SticPro is an AI-powered identity and access management solution that delivers real-time, on-the-go authentication through facial recognition. It identifies individuals in designated areas, verifies them against a secure database, and instantly alerts stakeholders to unauthorized access. The system automates live attendance, enables virtual fencing to manage access by user category, and maps security breaches to specific time zones—helping detect unusual behavior such as employees exiting during work hours, overstaying customers in a restaurant or unexited children list after school hours. With broad applications and adaptability, SticPro enhances both security and operational efficiency across various environments.
The architecture is centered around AI-powered, custom-built cameras strategically installed at entry and exit points, as well as critical zones within the premises. These cameras capture real-time data, which is immediately transmitted to a high-performance data server equipped with a powerful GPU. The server processes the data instantly, matches it against the existing image gallery, and evaluates access permissions based on predefined rules. If any security breach is detected, the system promptly alerts stakeholders, enabling immediate response and action.
AI image forensics systems analyze images, metadata, and rendering details to deliver critical insights to stakeholders. Paired with advanced AI analytics, they enable smart surveillance that extracts real-time data, enhancing threat detection, situational awareness, and decision-making for improved security across diverse environments.
Our AI image analytics software uses advanced automated deep facial recognition to quickly and accurately detect faces in large crowds. It matches faces against extensive databases with high precision. Combining speed, accuracy, and scalability, this solution is vital for security, surveillance, and identity verification across various industries and applications.
Every visitor is accurately mapped and identified by matching their image with the existing gallery and access rules. If a breach or unauthorized access occurs, the system instantly detects it and alerts stakeholders, enabling quick responses to minimize risks and ensure a safe environment on the premises.
We offer advanced custom AI tools designed to stay ahead of industry trends. Our expert developers collaborate with organizations to harness AI power using modern technology stacks. We create tailored, high-performance image analytics software that meets specific business needs, boosts operational efficiency, and enables smarter decision-making across diverse sectors and applications.
The AI image tool features automatic alerts and signaling that enable real-time monitoring of human movement across designated areas. It quickly detects access breaches or unusual events and keeps stakeholders informed, ensuring fast responses and enhanced security through continuous surveillance and immediate notifications.
The real-time footfall counting system uses advanced technology to measure customer traffic in specific areas. It monitors and shows the exact number of people in the zone at all times, giving accurate data that helps businesses optimize operations and make smart decisions.
Our solution operates seamlessly without requiring any additional access devices or actions from visitors. It automatically tracks movement and attendance in real time as individuals pass through monitored areas. This on-the-go functionality ensures hassle-free, providing organizations with reliable data to manage attendance efficiently while enhancing overall operational convenience and user experience.
Our API integration and webhooks create a platform that updates security breaches and tracks entry and exit across multiple gates. It stores employee or student IDs and instantly notifies other organizational and HR applications. The API can deliver raw or processed data as needed by stakeholders.
The unexited report tracks individuals who entered but have not exited a premises. This vital data helps stakeholders quickly identify and address potential emergencies or incidents, such as ensuring children have left school safely, preventing untoward events through proactive monitoring.
SticPro uses a custom-built camera integrated with its own Raspberry Pi module, both housed in a durable IP66-rated cabinet. The camera features IR capability for enhanced night vision. This advanced combination offers a state-of-the-art solution ideal for AI-based applications.
