Video Surveillance Systems (VSS) for use in security applications - Part 2-11: Video transmission protocols - Interop profiles for VMS and cloud VSaaS systems for safe cities and law enforcement

IEC 62676-2-11:2024 defines minimum requirement profiles for Video Management Systems (VMS) and cloud Video-Surveillance-as-a-Service (VSaaS) Systems to optimize interfacing with third parties.
It defines minimum required VMS interoperability levels from video export to exclusive video control, for the sake of remote support, for example in crisis situations, regulating governmental organizations, national law enforcement, private security service companies, public transport operators and other authorities.
This document is intended to set the common technical basis for national regulations requiring inter-organizational remote, local or on-site access, for example so that authorities can be granted temporary access to the VSS in the case of emergency situations.
This standard is accordingly expected to supersede ISO 22311 (Societal Security - Video-surveillance - Export interoperability).

Systèmes de vidéosurveillance destinés à être utilisés dans les applications de sécurité - Partie 2-11: Protocoles de transmission vidéo - Profils d'interopérabilité applicables pour les systèmes VMS et VSaaS en nuage pour la sécurité urbaine et le maintien de l'ordre

IEC 62676-2-11:2024 définit des profils d'exigences minimales pour les systèmes de gestion vidéo (VMS) et de vidéosurveillance en tant que service (VSaaS) en nuage afin d'optimiser l'interfaçage avec les systèmes tiers.
Il définit les niveaux d'interopérabilité minimaux exigés entre VMS, de l'export de vidéos à une prise en main complète à distance, à des fins d'assistance, par exemple, dans les situations de crise, pour les organismes gouvernementaux de réglementation, les forces de l'ordre nationales, les sociétés de services de sécurité privée, les opérateurs de transport public et autres autorités.
Le présent document vise à fournir une base technique commune aux réglementations nationales qui exigent un accès inter-organisationnel aux VSS (à distance, en local ou sur site), par exemple pour que des autorités puissent s'y connecter de façon temporaire en cas d'urgence.
La présente norme est destinée à remplacer l'ISO 22311 (Sécurité sociétale - Vidéosurveillance - Interopérabilité de l'export).

General Information

Status
Published
Publication Date
14-May-2024
Current Stage
PPUB - Publication issued
Start Date
15-May-2024
Completion Date
24-May-2024
Ref Project
Standard
IEC 62676-2-11:2024 - Video Surveillance Systems (VSS) for use in security applications - Part 2-11: Video transmission protocols - Interop profiles for VMS and cloud VSaaS systems for safe cities and law enforcement Released:5/15/2024 Isbn:9782832288283
English and French language
39 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)


IEC 62676-2-11 ®
Edition 1.0 2024-05
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
Video Surveillance Systems (VSS) for use in security applications –
Part 2-11: Video transmission protocols – Interop profiles for VMS and cloud
VSaaS systems for safe cities and law enforcement

Systèmes de vidéosurveillance destinés à être utilisés dans les applications de
sécurité –
Partie 2-11: Protocoles de transmission vidéo – Profils d'interopérabilité pour les
systèmes VMS et VSaaS en nuage pour la sécurité urbaine et le maintien de
l'ordre
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form
or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from
either IEC or IEC's member National Committee in the country of the requester. If you have any questions about IEC
copyright or have an enquiry about obtaining additional rights to this publication, please contact the address below or
your local IEC member National Committee for further information.

Droits de reproduction réservés. Sauf indication contraire, aucune partie de cette publication ne peut être reproduite ni
utilisée sous quelque forme que ce soit et par aucun procédé, électronique ou mécanique, y compris la photocopie et
les microfilms, sans l'accord écrit de l'IEC ou du Comité national de l'IEC du pays du demandeur. Si vous avez des
questions sur le copyright de l'IEC ou si vous désirez obtenir des droits supplémentaires sur cette publication, utilisez
les coordonnées ci-après ou contactez le Comité national de l'IEC de votre pays de résidence.

IEC Secretariat Tel.: +41 22 919 02 11
3, rue de Varembé info@iec.ch
CH-1211 Geneva 20 www.iec.ch
Switzerland
About the IEC
The International Electrotechnical Commission (IEC) is the leading global organization that prepares and publishes
International Standards for all electrical, electronic and related technologies.

