Video surveillance systems for use in security applications - Part 2-33: Video transmission protocols – Cloud uplink and remote management system access

IEC 62676-2-33:2022 specifies management systems interfaces and mechanisms for remote operational access to physical security devices such as video surveillance devices and systems. For video surveillance, the use cases focus on accessing live video and retrieving recordings. The mechanisms defined in this document are not restricted to surveillance applications, but also cover remote access to security systems and electronic access control systems. Configuration of devices and management systems is out of the scope of this document.

Systèmes de vidéosurveillance destinés à être utilisés dans les applications de sécurité - Partie 2-33: Protocoles de transmission vidéo – Liaison montante au nuage et accès au système de gestion à distance

IEC 62676-2-33:2022 spécifie les interfaces et les mécanismes des systèmes de gestion pour un accès opérationnel à distance aux dispositifs de sécurité physiques tels que les dispositifs et les systèmes de vidéosurveillance. Pour la vidéosurveillance, les cas d'utilisation concernent l'accès aux vidéos en direct et l'extraction des enregistrements. Les mécanismes définis dans le présent document ne se limitent pas aux applications de surveillance, mais couvrent également l'accès à distance aux systèmes de sécurité et aux systèmes de contrôle d'accès électronique. La configuration des dispositifs et des systèmes de gestion ne relève pas du domaine d'application du présent document.

General Information

Status
Published
Publication Date
21-Jul-2022
Current Stage
PPUB - Publication issued
Completion Date
22-Jul-2022
Ref Project

Buy Standard

Standard
IEC 62676-2-33:2022 - Video surveillance systems for use in security applications - Part 2-33: Video transmission protocols – Cloud uplink and remote management system access
English and French language
50 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (sample)

IEC 62676-2-33
Edition 1.0 2022-07
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
Video surveillance systems for use in security applications –
Part 2-33: Video transmission protocols – Cloud uplink and remote management
system access
Systèmes de vidéosurveillance destinés à être utilisés dans les applications de
sécurité –
Partie 2-33: Protocoles de transmission vidéo – Liaison montante au nuage et
accès au système de gestion à distance
IEC 62676-2-33:2022-07(en-fr)
---------------------- Page: 1 ----------------------
THIS PUBLICATION IS COPYRIGHT PROTECTED
Copyright © 2022 IEC, Geneva, Switzerland

All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form

or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from

either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC

copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or

your local IEC member National Committee for further information.

Droits de reproduction réservés. Sauf indication contraire, aucune partie de cette publication ne peut être reproduite ni

utilisée sous quelque forme que ce soit et par aucun procédé, électronique ou mécanique, y compris la photocopie et

les microfilms, sans l'accord écrit de l'IEC ou du Comité national de l'IEC du pays du demandeur. Si vous avez des

questions sur le copyright de l'IEC ou si vous désirez obtenir des droits supplémentaires sur cette publication, utilisez

les coordonnées ci-après ou contactez le Comité national de l'IEC de votre pays de résidence.

IEC Secretariat Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC

The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes

International Standards for all electrical, electronic and related technologies.
About IEC publications

The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the

latest edition, a corrigendum or an amendment might have been published.

IEC publications search - webstore.iec.ch/advsearchform IEC Products & Services Portal - products.iec.ch

The advanced search enables to find IEC publications by a Discover our powerful search engine and read freely all the

variety of criteria (reference number, text, technical publications previews. With a subscription you will always have

committee, …). It also gives information on projects, replaced access to up to date content tailored to your needs.

and withdrawn publications.
Electropedia - www.electropedia.org
IEC Just Published - webstore.iec.ch/justpublished
The world's leading online dictionary on electrotechnology,
Stay up to date on all new IEC publications. Just Published
containing more than 22 300 terminological entries in English
details all new publications released. Available online and once
and French, with equivalent terms in 19 additional languages.
a month by email.
Also known as the International Electrotechnical Vocabulary
(IEV) online.
IEC Customer Service Centre - webstore.iec.ch/csc
If you wish to give us your feedback on this publication or need
further assistance, please contact the Customer Service
Centre: sales@iec.ch.
A propos de l'IEC

La Commission Electrotechnique Internationale (IEC) est la première organisation mondiale qui élabore et publie des

Normes internationales pour tout ce qui a trait à l'électricité, à l'électronique et aux technologies apparentées.