| Specification | Details |
|---|---|
| Image Resolution | 12.3 MP Sony IMX500 Intelligent Vision Sensor with a powerful neural network accelerator |
| Framerates | 2 x 2 binned: 2028 x 1520 10-bit 30fps / Full resolution: 4056 x 3040 10-bit 10fps |
| Sensor Size | 7.857 mm |
| Pixel Size | 1.55 x 1.55 |
| Focus | 78.3 degree FoV with manual/mechanical adjustable focus |
| Focal Ratio | F1.79 focal ratio |
| Module Dimensions | 25 x 24 x 11.9 mm module dimensions |
| Network Firmware Management | Integrated RP2040 for neural network firmware management |
| Type | Purpose |
|---|---|
| Entry | The entry camera is designed to monitor and report every individual entering the premises through any registered gate, capturing a facial image and timestamp for each entry. In case of server connectivity failure, the camera stores all events locally and automatically syncs the data, including facial images and timestamps, to the server once the connection is restored. |
| Exit | The exit camera monitors and records each person leaving through registered gates, capturing their facial image and timestamp. This data is matched with their entry records and checked against access rules to detect any breaches, security risks, or people staying longer than allowed. If someone exits outside approved times or violates access policies, the system alerts stakeholders for quick action, helping maintain safety and smooth operations. |
| Movement | The purpose of the movement camera is to be strategically placed in critical areas within the premises to monitor and report facial images and timestamps to the server. This data is mapped against predefined access controls assigned to individuals or categories of people, identifying whether access to a specific location during a particular time frame is allowed or denied. Any violations are reported as security breaches to stakeholders for proactive response. Additionally, the system records movement logs of individuals, enabling detailed analysis in the event of any untoward incidents. |
| Registration | The purpose of the registration camera is to help administrators register individuals by capturing their facial images and creating a facial gallery. This gallery supports the software in identifying and tracking individuals based on images captured during their entry, exit, or movement within the premises. While the registration camera is mainly used during initial or large-scale registrations, such as in schools or large organizations, facial data can also be gathered from entry, exit, or movement cameras when needed. This makes the registration camera especially valuable for bulk onboarding and accurate identification in environments with a high number of people. |
| Broadcom BCM2712 2.4GHz quad-core 64-bit Arm Cortex-A76 CPU, with cryptography extensions, 512KB per-core L2 caches and a 2MB shared L3 cache | |
| VideoCore VII GPU, supporting OpenGL ES 3.1, Vulkan 1.2 | |
| Dual 4Kp60 HDMIu00ae display output with HDR support & 4Kp60 HEVC decoder | |
| LPDDR4X-4267 SDRAM (2GB, 4GB, 8GB, and 16GB) | |
| Dual-band 802.11ac Wi-Fiu00ae | |
| Bluetooth 5.0 / Bluetooth Low Energy (BLE) | |
| microSD card slot, with support for high-speed SDR104 mode | |
| 2 x USB 3.0 ports, supporting simultaneous 5Gbps operation | |
| 2 x USB 2.0 ports | |
| Gigabit Ethernet, with PoE+ support (requires separate PoE+ HAT) | |
| 2 x 4-lane MIPI camera/display transceivers | |
| PCIe 2.0 x1 interface for fast peripherals (requires separate M.2 HAT or other adapter) | |
| 5V/5A DC power via USB-C, with Power Delivery support | |
| Raspberry Pi standard 40-pin header | |
| Real-time clock (RTC), powered from external battery |
In evolving security landscape in current times, video analytics integrated with CCTV has become the preferred solution for large enterprises looking to add layers of intelligence to their surveillance systems. These systems offer capabilities like motion detection, facial recognition, and real-time alerts, helping businesses proactively respond to threats.
However, video analytics is often expensive, infrastructure-heavy, and complex to implement, making it less accessible for small and medium enterprises (SMEs) that need smarter, leaner, and more affordable solutions.
| Footage is rarely monitored live - used mostly for post-incident reviews. | |
| Finding specific events in hours of footage is time-consuming and inefficient. | |
| There are no intelligent alerts, which means potential threats often go unnoticed until it is too late. |
| Independent & intelligent : Deploys its own camera network for targeted, high-impact areas (like entry points, restricted zones, shop floors, etc.). | |
| Customizable deployment : Scales to fit specific risk points or operational needs within your facility. | |
| Affordable intelligence : Brings smart image-based analytics to SMEs without the high cost of full video analytics systems. | |
| Coexistence, not replacement : Works alongside your existing CCTV without disruption or overlap. | |
| Real-time alerts & insights - Enables proactive responses to unusual activities, safety violations, or workflow inefficiencies. |
| Feature | Video Analytics (CCTV) | Image Analytics (SticPro) |
|---|---|---|
| Infrastructure Cost | High | Moderate |
| Ideal For | Large enterprises | SMEs and focused deployments |
| Works with existing CCTV? | Requires integration and large scale hardware replacement | Coexists independently |
| Intelligence Type | Continuous video-based | Targeted image-based |
| Proactive Alerts | Yes | Yes |
| Ease of Implementation | Complex | Simple & customizable |
SticPro offers exhaustive, highly customizable reporting designed to meet diverse sector-specific needs. With precision and depth, it addresses current customer requirements while anticipating future demands. Its adaptable framework ensures the reports remain relevant over time, evolving with changing security and compliance expectations across industries. All the following reports have export option in pdf for easy sharing and record keeping.
This screen is designed to register visitors by categorizing them - such as students, employees, customers, or others, ensuring they are properly identified within SticPro. This enables reports to reflect specific identities rather than showing them as uncategorized, helping stakeholders take timely, targeted action. Customers can export these reports to PDF to verify photos and data entries, keeping records accurate and up to date.
This screen displays a detailed log of entry and exit for the selected date, including a photo snapshot, entry/exit times and gates, and total time spent on the premises. If the visitor is pre-registered, their details are shown for validation. Two action buttons are available: Register sends the entry to the registration screen to save visitor details for future reports; Movement shows the visitors location history with timestamps and flags any access violations based on organizational rules, enabling proactive action.
