Shopping Cart

No products in the cart.

BS EN IEC 62676-2-33:2022 2023

$142.49

Video surveillance systems for use in security applications – Video transmission protocols. Cloud uplink and remote management system access

Published By Publication Date Number of Pages
BSI 2023 30
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This part of the IEC 62676 series specifies management systems interfaces and mechanism for remote operational access to physical security devices such as video surveillance devices and systems. For video surveillance, the use cases focus on accessing live video and retrieving recordings. The mechanism defined in this specification are not restricted to surveillance applications but also cover remote access to security systems and electronic access control systems. Configuration of devices and management systems is out of scope of this specification. Clause 4 introduces to remote management access. Clause 5 defines a set of requirements that the protocol needs to fulfil. Clause 6 extends the token-based resource-addressing scheme of the underlying specification IEC 60839-11-31. Clause 7 describes how to retrieve information about remote resources. Clause 8 defines how to connect to devices that are not directly reachable because they are e.g. located behind firewalls.

PDF Catalog

PDF Pages PDF Title
2 undefined
5 Annex ZA (normative)Normative references to international publicationswith their corresponding European publications
6 English
CONTENTS
8 FOREWORD
10 INTRODUCTION
11 1 Scope
2 Normative references
3 Terms and definitions
12 4 Overview
4.1 General
4.2 Remote access
13 4.3 Cloud uplink
Figures
Figure 1 – Hierarchical system example
Figure 2 – Standard connection initiated from the client
14 5 Requirements
5.1 General
5.2 Functional requirements
Figure 3 – Connection initiation from the device
15 5.3 Protocol requirements
6 Resource addressing
6.1 Token based addressing
16 6.2 Remote tokens
6.3 Token context
7 Resource queries
7.1 General
17 7.2 Resource event
7.3 Location filter
18 7.4 Prefix filter
7.5 Scope filter
7.6 Select filter
19 7.7 Live checks
7.8 Informative examples
7.8.1 Live video
7.8.2 Forensic
20 8 Uplink
8.1 Protocol
8.1.1 Connection establishment
8.1.2 Connection management
Figure 4 – Connection initiation sequence
21 8.1.3 Authentication
8.1.4 HTTP/2 frames
8.1.5 HTTP transactions
8.2 Configuration interface
8.2.1 Configuration parameters
8.2.2 GetUplinks
22 8.2.3 SetUplink
8.2.4 DeleteUplink
8.2.5 Capabilities
23 Annex A (informative)Addressing scheme
A.1 Overview
A.2 Field definitions
A.2.1 Zone code
A.2.2 Agency code
Figure A.1 – Fields of the device ID scheme
Tables
Table A.1 – The zone code elements
24 A.2.3 Device type code
Table A.2 – Industry coding
25 Table A.3 – Device type codes
26 A.2.4 Serial number
A.2.5 Examples
Table A.4 – Serial number value
28 Annex B (informative)APIs with token adaption
B.1 General
B.2 Consuming live video
B.3 Controlling PTZ cameras
B.4 Retrieving recordings
B.5 Forwarding of events
29 Bibliography
BS EN IEC 62676-2-33:2022 2023
$142.49