A propos des publications IEC

Le contenu technique des publications IEC est constamment revu. Veuillez vous assurer que vous possédez l’édition la

plus récente, un corrigendum ou amendement peut avoir été publié.

Recherche de publications IEC - Découvrez notre puissant moteur de recherche et consultez

webstore.iec.ch/advsearchform gratuitement tous les aperçus des publications. Avec un

La recherche avancée permet de trouver des publications IEC abonnement, vous aurez toujours accès à un contenu à jour

en utilisant différents critères (numéro de référence, texte, adapté à vos besoins.

comité d’études, …). Elle donne aussi des informations sur les

projets et les publications remplacées ou retirées. Electropedia - www.electropedia.org

Le premier dictionnaire d'électrotechnologie en ligne au monde,
IEC Just Published - webstore.iec.ch/justpublished
avec plus de 22 300 articles terminologiques en anglais et en
Restez informé sur les nouvelles publications IEC. Just
français, ainsi que les termes équivalents dans 19 langues
Published détaille les nouvelles publications parues.
additionnelles. Egalement appelé Vocabulaire
Disponible en ligne et une fois par mois par email.
Electrotechnique International (IEV) en ligne.
Service Clients - webstore.iec.ch/csc
Si vous désirez nous donner des commentaires sur cette
publication ou si vous avez des questions contactez-nous:
sales@iec.ch.
IEC Products & Services Portal - products.iec.ch
---------------------- Page: 2 ----------------------
IEC 62676-2-33
Edition 1.0 2022-07
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
colour
inside
Video surveillance systems for use in security applications –
Part 2-33: Video transmission protocols – Cloud uplink and remote management
system access
Systèmes de vidéosurveillance destinés à être utilisés dans les applications de
sécurité –
Partie 2-33: Protocoles de transmission vidéo – Liaison montante au nuage et
accès au système de gestion à distance
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
INTERNATIONALE
ICS 13.320 ISBN 978-2-8322-3973-5

Warning! Make sure that you obtained this publication from an authorized distributor.

Attention! Veuillez vous assurer que vous avez obtenu cette publication via un distributeur agréé.

® Registered trademark of the International Electrotechnical Commission
Marque déposée de la Commission Electrotechnique Internationale
---------------------- Page: 3 ----------------------
– 2 – IEC 62676-2-33:2022 © IEC 2022
CONTENTS

FOREWORD ........................................................................................................................... 4

INTRODUCTION ..................................................................................................................... 6

1 Scope .............................................................................................................................. 7

2 Normative references ...................................................................................................... 7

3 Terms and definitions ...................................................................................................... 7

4 Overview ......................................................................................................................... 8

4.1 General ................................................................................................................... 8

4.2 Remote access ....................................................................................................... 8

4.3 Cloud uplink ............................................................................................................ 9

5 Requirements ................................................................................................................ 10

5.1 General ................................................................................................................. 10

5.2 Functional requirements........................................................................................ 10

5.3 Protocol requirements ........................................................................................... 11

6 Resource addressing ..................................................................................................... 11

6.1 Token based addressing ....................................................................................... 11

6.2 Remote tokens ...................................................................................................... 12

6.3 Token context ....................................................................................................... 12

7 Resource queries .......................................................................................................... 12

7.1 General ................................................................................................................. 12

7.2 Resource event ..................................................................................................... 13

7.3 Location filter ........................................................................................................ 13

7.4 Prefix filter ............................................................................................................ 14

7.5 Scope filter ........................................................................................................... 14

7.6 Select filter ........................................................................................................... 14

7.7 Live checks ........................................................................................................... 15

7.8 Informative examples ............................................................................................ 15

7.8.1 Live video ...................................................................................................... 15

7.8.2 Forensic ........................................................................................................ 15

8 Uplink ............................................................................................................................ 16

8.1 Protocol ................................................................................................................ 16

8.1.1 Connection establishment .............................................................................. 16

8.1.2 Connection management ............................................................................... 16

8.1.3 Authentication ............................................................................................... 17

8.1.4 HTTP/2 frames .............................................................................................. 17

8.1.5 HTTP transactions ......................................................................................... 17

8.2 Configuration interface .......................................................................................... 17

