Documentation for Face Intellect 8.0-8.1. Documentation for other versions of Intellect is available too.
General information about the STC recognition module licensing
STC software module is licensed according to the following scheme:
Module in use | Licensing scheme |
---|---|
Visitor counting channel | By the number of channels |
Archive search channel | By the number of channels |
Recognition channel | By the number of faces in the database |
Thus, the intellect.sec key file is purchased for each camera in use and a certain number of faces stored in the database. Additional key files are not required.
You also need to install the SDK STC and purchase an additional license — the HASP SL software security key (program file). This key is assigned to the computer hardware. For install or update the HASP SL software security key use .v2c file.
The operation of the STC recognition module depends on the following software related to its license protection:
- Sentinel LDK (Sentinel Runtime) - the security key driver. It is required to ensure the performance of the STC recognition module.
- Sentinel RUS (Remote Update System) - the license update manager.
Installing the SDK of the STC recognition module
Before activating the security key, you need to install the SDK STC. To do this, download the SDK STC 4.6.1 installer from the AxxonSoft website and extract the SDK_data folder from it to C:\Program Files (x86)\.
Then make sure the Sentinel Admin Control Center web portal opens. For this, open the http://localhost:1947/_int_/devices.html page in your browser. If the site is not available, check that the Sentinel LDK License Manager service is present in the list of Windows services and has the Running status.
Activation of the STC recognition module security key
To activate the STC recognition module security key, do the following:
- Go to http://activation.speechpro.com:8080/ems/customerLogin.html.
In the dialog box that opens, enter the received security key in the Product/License Key field (1) and click Login (2).
In the opened form for entering personal data, enter personal data (required fields are marked with an asterisk). To save the data, click the Save button (1). To go to the next step without entering personal data, click the Register Later button (2).
In the form that opens, click the Offline Activation button.
In the window that opens, click the Download RUS, a tool to generate C2V link to download the RUS_COOEA utility. If the RUS_COOEA utility is already installed, then skip this step.
Open the RUS_COOEA.exe utility file.
- In the window that opens, set the Collect information from this computer to enable radio button to the Installation of new protection key position (1).
Click the Collect Information button (3).
In the window that opens, specify the name of the file with the .c2v extension, which will be created, and click the Save button.
Note
It is recommended to specify the computer name on which the file was generated.
In the program window, the message about the snapshot generation is displayed.
Return to the browser page (step 5) and upload the created .c2v file by clicking the
button (1).Then click the Generate button (2).
The .v2c file will be generated automatically and a message about it will appear (1). To save this file to your computer, click the Download V2C File button (2).
Run the RUS_COOEA utility, and go to the Apply License File tab (4).
- Select the created .v2c file by clicking the
To see the available security keys, go to http://activation.speechpro.com:8080/ems/customerLogin.html. button (5). Then click the Apply Update button (6).
Note
After activating the security key, restart the computer.
The security key activation is now complete.
Updating the STC recognition module security key
To take a snapshot, do the following:
- Run the RUS_COOEA utility.
- In the window that opens, set the Collect information from this computer to enable radio button to the Update of existing protection key position (2).
Click the Collect Information button (3) to take a snapshot of the already installed HASP key. If several license keys are installed on the local computer, then it is necessary to select the key which snapshot is to be generated.
Run the RUS_COOEA utility, then go to the Apply License File tab (4).
- In the Update File field, select a previously prepared .v2c file by clicking on the button (5).
- Click the Apply Update button (6).
Attention!
It is not recommended to take a snapshot of the key more than once, because in this case, the license will not be applied and it will be necessary to format the key.
The security key update is now complete.
Transferring the STC recognition module security key to another computer
To transfer a license to another local computer, do the following:
- On the computer to which you want to transfer the license, run the RUS_COOEA utility, and open the Transfer License tab (1).
- Click the button (2), and in the window that opens, specify the path where it is necessary to save the file with the system snapshot.
- To confirm the action, click the Collect and Save Information button (3).
- Transfer the saved file to a computer on which a valid license is installed, and run the RUS_COOEA utility on this computer.
- Go to the Transfer License tab.
- Click the button (1) to select the file with the system snapshot obtained in step 3.
- To select the directory where the file with the license will be placed, click the button (2). In the window that opens, specify the path to save the file.
- Click the Generate License Transfer File button (3) to generate a license file.
- Copy the file created in the previous step to the computer to which the license is transferred.
- Run the RUS_COOEA utility, then go to the Apply License File tab.
- To upload the file, click the button (1).
- To install the security key, click the Apply Update button (2).
Note
Before changing the hardware characteristics of the computer (hard disk, CPU, etc.), it is necessary to transfer the file with the license to another computer according to these instructions, and then return it back after the changes are applied.
Transfer of the security key to another computer is now complete.