This glossary provides definitions for terms, acronyms, and abbreviations commonly used throughout the acre Access Control API documentation and system.
| Category | Description |
|---|---|
| System Terminology | Core concepts and roles in acre Access Control |
| Hardware Acronyms | Physical device and module abbreviations |
| Network & Protocol Acronyms | Networking and communication standards |
| API & Development Terms | Programming and integration terminology |
| Security Terms | Authentication and encryption terminology |
These terms define core concepts within the acre Access Control ecosystem.
| Term | Definition |
|---|---|
| The System | Refers to the acre Access Control server-based access control security system. This includes all cloud services, APIs, and connected hardware. |
| System Administrator | The system user(s) in charge of setup, monitoring, and managing the acre Access Control security system. System Administrators have all permissions and can perform all available functions, including assigning permissions to System Operators. |
| System Operator | A system user who can operate certain areas of the System based on permissions granted by the System Administrator. Operators typically have limited, role-specific access. |
| Instance | A logical container for organizing access control resources. Instances can be hierarchical (parent/child relationships) and support multi-tenant architectures. See Instance Concepts. |
| Cardholder | A person enrolled in the system who has been issued one or more access credentials (cards, PINs, biometric data). |
| Access Level | A collection of reader permissions that define where and when a cardholder can gain access. |
| Schedule | A time-based rule that determines when access is permitted or when certain system behaviors are active. |
| Controller | The physical or logical device that manages access decisions for connected readers, inputs, and outputs. |
| Keep | The acre Access Control database and core data management layer. |
| Mercury | The communication service that interfaces with Mercury Security hardware controllers. |
| SRS | Software Requirements Specification. A complete description of the behavior of a system to be developed. |
These acronyms relate to physical devices and modules in access control systems.
| Acronym | Full Name | Description |
|---|---|---|
| BRI | Biometric Reader Interface | Interface module for connecting biometric readers (fingerprint, facial recognition, etc.) |
| DRI | Dual Reader Interface Module | Hardware module supporting two reader connections |
| SRI | Single Reader Interface Module | Hardware module supporting one reader connection |
| ICM | Input Control Module | Module for monitoring input points (door contacts, REX buttons, etc.) |
| OCM | Output Control Module | Module for controlling output points (locks, alarms, LEDs, etc.) |
| IDRC | Intelligent Dual Reader Controller | Controller with built-in support for two readers and local decision-making |
| ISC | Intelligent System Controller | Main controller unit that manages downstream modules and readers |
| RMM | Remote Monitoring Module | Module for monitoring and managing remote sites |
| CCTV | Closed Circuit Television | Video surveillance system with limited distribution |
| PTZ | Pan/Tilt/Zoom | Camera capability to remotely adjust viewing angle and zoom level |
| UPS | Uninterruptible Power Supply | Battery backup system for maintaining power during outages |
These acronyms relate to networking, protocols, and data exchange.
| Acronym | Full Name | Description |
|---|---|---|
| LAN | Local Area Network | Network connecting devices within a limited area (building, campus) |
| WAN | Wide Area Network | Network connecting devices across larger geographical areas |
| WAP | Wireless Access Point | Device enabling wireless network connectivity |
| LDAP | Lightweight Directory Access Protocol | Protocol for accessing and managing directory information (user directories, Active Directory) |
| SSL/TLS | Secure Sockets Layer / Transport Layer Security | Cryptographic protocols for secure communication over networks |
| RTP | Real-time Transport Protocol | Protocol for delivering audio and video over IP networks |
| MQTT | Message Queuing Telemetry Transport | Lightweight messaging protocol used for real-time event streaming in acre Access Control |
| REST | Representational State Transfer | Architectural style for web services; acre Access Control uses RESTful APIs |
| OAuth 2.0 | Open Authorization 2.0 | Authorization framework used by acre Access Control for API authentication |
| URL | Uniform Resource Locator | Web address format for accessing resources |
| UNC Path | Universal Naming Convention Path | Standard format for network resource paths (e.g., \\server\share\folder) |
These terms are commonly used when integrating with the acre Access Control API.
| Term | Definition |
|---|---|
| API | Application Programming Interface. The set of endpoints and methods for programmatic access to acre Access Control. |
| Wrapper | The .NET client library (KeepWebApiWrapper) that simplifies API interactions. |
| BaseInfo | The base class from which all acre Access Control objects inherit. Contains common properties like CommonName, Key, and ObjectLinks. |
| ObjectLinks | Collection of relationships between objects, used for navigation between related resources. |
| Moniker | A unique identifier pattern used to reference objects across the system. |
| $type | JSON property indicating the .NET type of an object. Required for proper deserialization in acre Access Control APIs. |
| SearchStream | Asynchronous enumerable for efficiently retrieving large datasets without loading all results into memory. |
| EventStream | Real-time stream of system events (card reads, door actions, alarms, etc.) |
| GUI | Graphical User Interface. The visual interface for interacting with applications. |
| XML | Extensible Markup Language. A markup language for encoding documents. |
| ASCII | American Standard Code for Information Interchange. Character encoding standard. |
| ISO | The International Organization for Standardization. Creates international standards for various industries. |
These terms relate to authentication, encryption, and security practices.
| Term | Definition |
|---|---|
| AES | Advanced Encryption Standard. Symmetric encryption algorithm widely used for securing data. |
| PIN | Personal Identification Number. A numeric code used as a secondary authentication factor. |
| REX | Request to Exit. A signal (button, motion sensor) that unlocks a door from the secure side. |
| Two-Factor Authentication (2FA) | Security process requiring two different authentication factors (e.g., card + PIN). |
| Bearer Token | Authentication token passed in API requests to prove identity. |
| Refresh Token | Long-lived token used to obtain new bearer tokens without re-authenticating. |
These acronyms represent major functional modules within acre Access Control.
| Acronym | Full Name | Description |
|---|---|---|
| DVMS | Digital Video Management System | Module for managing video cameras, recording, and playback |
| FNVR | Feenics Network Video Recorder | acre’s network video recording solution |
| VMM | Visitor Management Module | Module for enrolling, tracking, and managing visitors |
| EMPID | Employee Identification Number | Unique identifier assigned to each employee/cardholder |