BS EN IEC 62676-2-33:2022 2023
$142.49
Video surveillance systems for use in security applications – Video transmission protocols. Cloud uplink and remote management system access
Published By | Publication Date | Number of Pages |
BSI | 2023 | 30 |
This part of the IEC 62676 series specifies management systems interfaces and mechanism for remote operational access to physical security devices such as video surveillance devices and systems. For video surveillance, the use cases focus on accessing live video and retrieving recordings. The mechanism defined in this specification are not restricted to surveillance applications but also cover remote access to security systems and electronic access control systems. Configuration of devices and management systems is out of scope of this specification. Clause 4 introduces to remote management access. Clause 5 defines a set of requirements that the protocol needs to fulfil. Clause 6 extends the token-based resource-addressing scheme of the underlying specification IEC 60839-11-31. Clause 7 describes how to retrieve information about remote resources. Clause 8 defines how to connect to devices that are not directly reachable because they are e.g. located behind firewalls.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
5 | Annex ZA (normative)Normative references to international publicationswith their corresponding European publications |
6 | English CONTENTS |
8 | FOREWORD |
10 | INTRODUCTION |
11 | 1 Scope 2 Normative references 3 Terms and definitions |
12 | 4 Overview 4.1 General 4.2 Remote access |
13 | 4.3 Cloud uplink Figures Figure 1 – Hierarchical system example Figure 2 – Standard connection initiated from the client |
14 | 5 Requirements 5.1 General 5.2 Functional requirements Figure 3 – Connection initiation from the device |
15 | 5.3 Protocol requirements 6 Resource addressing 6.1 Token based addressing |
16 | 6.2 Remote tokens 6.3 Token context 7 Resource queries 7.1 General |
17 | 7.2 Resource event 7.3 Location filter |
18 | 7.4 Prefix filter 7.5 Scope filter 7.6 Select filter |
19 | 7.7 Live checks 7.8 Informative examples 7.8.1 Live video 7.8.2 Forensic |
20 | 8 Uplink 8.1 Protocol 8.1.1 Connection establishment 8.1.2 Connection management Figure 4 – Connection initiation sequence |
21 | 8.1.3 Authentication 8.1.4 HTTP/2 frames 8.1.5 HTTP transactions 8.2 Configuration interface 8.2.1 Configuration parameters 8.2.2 GetUplinks |
22 | 8.2.3 SetUplink 8.2.4 DeleteUplink 8.2.5 Capabilities |
23 | Annex A (informative)Addressing scheme A.1 Overview A.2 Field definitions A.2.1 Zone code A.2.2 Agency code Figure A.1 – Fields of the device ID scheme Tables Table A.1 – The zone code elements |
24 | A.2.3 Device type code Table A.2 – Industry coding |
25 | Table A.3 – Device type codes |
26 | A.2.4 Serial number A.2.5 Examples Table A.4 – Serial number value |
28 | Annex B (informative)APIs with token adaption B.1 General B.2 Consuming live video B.3 Controlling PTZ cameras B.4 Retrieving recordings B.5 Forwarding of events |
29 | Bibliography |