Documentation for Face PSIM 1.0.1.

Previous page STC module functionality  Video camera mounting and setup requirements for STC recognition module Next page


On this page:

General information about the STC recognition module licensing

STC recognition module is licensed according to the following scheme:

Module in useLicensing scheme

Visitor counting channel

By the number of channels

Archive search channel

By the number of channels

Recognition channel

By the number of faces in the database

Thus, the psim.sec key file is purchased for each camera in use and a certain number of faces stored in the database. Additional key files are not required.

You also need to install the SDK STC and purchase an additional license — the HASP SL software security key (program file). This key is assigned to the computer hardware. For install or update the HASP SL software security key use .v2c file.

The operation of the STC recognition module depends on the following software related to its license protection:

  • Sentinel LDK (Sentinel Runtime) - the security key driver. It is required to ensure the performance of the STC recognition module.
  • Sentinel RUS (Remote Update System) - the license update manager.

Installing the SDK of the STC recognition module

Before activating the security key, you need to install the SDK STC. To do this, download the SDK STC 4.6.1 installer from the AxxonSoft website and extract the SDK_data folder from it to C:\Program Files (x86)\.

Then make sure the Sentinel Admin Control Center web portal opens. For this, open the http://localhost:1947/_int_/devices.html page in your browser. If the site is not available, check that the Sentinel LDK License Manager service is present in the list of Windows services and has the Running status.

Activation of the STC recognition module security key

To activate the STC recognition module security key, do the following:

  1. Go to http://activation.speechpro.com:8080/ems/customerLogin.html.
  2. In the dialog box that opens, enter the received security key in the Product/License Key field (1) and click Login (2).

  3. In the opened form for entering personal data, enter personal data (required fields are marked with an asterisk). To save the data, click the Save button (1). To go to the next step without entering personal data, click the Register Later button (2).

  4. In the form that opens, click the Offline Activation button.

  5. In the window that opens, click the Download RUS, a tool to generate C2V link to download the RUS_COOEA utility. If the RUS_COOEA utility is already installed, then skip this step.

  6. Open the RUS_COOEA.exe utility file.

  7. In the window that opens, set the Collect information from this computer to enable radio button to the Installation of new protection key position (1).
  8. Click the Collect Information button (3).

  9. In the window that opens, specify the name of the file with the .c2v extension, which will be created, and click the Save button.

    Note

    It is recommended to specify the computer name on which the file was generated.

    In the program window, the message about the snapshot generation is displayed.

  10. Return to the browser page (step 5) and upload the created .c2v file by clicking the button (1).

  11. Then click the Generate button (2).

  12. The .v2c file will be generated automatically and a message about it will appear (1). To save this file to your computer, click the Download V2C File button (2).

  13. Run the RUS_COOEA utility, and go to the Apply License File tab (4).

  14. Select the created .v2c file by clicking the button (5). Then click the Apply Update button (6).
    To see the available security keys, go to http://activation.speechpro.com:8080/ems/customerLogin.html.

Note

After activating the security key, restart the computer.

The security key activation is now complete.

Updating the STC recognition module security key

To take a snapshot, do the following:

  1. Run the RUS_COOEA utility.
  2. In the window that opens, set the Collect information from this computer to enable radio button to the Update of existing protection key position (2).
  3. Click the Collect Information button (3) to take a snapshot of the already installed HASP key. If several license keys are installed on the local computer, then it is necessary to select the key which snapshot is to be generated. 

  4. Run the RUS_COOEA utility, then go to the Apply License File tab (4).

  5. In the Update File field, select a previously prepared .v2c file by clicking on the button (5).
  6. Click the Apply Update button (6).

Attention!

It is not recommended to take a snapshot of the key more than once, because in this case, the license will not be applied and it will be necessary to format the key.

The security key update is now complete.

Transferring the STC recognition module security key to another computer

To transfer a license to another local computer, do the following:

  1. On the computer to which you want to transfer the license, run the RUS_COOEA utility, and open the Transfer License tab (1).
  2. Click the button (2), and in the window that opens, specify the path where it is necessary to save the file with the system snapshot.
  3. To confirm the action, click the Collect and Save Information button (3).
  4. Transfer the saved file to a computer on which a valid license is installed, and run the RUS_COOEA utility on this computer.
  5. Go to the Transfer License tab.
  6. Click the button (1) to select the file with the system snapshot obtained in step 3.
  7. To select the directory where the file with the license will be placed, click the button (2). In the window that opens, specify the path to save the file.
  8. Click the Generate License Transfer File button (3) to generate a license file.
  9. Copy the file created in the previous step to the computer to which the license is transferred.
  10. Run the RUS_COOEA utility, then go to the Apply License File tab.
  11. To upload the file, click the button (1).
  12. To install the security key, click the Apply Update button (2).

Note

Before changing the hardware characteristics of the computer (hard disk, CPU, etc.), it is necessary to transfer the file with the license to another computer according to these instructions, and then return it back after the changes are applied.

Transfer of the security key to another computer is now complete.

  • No labels