About IEC publications
The technical content of IEC publications is kept under constant review by the IEC. Please make sure that you have the
latest edition, a corrigendum or an amendment might have been published.

IEC publications search - webstore.iec.ch/advsearchform IEC Products & Services Portal - products.iec.ch
The advanced search enables to find IEC publications by a Discover our powerful search engine and read freely all the
variety of criteria (reference number, text, technical publications previews, graphical symbols and the glossary.
committee, …). It also gives information on projects, replaced With a subscription you will always have access to up to date
and withdrawn publications. content tailored to your needs.

IEC Just Published - webstore.iec.ch/justpublished
Electropedia - www.electropedia.org
Stay up to date on all new IEC publications. Just Published
The world's leading online dictionary on electrotechnology,
details all new publications released. Available online and once
containing more than 22 500 terminological entries in English
a month by email.
and French, with equivalent terms in 25 additional languages.

Also known as the International Electrotechnical Vocabulary
IEC Customer Service Centre - webstore.iec.ch/csc
(IEV) online.
If you wish to give us your feedback on this publication or need

further assistance, please contact the Customer Service
Centre: sales@iec.ch.
A propos de l'IEC
La Commission Electrotechnique Internationale (IEC) est la première organisation mondiale qui élabore et publie des
Normes internationales pour tout ce qui a trait à l'électricité, à l'électronique et aux technologies apparentées.

A propos des publications IEC
Le contenu technique des publications IEC est constamment revu. Veuillez vous assurer que vous possédez l’édition la
plus récente, un corrigendum ou amendement peut avoir été publié.

Recherche de publications IEC -  IEC Products & Services Portal - products.iec.ch
webstore.iec.ch/advsearchform Découvrez notre puissant moteur de recherche et consultez
La recherche avancée permet de trouver des publications IEC gratuitement tous les aperçus des publications, symboles
en utilisant différents critères (numéro de référence, texte, graphiques et le glossaire. Avec un abonnement, vous aurez
comité d’études, …). Elle donne aussi des informations sur les toujours accès à un contenu à jour adapté à vos besoins.
projets et les publications remplacées ou retirées.

Electropedia - www.electropedia.org
IEC Just Published - webstore.iec.ch/justpublished
Le premier dictionnaire d'électrotechnologie en ligne au monde,
Restez informé sur les nouvelles publications IEC. Just
avec plus de 22 500 articles terminologiques en anglais et en
Published détaille les nouvelles publications parues.
français, ainsi que les termes équivalents dans 25 langues
Disponible en ligne et une fois par mois par email.
additionnelles. Egalement appelé Vocabulaire

Electrotechnique International (IEV) en ligne.
Service Clients - webstore.iec.ch/csc

Si vous désirez nous donner des commentaires sur cette
publication ou si vous avez des questions contactez-nous:
sales@iec.ch.
IEC 62676-2-11 ®
Edition 1.0 2024-05
INTERNATIONAL
STANDARD
NORME
INTERNATIONALE
Video Surveillance Systems (VSS) for use in security applications –

Part 2-11: Video transmission protocols – Interop profiles for VMS and cloud

VSaaS systems for safe cities and law enforcement

Systèmes de vidéosurveillance destinés à être utilisés dans les applications de

sécurité –
Partie 2-11: Protocoles de transmission vidéo – Profils d'interopérabilité pour les

systèmes VMS et VSaaS en nuage pour la sécurité urbaine et le maintien de

l'ordre
INTERNATIONAL
ELECTROTECHNICAL
COMMISSION
COMMISSION
ELECTROTECHNIQUE
INTERNATIONALE
ICS 13.320  ISBN 978-2-8322-8828-3

