12.07.2015 Views

Reference Manual - Videx, Inc.

Reference Manual - Videx, Inc.

Reference Manual - Videx, Inc.

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GlossaryAccess Code An access code is an encrypted password that is programmed into locks and keys.A CyberKey must present one of these Access Codes to the CyberLock in order to gain access.AJAX - A web technology that allows pages to refresh automatically, thus providing up to dateinformation in their contents. Most listing pages in CyberAudit-Web use AJAX to keep themupdated.Audit Trail The audit trail is the activity recorded by the CyberKey and the CyberLock. Each AuditTrail record typically contains information about an event that occurred within the lock or key. Italso includes the date and time that the event happened. There are also Communicator audittrails. These show activity at the Keyports as well as network communications and activities withCyberKeys.Configuration File - A special file that contains settings for a Web Authorizer, Vault 20, or FlexSystem Hub. This file is saved to a USB flash drive and physically transferred to one of thesecommunicators.Database Identifier A database identifier is information recorded in a CyberKey that indicates thekey is currently a member of a database. This helps prevent accidentally adding the CyberKey to asecond system.Delay A wait period required of keys before a lock will open. The CyberKey keeps track of thetime and will beep to let the key holder know when the lock can be opened. Delay cannot becombined with multiple-key access. Master keys ignore the delay setting. Also a schedule typemay be created to Ignore multi-key and delay settings.Expiration A date and/or time after which a CyberKey will stop working. It must then bere-authorized by a communicator. An Expiration can be a fixed date, fixed to a calendar period orbased on a rolling re-authorization time period.Holidays A list of dates that act as additions to the weekly grid in schedules. A day is valid ifeither the appropriate day or the holiday boxes are checked. Each Subsystem can have up to 126holidays. Holidays may be set as one-time or occurring every year.Lock List A list of lock IDs paired with a schedule stored in a CyberKeys memory. It controls ifand when a key may open a given lock. The lock list is programmed into the key with eachcommunication. It may also contain additional information such as treating the lock as aCyberPoint.Lost Key A CyberKey can be designated as Lost in a CyberLocks memory. A CyberLock will notallow access to a lost key even if that key contains permission to open the lock. Also see DisablingPoint.Master Key A setting that allows a CyberKey access to all locks which are programmed with aspecific access code. A Master key has either full access or a restricted time range. Master keyscan also have a list of locks for which they behave like a standard user key.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!