1. Access Control System: A security solution designed to regulate access to specific areas or resources within a property, typically doors and gates. It combines hardware like readers, control panels, and locks, with software to manage users, permissions, and activity logs.
2. Access Point: The specific location (e.g., door, gate, or elevator) where the access control system is applied. This is where users interact with the systemโusually through readers or other devicesโto gain entry.
3. Call Group(s): Utilized in a visitor management system, call groups specify a sequence of telephone numbers to be dialed when a visitor requests entry, connecting them to authorized personnel who can grant access.
4. Control Panel: The central unit or “brain” of the access control system. It is typically a physical box of hardware and wires that manages the system, connects all local door/gate components, and coordinates tasks like access entry/denial, door monitoring, and user access management.
5. Credentials: Credentials are the unique identifiers used by individuals to authenticate themselves in the access control system. These can include RFID cards, key fobs, PIN codes, biometrics, or even mobile devices.
6. DESFire (Data Encryption Standard Fast, Innovative, Reliable, and Enhanced): A type of contactless smart card technology developed by NXP Semiconductors. It is widely used for secure access control, public transportation, payment systems, and identity management. Key features include:
a. Advanced Security: Uses AES (Advanced Encryption Standard) 128-bit, 2K/3K DES (Data Encryption Standard) for secure authentication and data encryption.
b. Multiple Applications: It can store multiple independent applications on a single card, making it ideal for multi-use environments like campuses or corporate offices.
c. Fast Data Transfer: Supports high-speed transactions, reducing delays in access control or payment systems.
d. Cloning Protection: Unlike older RFID cards (e.g., MIFARE Classic), DESFire cards are highly resistant to cloning and hacking.
e. Backward Compatibility: Works with existing MIFARE infrastructure but offers stronger encryption.
f. Variants: Includes different versions like MIFARE DESFire EV1, EV2, and EV3, with each newer version adding enhanced security and performance.
7. Encryption: A security process that ensures all sensitive data exchanged between the wireless devices (such as access points, keypads, or mobile devices) and the network is protected. By converting data into a secure code, encryption prevents unauthorized access, safeguarding personal or business information from hackers and cyber threats.
8. Local vs. Non-Local Codes:
a. Local Codes: Access codes stored directly within the control panel or a local hardware device, often limited to a specific area.
b. Non-local Codes: Access codes are stored, managed, and accessed remotely, usually via cloud-based systems vs being stored on the local hardware itself.
9. OmniPointยฎ: A wireless, multi-point access control and monitoring solution for any door or entry point on properties of all sizes, made by CellGate. While OmniPoint can work on almost any type of property, it’s especially useful for properties with outdoor areas needing access control, properties with multiple buildings that are spread out, and/or have cement structures like parking garages that cannot easily be wired.
10. Proximity Card: A contactless access credential that communicates with a reader using Radio Frequency Identification (RFID) technology. Users donโt need to swipe or insert the cardโjust hold it close to the reader.
11. Readers: Devices used to read and verify access credentials presented by a user. Once the credential is verified, the reader sends a signal to the control panel to determine if the user should be granted access (or not).
12. Remote Access: The ability to manage, monitor, and control your access control system from anywhere, usually via a mobile app or web portal. Remote access is often a feature of cloud-based and wireless systems. The alternative to remote access typically requires programming changes to be manually configured directly on the hardware.
13. RFID – Radio Frequency Identification: A system that uses radio waves to identify and track objects, such as access control cards. The RFID technology enables seamless communication between the card and the reader, providing fast and secure entry.
14. Secure Credential: An encrypted access card, key fob, or mobile pass that prevents cloning.
15. Single-Use Keys: QR code or PIN code keys are digital keys sent to a recipient via text or email, granting the recipient one-time access to a property, ideal for deliveries or occasional visitors. Once used, the key becomes inactive.
16. Temporary Event Keys: QR code or PIN code keys created for multiple visitors needing access within a specific time frame, usually between one hour and seven days. These are great for events, movers, or short-term visitors.
17. TLS (Transport Layer Security): A protocol used to encrypt communications between devices and access control servers.
18. Virtual Keys: A modern, digital-based access credential that allows users to gain entry without needing a physical key, card, or fob. Instead, the virtual key is stored digitally on a smartphone or it can be a numeric PIN code that may be utilized on an access control reader, communicating wirelessly with the access control system.
19. Wiegand/Wiegand Ports: A type of electrical interface used in access control systems, especially for connecting card readers, keypads, and other authentication devices to the system controller.
20. Watchmanยฎ: A cellular or internet-based access control system by CellGate that combines telephone entry, streaming video, access control, visitor management, and camera integration for vehicle and walk-up entrances.
21. Wireless Access Control: A type of access control system that uses wireless technology (like Wi-Fi, Bluetooth, cellular or LoRa) to connect components such as readers, control panels, and locks. This makes installation easier since these systems do not require extensive wiring within ceilings or walls, and allows for remote management, offering a flexible and scalable solution for modern properties.
These 21 terms are just the beginning when it comes to understanding access control systems. Whether youโre looking to secure a single entry point or manage access across a large property, knowing these key terms will help you navigate the technology and enhance the security and efficiency of your property management processes.