Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Section
Column
width50%
Panel
borderColor#CCCCCC
bgColor#FFFFFF
titleBGColor#F0F0F0
borderStylesolid
titleOn the page:

Table of Contents

 

Column



Axxon Datacenter is flexibly a flexible platform that can be configured from the available features a range of modules and settings for each to meet specific customer needs. This page describes general features, the presence or absence of which depends on customer needs.

General characteristics

Key features of the platform are described below. The final configuration is determined by individual project requirements.

System architecture and management

The platform is built on modern principles that ensure its reliability, scalability, and ease of administration.

  1. Scalable microservice architecture: Designed for horizontal scalability. Easily adapts to increased load by adding new server modules.
  2. Centralized management of a distributed system: Build a hierarchical structure of
  3. Microservice architecture, development with horizontal scaling in mind.
  4. Monitoring of key metrics, log collection system.
  5. Building a multi-tiered video surveillance system with
  6. multiple nodes, domains, and camera groups
  7. .
  8. Configuring and working with cameras, detection tools, and macros in the web configurator.
  9. Creating users and their groups with flexible assignment of rights and application of customizable policies.
  10. Ability to integrate with IoT platforms (sending events).
  11. Viewing and exporting video recordings of events.
  12. Failover cluster and scaling up to 10K servers when using the cloud.
  13. Custom reporting system: unlimited scalability and development of new reports without involving programmers.
  14. Creating and working with face and license plate number lists.
  15. Customizable sending of notifications.

Axxon Datacenter features

  1. Face and license plate number recognition: quick search of a person or a vehicle of interest in the archive of multiple video cameras.
  2. Smart search in the video archive—interactive search by criteria: movement in the area, line crossing, size and color of the object, etc.
  3. Fire and smoke detection on the video image: early fire detection in the conditions where conventional fire alarm systems are ineffective.
  4. Person and vehicle recognition: detection, tracking, and counting of people and vehicles in complex scenes.

  5. Behavioral analytics: recognition of dangerous situations by certain poses, such as raised hands or a prostrate person.
  6. Multi-level user rights: flexible and user-friendly customization of user rights based on roles for large systems.
  7. Video analytics for retail: counting visitors, determining their gender and age, queue control and heat map of the retail floor activity.
  8. Integrated reports: customizable reports on detection tools triggers, alarm events and retail analytics data.

IT infrastructure

  1. In-house: video surveillance servers at the facility.
  2. Leasing of computing resources: video surveillance servers in the cloud.

Video monitoring interfaces

  1. Web-Interface.
  2. Mobile app.
  3. Thick client.

Connecting cameras

  1. Direct connection: NVR and cameras with a static IP address.
  2. VPN: cameras and NVR + VPN router.
  3. Video server: cameras + Axxon One server.

Cybersecurity

  1. with a single point of control.
  2. Role-based access control (RBAC): Create users and groups with granular permissions based on roles and customizable security policies.
  3. Comprehensive monitoring and diagnostics: Embedded monitoring of key system metrics and a centralized log collection system for fast troubleshooting.
  4. High availability and scalability: Support for failover clusters. In a cloud configuration, the system scales up to 10,000 server nodes.
  5. Integration openness: The ability to send events and data to external IoT platforms and systems to create comprehensive solutions.

Key functional modules

The platform offers a set of powerful video analytics modules and data management tools.

Recognition and identification

  • Biometric analytics: Face and license plate recognition for a quick search for people and vehicles across archives of hundreds of cameras.
  • Object classification: Automatic detection, tracking, and counting of people and vehicles in complex and dynamic scenes.

Search and predictive analytics

  • Search in archive: Interactive search for videos based on specified criteria: movement in an area, line crossing, color, size, object type, and others.
  • Early threat detection: Recognition of signs of fire and smoke in video for early detection in areas where traditional sensors are ineffective.

Analytics for business

  • Statistics and analytics: Visitor counting, demographic data (gender, age), queue length analysis, and heatmapping of activity in retail spaces.

Universal tools

  • Hardware configuration: Full configuration of cameras, detectors, and macros via a web interface.
  • Archive management: Easily view and export event-related videos.
  • List management: Create and use allow lists and block lists of faces and license plates to automate system responses.
  • Flexible notifications: Customizable event notifications via various communication channels.
  • Report builder: A powerful system for creating custom reports on detectors, events, and retail analytics, with unlimited scalability and the ability to develop new forms without programming.

Deployment options and access interfaces

IT infrastructure

  • On-premises deployment: Installation of video surveillance servers on the customer's infrastructure.
  • Cloud deployment: Leasing computing resources in the cloud to host platform servers.

Video monitoring interfaces

You can access the system through several channels:

  • Web interface: Universal access via a browser from any device.
  • Thick client: High-performance workstation for stationary operator workstations.
  • Mobile app: Remote monitoring and management from mobile devices.

Schemes of device connection

  • Direct connection: Cameras and NVRs with static IP addresses.
  • Via VPN: Establishing secure communication channels using VPN routers.
  • Via video server: Grouping cameras around Axxon One peripheral servers for local processing.

Security and data protection

The platform implements a multi-layered model of cybersecurity to protect the system and data.

  1. Traffic encryption: Mandatory use of the secure HTTPS protocol for all connections.
  2. Account protection:
    1. Storage of passwords in hashed form.
    2. Configuration of complexity policies, expiration, and history of passwords.
    3. Temporary account lockout after a series of unsuccessful login attempts.
    4. Automatic logout after inactivity.
    5. Lockout of unused accounts with the option to reactivate.
  3. Protection from automatic attacks: Integration of reCAPTCHA v3 on the login screen to prevent brute-force attacks

  4. Secure HTTPS connection to the cloud.
  5. Hashing of user passwords.
  6. Configuring password expiration, storing password history.
  7. Checking password complexity level.
  8. reCAPTCHA v3 on user login screen.
  9. Temporary account blocking after a specified number of unsuccessful login attempts.
  10. Automatic account logout when there is no activity.
  11. Blocking a long-term inactive account with reactivation by email
  12. .