Glossary & abbreviations - LSM 3.5 SP3 Business + Prof.

Individual terms are explained in more detail below. The explanations are easy to understand, but may not contain all details.

Term

Abbreviation

Explanation

Advantage Database Server

ADS server

Essential server service required to operate LSM Business and Professional.

CSV file

Standard file format for importing and exporting data, such as employee lists and locking systems.

DoorMonitoring

DM

Option for locking components which reports key door status properties, such as 'door closed' and 'double locked', to the LSM software.

Freeze mode

When batteries reach a critical level, locking devices switch to freeze mode to allow the door to be opened one more time.

Protocol generation G1

G1

First protocol generation allowing locking devices and ID media to communicate.

Protocol generation G2

G2

Second protocol generation, which adds a number of convenience functions.

Lightweight Directory Access Protocol

LDAP

Network protocol to access and change information. LDAP can be used to upload employee data directly into the LSM software, for example.

Locking Data Base Software

LDB

The preceding version of the LSM software.

Lock ID

LID

Identifies the locking device within the locking system. (Can be compared to a car registration)

Local Operating Network

LON network

Local Operating Network (LON) is an older standard, which is/was mainly used for building automation.

Locking System Management

LSM

Current software allowing flexible management of SimonsVoss locking components.

Matrix

The matrix offers a clearly arranged view, showing which particular ID media are entitled to use specific locking devices.

MIFARE

MIFARE is a world standard for one of the most widely used card systems. (Locking device is activated with 'passive cards')

Personal Digital Assistant

PDA

Small computer roughly the size of a smartphone. A PDA can be used as a portable device to programme active G1 locking components.

Physical Hardware Identifier

PHI

The PHI number is imprinted on SimonsVoss components and stored in its internal memory. This number is fixed and cannot be changed.

Profile cylinder

PC

A profile cylinder is the most widely used variety of security lock and a type of locking cylinder.

Router (CentralNode)

Special routers are used to address suitably equipped locking devices over the network.

SMART.SURVEIL

SMART.SURVEIL is an independent monitoring program. It can be run on computers without LSM software and requires a free user client. (From LSM 3.4 SP1)

Transponder ID

TID

Identifies the transponder within the locking system. (Can be compared to a car registration)

Virtual network

VN

A 'virtual network' can be used to enjoy a variety of advantages offered by networks without special routers.

Access Control

ZK

SimonsVoss components with an AC function log all accesses (or 'bookings') in the locking system.