8.2.1 Configuration parameters .............................................................................. 17

8.2.2 GetUplinks ..................................................................................................... 17

8.2.3 SetUplink ....................................................................................................... 18

8.2.4 DeleteUplink .................................................................................................. 18

8.2.5 Capabilities ................................................................................................... 18

Annex A (informative) Addressing scheme ........................................................................... 19

A.1 Overview .............................................................................................................. 19

A.2 Field definitions .................................................................................................... 19

A.2.1 Zone code ..................................................................................................... 19

A.2.2 Agency code .................................................................................................. 19

---------------------- Page: 4 ----------------------
IEC 62676-2-33:2022 © IEC 2022 – 3 –

A.2.3 Device type code ........................................................................................... 20

A.2.4 Serial number ................................................................................................ 22

A.2.5 Examples ...................................................................................................... 22

Annex B (informative) APIs with token adaption ................................................................... 24

B.1 General ................................................................................................................. 24

B.2 Consuming live video ............................................................................................ 24

B.3 Controlling PTZ cameras ...................................................................................... 24

B.4 Retrieving recordings ............................................................................................ 24

B.5 Forwarding of events ............................................................................................ 24

Bibliography .......................................................................................................................... 25

Figure 1 – Hierarchical system example .................................................................................. 9

Figure 2 – Standard connection initiated from the client .......................................................... 9

Figure 3 – Connection initiation from the device .................................................................... 10

Figure 4 – Connection initiation sequence ............................................................................. 16

Figure A.1 – Fields of the device ID scheme ......................................................................... 19

Table A.1 – The zone code elements .................................................................................... 19

Table A.2 – Industry coding .................................................................................................. 20

Table A.3 – Device type codes .............................................................................................. 21

Table A.4 – Serial number value ........................................................................................... 22

---------------------- Page: 5 ----------------------
– 4 – IEC 62676-2-33:2022 © IEC 2022
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
VIDEO SURVEILLANCE SYSTEMS FOR
USE IN SECURITY APPLICATIONS –
Part 2-33: Video transmission protocols – Cloud uplink and remote
management system access
FOREWORD

1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising

all national electrotechnical committees (IEC National Committees). The object of IEC is to promote international

co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and

in addition to other activities, IEC publishes International Standards, Technical Specifications, Technical Reports,

Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC Publication(s)”). Their

preparation is entrusted to technical committees; any IEC National Committee interested in the subject dealt with

may participate in this preparatory work. International, governmental and non-governmental organizations liaising

with the IEC also participate in this preparation. IEC collaborates closely with the International Organization for

Standardization (ISO) in accordance with conditions determined by agreement between the two organizations.

2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international

consensus of opinion on the relevant subjects since each technical committee has representation from all

interested IEC National Committees.

3) IEC Publications have the form of recommendations for international use and are accepted by IEC National

Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC

Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any

misinterpretation by any end user.

4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications

transparently to the maximum extent possible in their national and regional publications. Any divergence between

any IEC Publication and the corresponding national or regional publication shall be clearly indicated in the latter.

5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity

assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any

services carried out by independent certification bodies.

6) All users should ensure that they have the latest edition of this publication.

7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and

members of its technical committees and IEC National Committees for any personal injury, property damage or

other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and

expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC

Publications.

8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is

indispensable for the correct application of this publication.

9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of patent

rights. IEC shall not be held responsible for identifying any or all such patent rights.

IEC 62676-2-33 has been prepared by IEC technical committee 79: Alarm and electronic

security systems. It is an International Standard.
The text of this International Standard is based on the following documents:
Draft Report on voting
79/658/FDIS 79/666/RVD

Full information on the voting for its approval can be found in the report on voting indicated in

the above table.
The language used for the development of this International Standard is English.
---------------------- Page: 6 ----------------------
IEC 62676-2-33:2022 © IEC 2022 – 5 –

A list of all the parts in the IEC 62676 series, under the general title Video surveillance systems

for use in security applications, can be found on the IEC website.

This document was drafted in accordance with ISO/IEC Directives, Part 2, and developed in

accordance with ISO/IEC Directives, Part 1 and ISO/IEC Directives, IEC Supplement, available

at www.iec.ch/members_experts/refdocs. The main document types developed by IEC are

described in greater detail at www.iec.ch/standardsdev/publications.

