{"id":434165,"date":"2024-10-20T07:42:39","date_gmt":"2024-10-20T07:42:39","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-62676-2-332022-2023\/"},"modified":"2024-10-26T14:38:03","modified_gmt":"2024-10-26T14:38:03","slug":"bs-en-iec-62676-2-332022-2023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-62676-2-332022-2023\/","title":{"rendered":"BS EN IEC 62676-2-33:2022 2023"},"content":{"rendered":"
This part of the IEC 62676 series specifies management systems interfaces and mechanism for remote operational access to physical security devices such as video surveillance devices and systems. For video surveillance, the use cases focus on accessing live video and retrieving recordings. The mechanism defined in this specification are not restricted to surveillance applications but also cover remote access to security systems and electronic access control systems. Configuration of devices and management systems is out of scope of this specification. Clause 4 introduces to remote management access. Clause 5 defines a set of requirements that the protocol needs to fulfil. Clause 6 extends the token-based resource-addressing scheme of the underlying specification IEC 60839-11-31. Clause 7 describes how to retrieve information about remote resources. Clause 8 defines how to connect to devices that are not directly reachable because they are e.g. located behind firewalls.<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Annex ZA (normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | English CONTENTS <\/td>\n<\/tr>\n | ||||||
8<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4 Overview 4.1 General 4.2 Remote access <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 4.3 Cloud uplink Figures Figure 1 \u2013 Hierarchical system example Figure 2 \u2013 Standard connection initiated from the client <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 5 Requirements 5.1 General 5.2 Functional requirements Figure 3 \u2013 Connection initiation from the device <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 5.3 Protocol requirements 6 Resource addressing 6.1 Token based addressing <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 6.2 Remote tokens 6.3 Token context 7 Resource queries 7.1 General <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.2 Resource event 7.3 Location filter <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.4 Prefix filter 7.5 Scope filter 7.6 Select filter <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 7.7 Live checks 7.8 Informative examples 7.8.1 Live video 7.8.2 Forensic <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8 Uplink 8.1 Protocol 8.1.1 Connection establishment 8.1.2 Connection management Figure 4 \u2013 Connection initiation sequence <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 8.1.3 Authentication 8.1.4 HTTP\/2 frames 8.1.5 HTTP transactions 8.2 Configuration interface 8.2.1 Configuration parameters 8.2.2 GetUplinks <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 8.2.3 SetUplink 8.2.4 DeleteUplink 8.2.5 Capabilities <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | Annex A (informative)Addressing scheme A.1 Overview A.2 Field definitions A.2.1 Zone code A.2.2 Agency code Figure A.1 \u2013 Fields of the device ID scheme Tables Table A.1 \u2013 The zone code elements <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | A.2.3 Device type code Table A.2 \u2013 Industry coding <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Table A.3 \u2013 Device type codes <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | A.2.4 Serial number A.2.5 Examples Table A.4 \u2013 Serial number value <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | Annex B (informative)APIs with token adaption B.1 General B.2 Consuming live video B.3 Controlling PTZ cameras B.4 Retrieving recordings B.5 Forwarding of events <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Video surveillance systems for use in security applications – Video transmission protocols. Cloud uplink and remote management system access<\/b><\/p>\n |