– 2 – IEC 62676-2-11:2024 © IEC 2024
CONTENTS
FOREWORD . 4
INTRODUCTION . 6
1 Scope . 7
2 Normative references . 7
3 Terms, definitions and abbreviated terms . 8
3.1 Terms and definitions . 8
3.2 Abbreviated terms . 8
4 Overview . 9
4.1 General . 9
4.2 Location information . 9
4.2.1 Preliminary . 9
4.2.2 Detailed location information in 3D and complex spaces . 10
4.2.3 Special case of infrastructures routinely connected to third
parties/authorities . 10
4.3 Digital signature . 10
5 Video System InterOp Profile Requirements . 11
5.1 General requirements . 11
5.2 Offline-export of collected videos (level 0V) . 13
5.2.1 General . 13
5.2.2 File format . 13
5.2.3 Video codec . 13
5.2.4 Audio codec . 13
5.2.5 Static metadata . 13
5.2.6 Digital signature . 14
5.3 Offline-export with video-metadata &-events (level 0M and 0E) . 14
5.3.1 General . 14
5.3.2 Timed metadata . 14
5.3.3 Events and alarms . 14
5.4 Access given to selected cameras (live camera streams with near-real-time
replay) (Level 1 V) . 14
5.4.1 General . 14
5.4.2 Authentication and security . 14
5.4.3 Camera access . 15
5.4.4 Live access and replay control . 15
5.4.5 Real-time streaming. 15
5.5 Access given to videos and associated metadata (level 1M) . 15
5.6 Video operator hand-over to third party (hand-over taken by the authorities)
(level 2) . 15
5.6.1 General . 15
5.6.2 PTZ control . 15
5.6.3 Analytics . 15
5.7 Metadata sharing (sharing of the metadata only) (level 3) . 15
Annex A (informative) Example of specifications of cartographic data format linked to
video-surveillance . 16
A.1 General . 16
A.2 Format and content of the CSV file . 16
Bibliography . 19

Figure 1 – Typical signature scheme . 11
Figure A.1 –Example of an indoor map (metro system – Paris) . 18

Table 1 – Levels . 12
Table A.1 – Specification of the document fields . 16

– 4 – IEC 62676-2-11:2024 © IEC 2024
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________
VIDEO SURVEILLANCE SYSTEMS FOR
USE IN SECURITY APPLICATIONS –

Part 2-11: Video transmission protocols – Interop profiles for VMS and
cloud VSaaS systems for safe cities and law enforcement

FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote international
co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and
in addition to other activities, IEC publishes International Standards, Technical Specifications, Technical Reports,
Publicly Available Specifications (PAS) and Guides (hereafter referred to as "IEC Publication(s)"). Their
preparation is entrusted to technical committees; any IEC National Committee interested in the subject dealt with
may participate in this preparatory work. International, governmental and non-governmental organizations liaising
with the IEC also participate in this preparation. IEC collaborates closely with the International Organization for
Standardization (ISO) in accordance with conditions determined by agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence between
any IEC Publication and the corresponding national or regional publication shall be clearly indicated in the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) IEC draws attention to the possibility that the implementation of this document may involve the use of (a)
patent(s). IEC takes no position concerning the evidence, validity or applicability of any claimed patent rights in
respect thereof. As of the date of publication of this document, IEC had not received notice of (a) patent(s), which
may be required to implement this document. However, implementers are cautioned that this may not represent
the latest information, which may be obtained from the patent database available at https://patents.iec.ch. IEC
shall not be held responsible for identifying any or all such patent rights.
IEC 62676-2-11 has been prepared by IEC technical committee 79: Alarm and electronic
security systems. It is an International Standard.
The text of this International Standard is based on the following documents:
Draft Report on voting
79/697/CDV 79/702/RVC
Full information on the voting for its approval can be found in the report on voting indicated in
the above table.
The language used for the development of this International Standard is English.
This document was drafted in accordance with ISO/IEC Directives, Part 2, and developed in
accordance with ISO/IEC Directives, Part 1 and ISO/IEC Directives, IEC Supplement, available
at www.iec.ch/members_experts/refdocs. The main document types developed by IEC are
described in greater detail at www.iec.ch/publications.
A list of all parts in the IEC 62676 series, published under the general title Video surveillance
systems for use in security applications, can be found on the IEC website.
The committee has decided that the contents of this document will remain unchanged until the
stability date indicated on the IEC website under webstore.iec.ch in the data related to the
specific document. At this date, the document will be
• reconfirmed,
• withdrawn, or
• revised.
IMPORTANT – The "colour inside" logo on the cover page of this document indicates
that it contains colours which are considered to be useful for the correct understanding
of its contents. Users should therefore print this document using a colour printer.