The committee has decided that the contents of this document will remain unchanged until the

stability date indicated on the IEC website under webstore.iec.ch in the data related to the

specific document. At this date, the document will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.

IMPORTANT – The "colour inside" logo on the cover page of this document indicates

that it contains colours which are considered to be useful for the correct understanding

of its contents. Users should therefore print this document using a colour printer.

---------------------- Page: 7 ----------------------
– 6 – IEC 62676-2-33:2022 © IEC 2022
INTRODUCTION

Surveillance systems are important in public safety projects to maintain law and order as well

as public safety, and to assist the police to perform forensic analysis. Due to organizational and

security reasons, large-scale surveillance systems are split in segments, which can lead to

information silos. This document provides a standardized interface for management systems

such that authorized entities can easily access remote information using the same mechanism

they are using today for accessing local information.
---------------------- Page: 8 ----------------------
IEC 62676-2-33:2022 © IEC 2022 – 7 –
VIDEO SURVEILLANCE SYSTEMS FOR
USE IN SECURITY APPLICATIONS –
Part 2-33: Video transmission protocols - Cloud uplink and remote
management system access
1 Scope
This document specifies management systems interfaces and mechanisms for remote

operational access to physical security devices such as video surveillance devices and systems.

For video surveillance, the use cases focus on accessing live video and retrieving recordings.

The mechanisms defined in this document are not restricted to surveillance applications, but

also cover remote access to security systems and electronic access control systems.

Configuration of devices and management systems is out of the scope of this document.

Clause 4 introduces remote management access. Clause 5 defines a set of requirements that

the protocol needs to fulfil. Clause 6 extends the token-based resource-addressing scheme of

IEC 60839-11-31. Clause 7 describes how to retrieve information about remote resources.

Clause 8 defines how to connect to devices that are not directly reachable because they are for

instance located behind firewalls.
2 Normative references

The following documents are referred to in the text in such a way that some or all of their content

constitutes requirements of this document. For dated references, only the edition cited applies.

For undated references, the latest edition of the referenced document (including any

amendments) applies.

IEC 60839-11-31, Alarm and electronic security systems – Part 11-31: Electronic access control

systems – Core interoperability protocol based on Web services
IETF RFC 4122, A Universally Unique IDentifier (UUID) URN Namespace
IETF RFC 5246, The Transport Layer Security (TLS) Protocol, Version 1.2

IETF RFC 6125, Representation and Verification of Domain-Based Application Service

Identity within Internet Public Key Infrastructure Using X.509 (PKIX)
Certificates in the Context of Transport Layer Security (TLS)
IETF RFC 7540, Hypertext Transfer Protocol Version 2 (HTTP/2)
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.

ISO and IEC maintain terminological databases for use in standardization at the following

addresses:
• IEC Electropedia: available at http://www.electropedia.org/
• ISO Online browsing platform: available at http://www.iso.org/obp
---------------------- Page: 9 ----------------------
– 8 – IEC 62676-2-33:2022 © IEC 2022
3.1
resource
IEC 62676-2 entity that can be addressed via a token
3.2
uplink
connection established by the local service to the remote client
4 Overview
4.1 General

IEC 62676-2-31 and IEC 62676-2-32 provide a detailed protocol definition for interacting with

video surveillance devices such as cameras and digital recorders. Similarly, IEC 60839-11-32

and IEC 60839-11-33 describe how to monitor and configure electronic access control systems.

These two parts are based on IEC 60839-11-31, which defines a communication mechanism

based on web services. This document extends IEC 60839-11-31 by adding cloud connectivity

and remote addressing to the framework. Note that this document does not contain any domain-

specific details, since all interfaces defined in the above-mentioned parts are applicable without

any modifications. Therefore, this document covers the integration of a wide range of physical

security systems into any management system. This document describes how a remote client

or management system connects to resources such as cameras. The approach shown here

allows scaling over several hierarchies. The examples in 4.2 show the mechanism principle with

two layers of video surveillance systems (VSS) called "lower level" and "higher level". In this

system, a higher-level VSS can retrieve a resource like device information from a lower-level

VSS, to trigger corresponding actions for different devices that are connected to the lower-level

VSS.

