not been as successful 
          in the financial cards segment. The only thing holding back the 
          widespread use of smart cards in this sector is the amount of money 
          invested by various players in the magnetic stripe card infrastructure 
          and the slightly higher cost of smart cards.
          
          Smart Capture
          Smart Capture is a feature ensures quality fingerprint scanning of 
          difficult fingers. By automatically adjusting the brightness of the 
          sensor, Smart Capture allows the SecuGen fingerprint reader to capture 
          high quality fingerprints from a wide range of traditionally difficult 
          fingers, including those from dry, wet, scarred or aged skin, and even 
          in bright ambient conditions such as under direct sunlight.
          
          Static Fingerprint Reader/Sensor
          A Static Fingerprint Reader/Sensor requires the user to place the 
          finger motionless on a surface. The sensor array must be as large as 
          the area of the image to be captured.
          
          Swipe Fingerprint Reader/Sensor
          A Swipe Fingerprint Reader/Sensor requires the user drag the upper 
          part of the finger across the sensor. The complete image is pieced 
          together by accumulating the partial image as the finger moves across 
          the scan area.
          
          Sub-controller
          One of a series of circuit boards that communicates information about 
          field devices like readers, contacts, motion detectors, etc., upstream 
          to the SSP. (RSC-1, RSC-2, RSC-T, ISC-16, and OSC-16).
          
          Stand alone Controller/Reader
          A system where the entire system is contained in the Controller / card 
          reader.
          
          Shunt time
          When a door is released the status switch is automatically "shunted" 
          for a period of time to allow the person to enter/exit. If the time is 
          exceeded a door held open signal will occur.
          
          Status switch/ Magnetic Contact(MC)
          A magnetic contact mounted on the controlled door. It is used to 
          detect door held or door forced.
          
          Tamper
          (1)A digital input that, if open, signals a cabinet tamper alarm at 
          the device.
          (2)A digital input that signals power loss alarm at the device.
          
          Template:
          A digital representation of an individual’s distinct characteristics, 
          representing information extracted from a biometric sample. BioCert 
          devices convert fingerprint minutiae into mathematical templates.
          Templates are used during biometric authentication as the basis for 
          comparison.
          
          Tokens:
          A physical device that an authorized user of computer services is 
          given to aid in authentication. Hardware tokens are often small enough 
          to be carried in a pocket or purse. Some may store cryptographic keys, 
          like a digital signature, or biometric data, like a fingerprint.
          
          Time Schedules
          Consist of time ranges that are associated with days or holidays. Time 
          Schedules are used in connection with access levels and often as 
          trigger events.
          
          Time zones
          "Schedules" that allow cards to function or not function depending on 
          the time of day. This is used to limit access to the facility. The 
          schedule may include not only time but which days of the week a card 
          is valid.
          
          Time and Attendance Systems:
          Time and attendance has always been a problem in some industries. 
          Biometrics can effectively eliminate problems with buddy clocking by 
          ensuring that the employee in question is present.
          
          Thermal Sensors 
          Thermal sensors use the same pyro-electric material that is used in 
          infrared cameras. When a finger is presented to the sensor, the 
          fingerprint ridges make contact with the sensor surface and the 
          contact temperature is measured, the valleys do not make contact and 
          are not measured. A fingerprint image is created by the 
          skin-temperature ridges and the ambient temperature measure for 
          valleys. 
          The biggest drawback of this technique is that the temperature change 
          is dynamic and it only takes about a tenth of a second for the sensor 
          surface touching ridges and valleys to come to the same temperature, 
          erasing the fingerprint image. Additionally, this technology has many 
          of the same contamination and wear issues as other sensors. While it 
          can operation over a wide range of temperatures, if the ambient 
          temperature is close to the finger surface temperature the sensor 
          requires heating to create a temperature difference of at least 1 
          degree Centigrade. 
          
          True Reject Rate
          The true reject rate is a statistic used to measure biometric 
          performance when performing the verification task. It refers to the 
          percentage of times a system (correctly) rejects a false claim of 
          identity. 
          For example, Mr. X claims to be Mr. Y and the system rejects the claim 
          (as it should).
          