– 6 – IEC 62676-2-11:2024 © IEC 2024
INTRODUCTION
IEC Technical Committee 79 in charge of alarm and electronic security systems together with
many governmental organizations, test houses and equipment manufacturers has defined a
common framework for video surveillance exchange in order to achieve interoperability between
products and parties.
The IEC 62676 series of standards on video surveillance systems (VSS) is divided into six
independent parts:
Part 1: System requirements;
Part 2: Video transmission protocols;
Part 3: Analog and digital video interfaces;
Part 4: Application guidelines;
Part 5: Data specifications and image quality performance for camera devices;
Part 6: Performance testing and grading of real-time intelligent video.
Each part offers its own clauses for the scope, normative references, definitions, and
requirements.
Today there is a lack in directive standards giving precise requirements for VSS in certain
situations involving third parties (and especially the authorities), compared to intrusion or fire
detection alarm systems, while video applications are becoming more important for public
security.
In most cases, such situations apply to one or more independent regular operational systems
(or systems of systems) and correspond to exceptional events or security incidents where
authorities, first responders, etc. need immediate access to the data (video and associated
information) through a single third-party Video Management System (VMS) for a timely
response.
Since the surveillance systems are a crucial asset in crime prevention, crisis management, or
forensic applications to assist the law-enforcement agencies and smart cities, the goal of this
document is to provide a fully interoperable interface for VMS and Cloud Video Surveillance-
as-a-Service (VSaaS) Systems with third-party:
• security operations centres,
• professional remote video monitoring,
• remote access by law-enforcement and authorities,
for sharing their digital video-surveillance contents and associated metadata.
This document builds upon the IEC 62676 family of standards and complements it. It does not
specify any detailed requirements on application guidance and video observation objectives,
on system availability, cyber security, privacy, national and legal constraints, operational
procedures, environmental conditions, or technical protocols.

VIDEO SURVEILLANCE SYSTEMS FOR
USE IN SECURITY APPLICATIONS –

Part 2-11: Video transmission protocols – Interop profiles for VMS and
cloud VSaaS systems for safe cities and law enforcement

1 Scope
Based on the IP video features offered by the IEC 62676-2 protocol series, this document
defines minimum requirement profiles for Video Management Systems (VMS) and cloud Video-
Surveillance-as-a-Service (VSaaS) Systems to optimize interfacing with third parties.
It defines minimum required VMS interoperability levels from video export to exclusive video
control, for the sake of remote support, for example in crisis situations, regulating governmental
organizations, national law enforcement, private security service companies, public transport
operators and other authorities.
This document is intended to set the common technical basis for national regulations requiring
inter-organizational remote, local or on-site access, for example so that authorities can be
granted temporary access to the VSS in the case of emergency situations.
This standard is accordingly expected to supersede ISO 22311 (Societal Security – Video-
surveillance – Export interoperability).
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies.
For undated references, the latest edition of the referenced document (including any
amendments) applies.
IEC 60839-11-31:2016, Alarm and electronic security systems – Part 11-31: Electronic access
control systems – Core interoperability protocol based on Web services
IEC 60839-11-32, Alarm and electronic security systems – Part 11-32: Electronic access control
systems – Access control monitoring based on Web services
IEC 62676 (all parts), Video surveillance system for use in security applications
IEC 62676-2-31:2019, Video surveillance system for use in security applications – Part 2-31:
Live streaming and control based on web services
IEC 62676-2-32:2019, Video surveillance system for use in security applications – Part 2-32:
Recording control and replay based on web services
IEC 62676-2-33:2022, Video surveillance system for use in security applications – Part 2-33:
Cloud uplink and remote management system access
ISO 23601, Safety identification – Escape and evacuation plan signs
ISO/IEC 14496-3, Information technology – Coding of audio-visual objects – Part 3: Audio

