Appendix A - Glossary
A–3
The door can be released (or “unlocked”) by interrupting the flow of current through the coil,
thereby removing the strong magnetic field.
O
Outputs - Auxiliary devices in an access control system that control external devices such as
electronic locks, piezo sounders, or light indicators. These can consist of relay outputs (dry
contacts) or transistorized outputs (current-sinking devices).
Override - A command extension available with some commands such as access point grant,
access point group grant, and access point partition grant. When override is used with a
grant command issued by a timed event, the access point opens for 30 seconds. When
override is used as part of a grant issued via a keypad command (#77), the user is provided
with prompts allowing a selection of door open time, alarm timeout, and prealarm time.
P
PIR (Passive InfraRed) - Typically, a sensor device that can sense movement within a
specific area and change the state of a set of internal contacts as a result. These contacts can
then be wired to a Request-to-Exit zone on an access control system for automated egress
when a person approaches an access point from inside a protected area.
Pre-Alarm Trigger Time - This is the amount of time, in seconds, before the start of an
access point door-open alarm, at which time the pre-alarm device is energized.
For example, if the door is set to be allowed to remain open for 30 seconds, an appropriate
pre-alarm time is 10 seconds. After the door has been unlatched for 20 seconds, the system
gives 10 seconds of warning to someone who is holding the door open. If the door is still open
at the end of the 30 seconds, a door-open timeout alarm event occurs. The pre-alarm device
will remain energized (depending upon its mode) until the door is closed, clearing the door-
open timeout alarm.
Protected - The normal operating status of an Access Point. When an Access Point is
protected, only valid cardholders can access it.
Proximity - A reader technology relying on a radio frequency link between the reader and
the card (prox reader and prox card). Encoded information is passed between the card and
reader, usually supplying a unique pattern enabling identification of the cardholder.
R
Reader - A device that a cardholder presents his access card to, that reads the card’s
encoded data and transmits it to an access control panel. The panel then makes a decision as
to what action to take as a result of that card read (e.g., energize a relay, etc.).
RTE (Request-to-Exit) - A condition generated by a device other than a card reader (e.g.,
push-button, crash bar, PIR, switch floor mat) that indicates to the system that someone is
leaving the protected area. No no forced door event is generated. It can also result in the door
unlocking. Other names used in the industry for this condition are: REX, egress, and bypass.
NOTE: Do not confuse this usage of “bypass” with the ADEMCO meaning. (Please see
Bypass)
S
Schedule (or Time Schedule) - A list of time intervals that can dictate when events or
conditions can start, stop, or occur. For example, schedules control when certain access
groups are allowed access to the premises. Schedules are made up of Day Templates.
Supervision - The process by which a device is monitored for faulty operation. This is
typically accomplished through voltage or resistance monitoring. (Also see: EOLR
Supervision and Relay Supervision)
T
Transaction - An event that occurred within the access control system which generates a
record in the stored database.
Summary of Contents for VistaKey-SK
Page 2: ......
Page 6: ...vi...
Page 8: ...viii...
Page 40: ...VistaKey Installation Guide 4 10...
Page 107: ......
Page 108: ...165 Eileen Way Syosset New York 11791 Copyright 2000 PITTWAY CORPORATION l K4005 6 00...