          True Accept Rate
          The true accept rate is a statistic used to measure biometric 
          performance when performing the verification task. It is the 
          percentage of times a system (correctly) verifies a true claim of 
          identity. 
          For example, Mr. X claims to be Mr. X, and the system verifies the 
          claim.
          
          Trigger
          A system event that causes another event or macro to occur.
          
          Threshold
          The acceptance or rejection of biometric data is dependent on the 
          match score falling above or below the threshold. The threshold is 
          adjustable so that the biometric system can be more or less strict, 
          depending on the requirements of any given biometric application.
          
          Type I Error
          The failure of a fingerprint identification system when it does not 
          match a candidate fingerprint pattern with its mating fingerprint 
          pattern (in other words, a failure to make a match that should have 
          been made).
          
          Type II Error 
          The failure of a fingerprint identification system when it matches a 
          candidate fingerprint pattern with a non-mating fingerprint pattern 
          (in other words, making a match that should not have been made).
          
          Turnstile
          A turnstile, also called a baffle gate, is a form of gate which allows 
          one person to pass at a time. It can also be made so as to enforce 
          one-way traffic of people, and in addition, it can restrict passage 
          only to people who insert a coin, a ticket, a pass, or similar. Thus a 
          turnstile can be used in the case of paid access (sometimes called a 
          faregate when used for this purpose), for example public transport as 
          a ticket barrier or a pay toilet, or to restrict access to authorized 
          people, for example in the lobby of an office building.
          Turnstiles are used at a wide variety of settings, including stadiums, 
          amusement parks, museums, mass transit stations, office lobbies, 
          retail sites, cafeterias, temporary exhibits, casinos and souvenir 
          stands, to name but a few.
          
          Turnstiles - Full-height
          The High Entrance/Exit Turnstile (HEET), or full-height turnstile, is 
          a larger version of the turnstile, commonly 7-foot (2.1 m) high, 
          similar in operation to a revolving door, which eliminates the 
          possibility (inherent in the waist-high style) of anyone jumping over 
          a turnstile unit. It is also known as an "iron maiden", after the 
          medieval torture device of the same name, or as "high-wheel".
          
          TCP and UDP port
          A port is an application-specific or process-specific software 
          construct serving as a communications endpoint, providing a 
          multiplexing service. It is used by Transport Layer protocols of the 
          Internet Protocol Suite, such as Transmission Control Protocol (TCP) 
          and User Datagram Protocol (UDP). A specific port is identified by its 
          number, commonly known as the port number, the IP address with which 
          it is associated, and the protocol used for communication.
          The reason for having ports are that virtually all modern computers 
          support multitasking. Thus, on a typical computer, there will be 
          multiple programs which need to contact other programs on other 
          computers over the network all at the same time. Ports enable multiple 
          programs to share a single physical network connection simultaneously, 
          as opposed to having only one program using the connection for a long 
          period of time.
          ransport Layer protocols, such as TCP, UDP, SCTP, and DCCP, specify a 
          source and destination port number in their packet headers. A port 
          number is a 16-bit unsigned integer, thus ranging from 0 to 65535. A 
          process associates its network input or output channels each with a 
          particular port number, a process known as binding, to send and 
          receive data. The operating system's networking software has the task 
          of transmitting outgoing data from all application ports onto the 
          network, and forwarding arriving network packets to a process by 
          matching the packets IP address and port numbers.
          An example for the use of ports is the Internet mail system. A server 
          used for sending and receiving email generally needs two services. The 
          first service is used to transport email to and from other servers. 
          This is accomplished with the Simple Mail Transfer Protocol (SMTP). 
          The SMTP service application usually listens on TCP port 25 for 
          incoming requests. The second service is the Post Office Protocol 
          (POP) which is used by e-mail client applications on user's personal 
          computers to fetch email messages from the server. The POP service 
          listens on TCP port number 110. Both services may be running on the 
          same host computer, in which case the port number distinguishes the 
          service that was requested by a remote computer, be it a user's 
          computer or another mail server.
          While the listening port number of a server is well defined (IANA 
          calls these the well known ports), the client's port number is often 
          chosen from the dynamic port range (see below). In some applications, 
          the client and the server each use specific port numbers assigned by 
          the IANA. A good example of this is DHCP in which the client always 
          uses UDP port 68 and the server always uses UDP port 67.
          Port numbers can occasionally be seen in the Uniform Resource Locator 
          (URL) of a website or other services. By default, HTTP uses port 80 
          and HTTPS uses port 443, but a URL like 
          http://www.example.com:8000/blah/ specifies that the web site is 
          served by the HTTP server on port 8000. The active transport layer 
          protocol ports may be discovered on many operating systems (Windows, 
          Unix-like, z/OS) with the command line netstat -a.
          The port numbers are divided into three ranges: the well-known ports, 
          the registered ports, and the dynamic or private ports. The well-known 
          ports are those from 0 through 1023. Examples include:
          21: FTP
          23: Telnet
          53: Domain Name System
          80: World Wide Web HTTP
          119: Network News Transfer Protocol
          443: HTTP over Transport Layer Security / Secure Sockets Layer
          445: microsoft-ds, Server Message Block over TCP
          The registered ports are those from 1024 through 49151.
          