– 8 – IEC 62676-2-11:2024 © IEC 2024
ISO/IEC 14496-10, Information technology – Coding of audio-visual objects – Part 10:
Advanced video coding
ISO/IEC 14496-12:2022, Information technology – Coding of audio-visual objects – Part 12:
ISO base media file format
ISO/IEC 23000-10, Information technology – Multimedia application format (MPEG-A) – Part
10: Surveillance application format
ISO/IEC 23008-2, Information technology – High efficiency coding and media delivery in
heterogeneous environments – Part 2: High efficiency video coding
ITU-T/Rec G.711, Pulse code modulation (PCM) of voice frequencies
ITU-T/Rec G.722, 7 kHz audio-coding within 64 kbit/s
RFC 5246, The Transport Layer Security (TLS) Protocol Version 1.2
3 Terms, definitions and abbreviated terms
3.1 Terms and definitions
For the purposes of this document, the terms and definitions given in the IEC 62676 series
apply.
ISO and IEC maintain terminology databases for use in standardization at the following
addresses:
• IEC Electropedia: available at https://www.electropedia.org/
• ISO Online browsing platform: available at https://www.iso.org/obp
3.2 Abbreviated terms
FOV field of view for a camera
GPS Global Positioning System, the widespread GNSS (global navigation satellite
system) for universal geolocation
LEA law-enforcement agency
PTZ pan, tilt and zoom of a camera
RTSP Real Time Streaming Protocol
SVG Scalable Vector Graphics
TLS Transport Layer Security
VMS, lower video management system, installed in single locations
VMS, upper video management system, connecting as client to the lower VMS
VSaaS cloud Video Surveillance-as-a-service Systems

4 Overview
4.1 General
The IEC 62676 series of video-surveillance standards has been established to ensure
interoperability and performance within systems, whatever their size is, up to systems of
systems. The objective of this document, within this family, is to define minimum additional
requirements to ensure that all the compliant video-surveillance systems not only perform as
expected by their owners, but also can play their societal role by supporting at the same time
the relevant authorities. Such authorities can be as diverse as the various first responders, such
as police investigators, or as diverse as the services of smart cities, all with varied use cases.
In this context, with the authorities mastering their own assets, this document concentrates on
the requirements put on the "low-level" systems producing the videos and associated data,
allowing flexibility in the implementation by the "authorities" of their receiving or processing
(client) system.
Such requirements rely, for each parameter and feature, on the provisions of the IEC 62676-2
series. For the implementer's convenience, these requirements are associated to functional
levels and sub-levels as described in Table 1.
Contrary to the other parts of the IEC 62676-2 series, the above provisions shall accommodate
the fact that most of the context relative to the site monitored by the producing system is
generally stored locally at the system level and that it is accordingly the responsibility of the
producing system to ensure that, whatever video and associated data are transferred to the
third party, they are provided with the minimum information to allow understanding by the third-
party end-users of the videos in their environment (this is especially true when GPS localization
is not enough to show FOV obstacles or masking, such as indoors and in 3D infrastructures).
The other specificity is that, as entities involved are different and information is often sensitive,
local or national provisions can apply in relation to information security and privacy; typically,
an authentication by a state-of-the-art signature of the information shared is generally expected,
as well as the encryption of the transmitted data.
Nevertheless, as subject information is often critical in emergency situations, dispositions shall
be taken by the low-level VMS owners to ensure that first responders (and more generally