This screen displays all access violations based on rules defined by the organization - such as unauthorized entry into restricted areas, employees exiting during shift hours, or students leaving school early. Flexible rules can be set to detect and log any such breaches. SticPro can also trigger real-time alerts via email, SMS, or WhatsApp, including snapshots and contact details, enabling timely and appropriate action based on the severity of the violation.
This screen shows a real-time list of individuals who entered but have not exited the premises, serving as a critical safety and security tool. Whether ensuring no student remains in school after hours, verifying all visitors have left a jewelry store before closing, or confirming all factory staff have exited post-shift, this feature helps security teams take timely action. By providing vital insights through image analytics, it enables proactive incident prevention and rapid response.
SticPro is a versatile platform, like an open canvas where you can paint any picture - there are no limits to how it can be used. It can be tailored to address a wide range of customer pain points, offering flexible and customizable solutions across various scenarios. Some scenarios are explored as below.
SticPro is a robust and flexible visitor management solution that caters to both simple and complex security needs. It offers features like whitelisting regular visitors, area-specific access controls, and alerts for unauthorized movements. Visitors can be pre-approved, with automated green channel access linked to boom barriers and audio alerts for security. This reduces manual workload and enhances gate-level security. The system is paperless, tracks entry and exit digitally, and supports multiple access points. It includes powerful reporting tools to analyze visitor frequency, identify potential risks, and support audits. Features like unexited reports and zone mapping help detect overstays or access breaches, enabling proactive security intervention and improved organizational safety.
SticPro can be a powerful customer and visitor management tool for small retail outlets, offering valuable insights and control. It tracks daily walk-ins, identifies frequent or high-value customers for personalized service, and flags unusual patterns like overstays or quick exits—helping improve customer satisfaction and engagement. For restaurants or retail spaces, it highlights inefficient use of table space and helps in proactively planning manpower. In multi-outlet setups, it monitors employee presence, tracks approved exits, and flags blacklisted individuals like ex-employees or known troublemakers. With detailed reports on visitor trends and security incidents, SticPro becomes an essential solution for efficiently managing single or multiple retail locations.
SticPro is a powerful and essential tool for educational institutions, especially preschools and primary schools where child safety is critical. It tracks each child entry before school hours and matches it with their exit to ensure all students leave safely. The system alerts security about any students who have not exited, enabling proactive safety checks. It also monitors and restricts movement during school hours, flagging unauthorized exits. SticPro integrates with attendance systems via API and significantly reduces time spent on manual roll calls. Attendance can be displayed on the class teacher dashboard for quick verification, allowing teachers to focus more on teaching rather than repetitive administrative tasks.
SticPro can be a smart, paperless on the go attendance solution designed for enterprises. It eliminates queues at biometric devices by allowing on-the-go attendance, with instant confirmations via WhatsApp or SMS. The system flags only anomalies, reducing manual checks and streamlining HR tasks. It integrates with existing attendance servers over API and ensures smooth, real-time tracking—avoiding delays, device failures, and employee frustration during peak hours. Ideal for large organizations with tight attendance windows.
An Image Analytical Server is designed to process, analyze, and extract information from large volumes of image data. This requires a robust computing environment capable of handling intensive computational loads, high-speed data throughput, and scalable storage. Below are the minimum recommended server requirements categorized by component:
| Specification | Details |
|---|---|
| Processor | AMD Ryzen 5 3600 (3.6 GHz / 4.2 GHz) |
| RAM | 16 GB |
| HDD | 1 TB NVMe |
| GPU | 4 GB GeForce With NVDIA Chipset |

| S.No | Name | Model | Description |
|---|---|---|---|
| 1 | EXT100 | Extension 100 | This is the basic software on which all solutions are built. This is mandatory before you select any of the following solutions. (Built in 100 SIP Extension) |
| 2 | EXT1000 | Extension 1000 | This is the basic software on which all solutions are built. This is mandatory before you select any of the following solutions. (Built in 1000 SIP Extension) |
| 3 | EXP100 | Expansion 100 | This is expansion licence for IPPBX Software, to expand by 100 extensions to a maximum of 900 extensions (Max 8 Licence per system) |
| 4 | EXP1000 | Expansion 1000 | This is expansion license for IPPBX Software (Ent) to expand by 1000 extensions to a maximum of 8000 extensions (Max 7 Licence per system) |
| 5 | CCS | Call Centre Suite | This License is for Outbound Call Centre Solution. In case customer looking for Predective, Progressive or preview dialling using more agents. |