          Unicast
          Communication between a single sender and a single receiver over a 
          network. A new connection is established for each new user.
          
          UPnPTM
          A set of computer network protocols that allows the automatic 
          peer-to-peer detection of devices on the network. UPnP is promoted by 
          the UPnP Forum.
          
          Ultrasonic Sensors
          Ultrasonic scanners have an advantage of being able to see beneath the 
          skin. This provides not only verification of a live finger, it 
          provides more information as a biometric measure. But this technology 
          is slow, expensive, bulky, and too data intensive for most access 
          control applications.
          
          Ultrasound technology scanners:
          Ultrasound technology, though considered perhaps the most accurate of 
          the fingerprint technologies, is not yet widely used. It transmits 
          acoustic waves and measures the distance based on the impedance of the 
          finger, the platen, and air. Ultrasound is capable of penetrating dirt 
          and residue on the platen and the finger, countering a main drawback 
          to optical technology.
          
          Uncooperative User
          The term uncooperative user refers to an individual who actively tries 
          to deny the capture of his/her biometric data. 
          For example, a prisoneer who mutilates his finger upon apprehension to 
          prevent the recognition of his/her identity via fingerprint.
          
          USB
          (Universal Serial Bus) A plug-and-play interface between a computer 
          and peripheral devices (scanners, printers etc).
          
          USB flash drive
          A USB flash drive consists of a flash memory data storage device 
          integrated with a USB (Universal Serial Bus) 1.1 or 2.0 interface. USB 
          flash drives are typically removable and rewritable, and physically 
          much smaller than a floppy disk. Most weigh less than 30 g (1 oz). 
          They are smaller, faster, have thousands of times more capacity, and 
          are more durable and reliable because of their lack of moving parts. 
          The memory storage was based on earlier EPROM and EEPROM technologies. 
          Most flash drives ship preformatted with the FAT or FAT 32 file 
          system. 
          
          Validation
          The process of demonstrating that the system under consideration meets 
          in all respects the specification of that system.
          
          VPN (Virtual Private Network)
          This creates a secure “tunnel” between the points within the VPN. Only 
          devices with the correct "key" will be able to work within the VPN. 
          The VPN network can be within a company LAN (Local Area Network), but 
          different sites can also be connected over the Internet in a secure 
          way. One common use for VPN is for connecting a remote computer to the 
          corporate network, via e.g. a direct phone line or via the Internet.
          
          Verification:
          Also known as one-to-one or 1:1 comparison. The verification procedure 
          confirms whether the person in question is actually the person they 
          claim to be. The person’s current biometric data are compared only 
          with their own reference data. This authentication mode requires 
          another unique identifier such as a User ID, PIN, or smart card. 
          Verification is inherently faster and more secure than the 
          identification method.
          
          Verification Algorithm
          The algorithm used to check whether a user is who he says he is. Each 
          biometric device will have an associated verification algorithm.
          
          WAN (Wide-Area-Network)
          Similar to a LAN, but on a larger geographical scale.
          