Access to remote VSS can require strict authentication constraints. The related definitions are

outside of the scope of this document.
4.2 Remote access

Figure 1 shows a typical management system topology as deployed for bigger installations. So-

called lower-level video surveillance systems incorporate numerous surveillance cameras and

other equipment to monitor a region of a premises or city district. Higher-level video

management systems allow supervision of large compounds.
---------------------- Page: 10 ----------------------
IEC 62676-2-33:2022 © IEC 2022 – 9 –
Figure 1 – Hierarchical system example

In a way similar to the cameras shown in Figure 1, the VSSs expose an interface towards the

higher layer via which a client can access any resource placed below. Typically, the VSS

restricts the access to any of its associated resources depending on the authorization granted

to the client.

Instead of defining a new interface, this document defines a small set of rules explaining how

a VSS has to present resources to a higher-layer entity. Devices implementing IEC 60839-11-31

address resources via tokens for which this document defines a small set of mapping rules. In

the example of Figure 1, both the high-level VSS as well as clients A and B can use exactly the

same interface to control a camera as the lower-level VSS does today.
4.3 Cloud uplink

The IEC 60839-11-31 defines that the client initiates a connection to a device, as depicted in

Figure 2.
Figure 2 – Standard connection initiated from the client

This connection mechanism works very well within standard networks. However, in cases where

the device is located behind a firewall and the client resides in the cloud, the client cannot

establish the connection. In these cases, the device needs to establish the connection. Such a

connection is called "uplink" and needs to be initiated from the device, as depicted in Figure 3.

---------------------- Page: 11 ----------------------
– 10 – IEC 62676-2-33:2022 © IEC 2022
Figure 3 – Connection initiation from the device

This document specifies a solution that allows a camera or management system to use an

uplink to facilitate existing web server functionality and RTSP server functionality using the

HTTP/2 protocol.
5 Requirements
5.1 General

To achieve the interconnection between High-level VSS (H-VSS) and Low-level VSS (L-VSS),

there are some basic requirements for the system.
5.2 Functional requirements

The detailed functional requirements of the interconnection between H-VSS and L-VSS are

described in two aspects: resource usage and configuration.

For resource usage acquired from L-VSS to H-VSS, the following requirements are described:

a) Live streaming control. Live streaming on demand, supporting on-demand image display,

zoom, capture and recording, and multi-user support for the same image resources on-

demand at the same time.

b) Historical image retrieval and playback. Retrieve historical image data of the device in the

network, according to the specified equipment, channel, time, alarm information, etc.,

playback and download. Playback supports the following methods: normal playback, fast

playback, slow playback, picture pause, image capture and zoom display. The recording

information is in the L-VSS.

c) Remote control. The remote operation of the device can be controlled remotely by manual

or automatic operation, e.g. using pan, tilt or zoom (PTZ) functions. Optionally support

locking to gain exclusive access.

d) Output of the decoded image. Real-time image decode, the output could be displayed.

Remote control of video wall located in L-VSS.

e) Storage management. Hierarchical distributed storage management, combining device

storage and client storage, to support the storage settings of location, time, backup strategy,

finishing strategies, etc.
• Content transfers from L-VSS and H-VSS.

f) Client management. L-VSS sends the management information to the H-VSS after receiving

the request from the H-VSS.

• When a new device enters the system, the L-VSS should notify the device information

to the H-VSS.

• Clock synchronization: the H-VSS and L-VSS should have clock synchronization, and

the high-level clock source should be the backup of the low-level clock source.
• Support the transport security between H-VSS and L-VSS.
---------------------- Page: 12 ----------------------
IEC 62676-2-33:2022 © IEC 2022 – 11 –
• Query the equipment manufacturers, equipment model, version, and other basic
information from H-VSS to L-VSS.
g) User management

• Support the function of user registration, authentication, authorization management,

access control, transmission and audit of user identifier from L-VSS to H-VSS.

• Grant access control permissions of the appropriate resources to different users.

h) Log management: support the logging in L-VSS and query from H-VSS to L-VSS.
i) Access control: the VSS can support the access control service.
5.3 Protocol requirements

This section lists the requirements for web service protocols between two VSS in different levels:

• The L-VSS shall report its cameras. The L-VSS shall inform the H-VSS on any changes

in its associated cameras.

• A L-VSS behind a firewall shall be able to connect to an H-VSS in the Internet.

• Device information quer
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.