authorities) can have a timely, without pre-notice, access to it in all circumstances.
These specificities are further detailed in 4.2.
4.2 Location information
4.2.1 Preliminary
The location information box ('loci' box) as defined in (3GPP TS 26.244 version 16.1.0, Release
16, Table 8.10) and referred to by IEC 62676-2-32:2019, Clause 9 provides basic information
about the location of the capture.
The GPS position as indicated in 3GPP TS 26.244 version 16.1.0 is however often not enough
to allow interpretation of the videos by the third party when the monitored environment is 3D,
underground structures or on-board vehicles unless special arrangements (as described in
4.2.2) are in place to maintain up-to-date detailed site descriptions in the third-party system.
This is especially true when the third party is connected simultaneously to several adjacent, but
different, low-level systems.
– 10 – IEC 62676-2-11:2024 © IEC 2024
4.2.2 Detailed location information in 3D and complex spaces
This gap has already been identified by first-responders for emergency escape situations and
is covered by posting mandatory 2D maps derived from ISO 23601. To complement the GPS
coordinates, the positions and FOV of the relevant cameras, as well as GPS reference points
(to allow correlations and bridges between maps), could easily be added to the map. For
universal readability, such maps shall be encoded as PDF files, SVG images or JPEG images.
The difficulty is that, at this stage, the above referenced 'loci' box is not designed to carry such
images or drawings. This might change as technology evolves. In the meantime, one of the
three following options shall be used:
• Use one of the cameras of the low-level system to carry (full-time or not) a picture of the
above-described drawing.
• If providing such image or drawing can be achieved without accessibility risk and without
delay, it shall be proposed to give access to the same information through an URL or any
other electronics means
• The systematic sharing in advance of the mapping information between the low-level
systems and the third parties shall be encouraged, as described in 4.2.3.
Optionally, an extension will allow application of the above to cameras onboard vehicles. For
instance, localization onboard the vehicle combined with the position of the vehicle allows to
define in front of which point of a platform the door of a train is, where an incident has been
detected.
4.2.3 Special case of infrastructures routinely connected to third parties/authorities
When a VMS is scheduled to be routinely used by a third party, the above complexity (see 4.2.2)
shall be avoided by transferring the geolocation with each video shared and by sharing once
and for all the relevant mapping information.
Annex A describes a possible way to achieve such a transfer of information .
4.3 Digital signature
Several methods, including digital signing, hashing, and encrypting, can be used to secure the
contents of an exported file.
The signature identifies the individual responsible for performing the file export as well as any
subsequent operations on the exported file and provides some assurance. As called for in
IEC 62676-2-32, a signature is generally required when video-surveillance data are exchanged
between entities.
All data a user wishes to carry away separately are put into a metaphorical bag. The bag is then
sealed to enable tamper detection. Anyone wanting to use the data from the bag first examines
the seal. The data in the bag are identical with the original data as long as the seal is intact;
see Figure 1.
Here, the metaphorical bag is represented by a file and the seal is represented by a signature
over all data in the file.
The "bag of evidence" approach builds on procedures for media data and related metadata to
be securely extracted from a trusted storage in a separate file. This approach defines which
metadata have to be preserved in order to provide accurate replay. Data are provided "as is"
without any further assertions, whatsoever, to perpetuate evidence.