          W-LAN (Wireless LAN)
          A wireless LAN is a wireless local area network that uses radio waves 
          as its carrier: where the network connections for end-users are 
          wireless. The main network structure usually uses cables.
          
          Wiegand
          Wiegand is the trade name for a technology used in card readers and 
          sensors, particularly for access control applications. Wiegand devices 
          were originally developed by HID Corporation. 
          A Wiegand card looks like a credit card. It works according to a 
          principle similar to that used in magnetic-stripe cards, such as those 
          used with bank automatic teller machines (ATMs). Instead of a band of 
          ferromagnetic material, the Wiegand card contains a set of embedded 
          wires. The wires are made of a special alloy with magnetic properties 
          that are difficult to duplicate. 
          Wiegand effect occurs over a wide range of temperatures. Therefore, 
          access control devices using this technology can function in hostile 
          environments. Other assets include rapid response time and 
          portability. These properties make Wiegand cards and readers ideal for 
          use in the field.
          
          Wiegand cards
          Wiegand cards are essentially magnetic field effect devices. As the 
          card is inserted or swiped through the reader an electromagnetic field 
          generated by the reader induces a voltage in the card causing it to 
          transmit its code. Unlike some insertion type systems, wiegand readers 
          are completely sealed against weather conditions and as a result have 
          a long live span. These cards are difficult to duplicate, highly 
          damage resistant, and offer a high level of security, but as with 
          proximity cards expensive, and generally can only be programmed by the 
          manufacturer.
          
          Web server 
          A Web server is a program, which allows Web browsers to retrieve files 
          from computers connected to the Internet. The Web server listens for 
          requests from Web browsers and upon receiving a request for a file 
          sends it back to the browser.
          The primary function of a Web server is to serve pages to other remote 
          computers; consequently, it needs to be installed on a computer that 
          is permanently connected to the Internet. It also controls access to 
          the server whilst monitoring and logging server access statistics.
          
          WEP (Wired Equivalent Privacy)
          A wireless security protocol, specified in the IEEE 802.11 standard, 
          which is designed to provide a wireless local area network (WLAN) with 
          a level of security and privacy comparable to that usually expected of 
          a wired LAN. Security is at two different levels; 40-bit and 128-bit 
          encryption. The higher the bit number, the more secure the encryption.
          
          Web-based Biometrics
          Web-based Biometrics is a simple, state of the art solution that 
          employees the web-based technology to identity, verify and 
          authenticate users. 
          The identification, verification or authentication can be done by 
          using fingerprint, face or a combination of both. Fingerprint 
          recognition requires a scanner to be installed on the client machine. 
          The face recognition software can work with a webcam, a regular camera 
          or an IP based camera 
          The user interface is a web-browser that everyone is familiar with and 
          comes installed with 99% of the OS. As soon a fingerprint reader and a 
          camera is installed on the client machine, it is ready to start 
          capturing the biometric information of the users and sending it to the 
          server for matching. This makes it virtually maintenance-free 
          client-side application and an ideal application for authenticating 
          users over the internet.
          Benefits
          • Being web based, the system offers the following advantages: 
          o Reduces IT Management costs. 
          o Simplifies deployment to clients. 
          o Reduces license costs while effectively increasing license 
          utilizations. 
          • Eliminates weak passwords as a vulnerability 
          • Password lifecycle management 
          o No need for password management - 40% of help desk calls are 
          password related (Gartner Group). 
          o No need for complicated passwords 
          o No password sharing 
          • Improves security of your organization 
          • Simplifies provisioning 
          • Robust audit trail 
          
          WINS (Windows Internet Naming Service)
          Part of the Microsoft Windows NT Server, WINS manages the association 
          of workstation names and locations with IP addresses, without the user 
          or administrator having to be involved in each configuration change.
          
          WPA-PSK (Wi-Fi Protected Access - Pre-Shared Key)
          This wireless encryption method uses a pre-shared key (PSK) for key 
          management. Keys can usually be entered as manual hex values, as 
          hexadecimal characters, or as a Passphrase. WPA-PSK provides a greater 
          degree of security than WEP.