| 6 | CCS-L | Call Centre Suite-Light | This License is the lighter version for Outbound Call Centre Solution. In case customer looking for Predective, Progressive or preview dialling for not more than 5 agents. |
| 7 | ACD | Inbound CCS | This Licence is for Inbound Call Centre Solution. This is needed only if customer is going to employ dedicated agents to receive incoming calls. |
| 8 | ACD-L | Inbound CCS-Light | This Licence is the lighter version for Inbound Call Centre Solution. This is needed only if customer is going to employ dedicated agents to receive incoming calls restricted to a maximum of 5 agents. |
| 8 | DEVOPT | Developer Options | This Licence will activate paid API capabilities that will give Ringing, Attended and Hangup events for Incoming and Outgoing Calls using Webhooks. Also has various API funcationality that could be useful for various telephony CRM integration |
| 10 | CUSTLOGO | Customer Logo | If any customer prefers to display their own logo instead of the brand logo, they have the option to purchase this license and upload their logo. Once uploaded, it will automatically replace the brand logo across all designated logo points. |
| 11 | FIREALARM | Fire Alarm | This license integrates with the fire alarm control panel to monitor selected sensors. In case of an alert, it can play a predefined voice file over the public address system, call designated people with a preset message, and send notifications - such as WhatsApp messages or emails - detailing the sensor, area of operation, and nature of the threat. |
| 12 | SERDSK | ServiceDesk | The Service Desk is a versatile solution that provides control over hotel room services, doubles as a nurse call station in hospitals, and supports predefined service requirements in corporate environments. It features prominent displays, an escalation matrix with email and WhatsApp notifications, and a powerful reporting module, delivering a complete task management solution. |
| 13 | SURVEY | Survey Dial | This Licence is to Voice blasting of individual files or data merge and do customised voice announcements, imported from excel or updated using an API |
| 14 | TALLYINT | Tally Integration | This integrates with Tally accounting software to automatically update outstanding balances and provides a complete phone follow-up module. It is especially useful for distributors managing multiple dealers and bills, enabling seamless tracking of regular payments across several agents. |
| 15 | TICKETING | Ticketing | This provides a comprehensive, fully customizable ticketing module that integrates seamlessly with our call center solution and CPS. It includes email and WhatsApp integration, multiple escalation levels, TAT compliance, and exhaustive reporting - offering all the features of a professional ticketing solution. |
| 16 | VIREXT | Virtual Extension | Virtual Extension enables the creation of multiple user accounts with individual usernames and passwords. Users can make calls within daily, weekly, or monthly national or international minute budgets, while comprehensive reports track usage and ensure budget compliance. |
| 17 | STICPRO | Sticpro | StickPro captures visitor photos, tracks people inside premises, detects unauthorized movement, and integrates with attendance systems. It maps entries to a database for intelligent reporting and sends instant email and WhatsApp alerts for exceptions - offering security insights beyond standard CCTV. |
| 18 | HGHAVL | High Availability | This license enables synchronization between two identical systems, ensuring that both the database and voice files remain continuously updated. In the event of a primary server failure, all terminal equipment connected to it will automatically register with the secondary server, ensuring seamless failover and uninterrupted operation. |
SticPro: SticPro is a standalone security application that operates independently without any software dependencies. As a universal, standardized solution, it can function either independently or as part of a PBX setup, in which case the necessary PBX licenses must also be activated.
| Category | Remarks | Download |
|---|---|---|
| reports | testing |
| Company | Contact | Mobile | |
|---|---|---|---|
| Trust Marketing | Periathambi | 8144433333 | thambi@trust.co.in |
| Trust Solution | Suresh | 9884089999 | sales@trustsolutions.co.in |
| Aspire Systems And Solution | Karthikeyan | 9677166614 | karthik@aspiresystemsandsolutions.in |
| Dacom Solutions | Palanikumar | 7397377950 | sales@dacom.in |
| Vasani Enterprises | Vasani | 8080717183 | ve@vasanis.com |
| All trademarks, logos, and brand names are the property of their respective owners. All company, product, and service names used on this page are for identification purposes only. | |
| Use of these names, trademarks, and brands does not imply endorsement. They are referenced strictly for descriptive or informational use. | |
| No affiliation or association is intended or implied with any third-party trademark owner unless expressly stated. |
| The information provided in this page is for general informational purposes only. | |
| Some content related to third-party products is extracted from their official documents and is intended for display purposes only. We do not claim ownership of such content, nor do we guarantee its accuracy or current relevance. | |
| We make no representation or warranty of any kind, express or implied, regarding the accuracy, adequacy, validity, reliability, availability, or completeness of any information of this page. | |
| Use of any information from this website is solely at your own risk. |