Processing power reliefs include usage of hash functions before signature algorithms are
applied. Multiple stages of signatures might be applied to collect additional information into a
single sealed file.
State-of-the-art International Standards are applied for the file structure, and for the hash and
signature algorithms. The surveillance application format defined in ISO/IEC 23000-10 and the
RSA2048 signature as well as the SHA-256 hash algorithm approved by NIST come into
operation for the most widespread interoperability.

Figure 1 – Typical signature scheme
5 Video System InterOp Profile Requirements
5.1 General requirements
As seen from the source (low-level) system, the key functionalities to meet for satisfying the
targeted authorities need are summarized in Table 1, split into 4 generic classes of situations:
• Manual export of files to authorities for forensics investigations (level 0)
• Remote access to live stream given to authorities by the low-level system to some relevant
videos during an incident (level 1)
• Hand-over (partial or in-full) taken by the authorities on the low-level systems in case of
major incidents or special events (level 2)
• Transfer of the events and/or of analytics (but not of the videos) for non-security usage to
an authority, like a smart-city management system (level 3).

– 12 – IEC 62676-2-11:2024 © IEC 2024
In addition to the pure video (and audio, if any) contents, an optional capability allows to cover
whatever external events that can be associated with these videos and/or the metadata
produced by the analytics running on these video streams.
As stated above, dispositions shall be taken by the low-level VMS owners to ensure that first
responders (and more generally authorities) can have a timely, without pre-notice, access to it
in all circumstances.
Table 1 – Levels
Content V (Video only) M (Video + video Metadata) E (video + all relevant
Events & metadata)
0V – Offline export of collected 0M – Offline export with video- 0E – Offline export with all
videos metadata. metadata.
Basic manual export with Manual export (0V) with events Manual export with video
minimum features to support also embedded to help finding metadata, external events
investigations with videos from interesting zones in the (0M) and whatever metadata
different sources, including a records. analytics results that could
representation of cameras have been produced over the
localization and FOV period of interest.
rd
understandable by a 3 party
and clock double check when
exporting.
As applicable, this export can
rely on a copy on physical
removable media or on remote
file transfers.
1V – Access given to selected 1M – Access given to videos
cameras and associated metadata
Access to camera streams Access to camera streams (1V)
provided by the low-level system with key events embedded to
to a defined client system help operator at client to be
(typically to first responders and alerted by alarms.
the authorities during an
incident).
2V – Video operator hand-over 2M – Video operator hand-over 2E – Video operator hand-
to third party with Video-metadata over with all metadata
Access to and control live of Same as 2V with relevant Same as 2M with also
cameras, including events embedded to help whatever available and
corresponding recently recorded operator at client to be alerted localized relevant metadata
streams, provided by the low- by alarms relevant for the analytics results.
level system to a defined client cameras monitored.
system (typically to first
responders and the authorities
during a major incident). The
operator of the client system is
provided with an understandable
representation of cameras
localization and FOV.
3M – Video-metadata sharing 3E – Varied metadata
sharing
Contribution of a low-level Same as 3M with privacy
video surveillance system to a compliant metadata
privacy protective smart city
control room (or equivalent),
where only time stamped and
geo-localized events, but no
videos, are provided.
These levels correspond to different minimum interoperability requirements which may apply
simultaneously to a given system: export of recorded files for forensics investigations and real-
time (as well as near-real-time) access to several cameras, allowing to identify the clips to
export.
Level 3 Level 2 Level 1 Level 0
Data sharing without Video operator hand-over Access given to Files export for forensics usage
video selected cameras
Subclause 5.2 provides for each of the above defined levels (i.e., use cases), the relevant
minimum requirements for interoperability.
5.2 Offline-export of collected videos (level 0V)
5.2.1 General
Subclause 5.2 defines the minimum requirements applicable to the file formats used to export
the collected contents (video, audio and associated metadata) to achieve interoperability on
conducting post-event investigations.
By standardizing the export file format with date and time, data collection will be improved and
investigators can effectively triage data acquired from VMS systems. This implies that the time
used in 5.2 is the absolute time (UTC) associated with the capture of the relevant video frame
or information, which can be different from the VMS ingest time.
5.2.2 File format
Compliant VSS systems shall be able to export video and associated information using
ISO Base File Format in accordance with ISO/IEC 14496-12. Exports should make use of
fragmented representation for better resilience to errors.
5.2.3 Video codec
A compliant system shall export one video track containing one of the following formats:
• H.264 video in accordance with ISO/IEC 14496-10;
• H.265 video in accordance with ISO/IEC 23008-2.
Devices may support exporting multiple parallel video streams.
5.2.4 Audio codec
In case audio data is included, it shall have its own track as defined in ISO/IEC 14496-12.
The data shall be compressed with one of the following formats:
• G.711 Law A as defined in ITU-T/Rec-G.711;
• G.722 as defined in ITU-T/Rec-G.722; or
• MPEG4-AAC in Low Complexity Profile (AAC-LC), as defined in ISO/IEC 14496-3.
5.2.5 Static metadata
5.2.5.1 General
Subclause 5.2.5 describes the requirement on supplemental static file information.
The file static metadata shall include the following information in the surveillance export box
(suep box), as defined in IEC 62676-2-32:2019, Clause 9:
• descriptions of source of the tracks;
• absolute start time; and
• date and time of the export.

