Documentation for Axxon PSIM 1.0.0-1.0.1.

Previous page Administrator's Guide  Software Lifecycle Policy Next page


On the page:

Purpose of the Axxon PSIM™ intelligent video surveillance system

Axxon PSIM™ software is designed for the deployment of industrial scalable, flexible (adjustable) integrated security systems, based on the digital video surveillance and audio monitoring systems.

Axxon PSIM™ software possesses the following basic features:

  1. Integration of digital video surveillance and audio monitoring systems with the existing data systems, various security equipment, auxiliary software of other developers, using integrated open interfaces of the data exchange.
  2. Compatibility with diverse security devices and data systems, in particular, with the fire and security alarm and access control systems, video surveillance cameras, data analysis systems and systems for recognition of objects (events) and identification by their images.
  3. Single-source registration and processing of events, generation of notifications and controlling response in compliance with the flexibly modified logics.
  4. Ultimately unlimited capabilities for scaling, solution − specific adjustments, re-distribution of resources with changes in the number or quality of tasks in monitoring protected facilities and operating various equipment.

Setting up logical interrelations among objects in the Axxon PSIM software system

Functional facilities of Axxon PSIM software complex are based on logical cooperation of objects. Common data about ways of setting up the logical interrelation is given in the table.

Ways of setting up the logical interrelation

Description

Realization

Example

Objects settings panels

Base setting of system objects interrelation

Is realized with the use of system objects functionality – see Administrator's Guide

Setting up the video signal displaying in Monitor interface window

Macros

Setting up simple interrelations among objects which functionalities do not allow to carry out the required operations

Is realized with the use of Macros object functionality – see Administrator's Guide

Setting of enabling the additional executive relay with ray closed

Program

Setting up complex interactions among objects, when Macro object functionality does not allow to carry out the required operations

Is realized on the basis of Program object as a code on the embedded Axxon PSIM program language – see The Script object. Programming using the JScript language

It is necessary to return the cameras to the reference position and make a frame

Script

Is realized on the basis of Script object as a code on embedded JScript language – see The Script object. Programming using the JScript language

Purpose and structure of the guide

Documentation for the Axxon PSIM™ intelligent video surveillance system, Video surveillance and audio monitoring Administrator Guide is a reference and information handbook on programming on embedded Axxon PSIM software language, which is designed for system administrators, installation and configuration technicians, users with administrator rights to the digital video surveillance and audio monitoring systems, developed on the basis of Axxon PSIM™ software.

Programming in the Axxon PSIM™ enables system control by setting up complex logical interactions among objects. This guide contains the following materials:

  1. Software programming;
  2. Description of embedded program language syntax;
  3. Examples of program on the embedded language.

License method of the Axxon PSIM™ software

Licensing of the Axxon PSIM™ software is performed by means of software and program protection.

The Axxon PSIM™ software protection is built on one of the following components:

  1. dallas-codes of video capture cards’ cryptochips (FS-5B, FS-6C, FS-8, FS-16(Exp), WS-7, WS-17);
  2. dallas-codes of the electronic hardware security key «Guardant»;
  3. dallas-codes of the electronic hardware security key «MatrixLock»;
  4. codes of HID devices (hardware id).

The key file, connecting the software protection with program modules, belongs to the program protection part. A list of available for using functional program modules depends on the configuration of security system’s delivery and is registered in the key file.

While extending the system configuration (for example while installing a new functional subsystem) for activating the program module functionality, corresponding to the installed subsystem, in the previous key file has to be changed by a new one, which the updated system functionality will be regulated with.

While using the distributed architecture a single key file is used for all the computers of the system.

Attention!

If the video capture card is changed, its dallas-codes are changed too, so the previous key file should be respectively changed by a new one. While using the distributed architecture the key file should be changed on all the computers of the system.
  • No labels