– 14 – IEC 62676-2-11:2024 © IEC 2024
5.2.5.2 Location information metadata in export
The location information box ('loci' box) as defined in 3GPP TS 26.244 shall be present and
include the GPS position (Long-Lat) of the capture.
Furthermore, if there is a risk of location ambiguity, like in multi-level buildings or underground
infrastructures, the location information box shall also contain the GPS location (altitude) of the
capture.
A device may provide supplemental information, such as a drawing of the scene via a URL
reference. This reference may not be openly accessible for security reasons.
5.2.6 Digital signature
The export file shall include at least one digital signature as defined in IEC 62676-2-32:2019,
9.4 and as described in 4.2 of this document.
5.3 Offline-export with video-metadata &-events (level 0M and 0E)
5.3.1 General
A device supporting level 0M shall fulfil all requirements of level 0V plus those defined in 5.3.2
and 5.3.3.
5.3.2 Timed metadata
The system shall export one metadata track containing scene description and event information
as defined in IEC 62676-2-31. The track shall be encoded as 'metx' box as defined in
ISO/IEC 14496-12:2022, 12.3.
5.3.3 Events and alarms
The metadata track shall hold all events generated by the data source during the export time
interval. For event descriptions, see IEC 60839-11-31:2016, Clause 10 and
IEC 62676-2-31:2019, 6.3.8.
For event types not defined in above references, refer to the topic and format definitions
provided by the appropriate standards bodies.
5.4 Access given to selected cameras (live camera streams with near-real-time
replay) (Level 1 V)
5.4.1 General
A device supporting level 1 shall also support all requirements of level 0V.
5.4.2 Authentication and security
All communication shall be secured by TLS. Both client and server shall use a certificate based
on authentication in accordance with RFC 5246 or later.
The VMS shall expose a web service in accordance with IEC 60839-11-31 for commands and
events that can be reached via HTTPS.
The VMS shall expose an RTSP server that provides both live and replay media streams over
HTTPS, in accordance with IEC 62676-2-31, Clause 10.

5.4.3 Camera access
The VSS shall support discovery of its associated cameras, as defined in IEC 62676-2-33:2022,
Clause 7.
5.4.4 Live access and replay control
The VSS shall support access to live video, as defined by IEC 62676-2-31.
The VSS shall support playback of recorded video, audio and metadata as defined in
IEC 62676-2-32:2019, Clause 7. Access to recorded material can be restricted to the near past,
depending on regulatory requirements.
5.4.5 Real-time streaming
A device supporting level 1 shall support secure media streaming using RTSP over HTTP, as
defined in IEC 60839-11-31 and IEC 60839-11-32.
5.5 Access given to videos and associated metadata (level 1M)
A device supporting level 1M shall support all requirements of level 1V.
A conformant device shall support streaming of metadata, including scene description and
events over HTTP.
5.6 Video operator hand-over to third party (hand-over taken by the authorities)
(level 2)
5.6.1 General
A device supporting level 2 (incl. 2V, 2M and 2E) shall support all requirements specified for
levels 0 and 1.
5.6.2 PTZ control
A device supporting level 2 shall support the PTZ service interfaces for the configuration and
operation of movable cameras, as defined in IEC 62676-2-31:2019, Clause 8.
5.6.3 Analytics
The analytics service allows configuration of individual rules and individual analytics modules,
as defined in IEC 62676-2-31:2019, Clause 9.
5.7 Metadata sharing (sharing of the metadata only) (level 3)
The contents of 5.5 and 5.6 apply, but with video fields not populated.

– 16 – IEC 62676-2-11:2024 © IEC 2024
Annex A
(informative)
Example of specifications of cartographic data
format linked to video-surveillance
A.1 General
This document aims to define the files format to integrate third-party mapping information into
VSS for safe city and law enforcement. It is based on files containing camera information and
partner plans.
In order to ensure a security continuum, law enforcement VSS systems aim to federate third-
party systems (transport operators, shopping centres, exhibition sites, etc.) via technical
devices allowing dialogue between systems. To be effective, the partners' accessible cameras
must be represented on maps. In fact, the cartographic data provide operators with the relevant
information for the choice of adapted video sources. The sharing of this information from third
party systems can be done in the form of CSV files containing data on partner plans and camera
locations.
As a prerequisite, the law enforcement VSS must include a cartographic management system.
A.2 Format and content of the CSV file
The mapping information is provided in the form of a reference table listing the cameras, the
plans, as well as the navigation links between the plans. The reference table shall be provided
in CSV format, with the semicolon as a separator. The fields of the table are the following
columns of the CSV file; the order of the columns shall be respected:
Partner; Map; File; Type; ID_Camera; Name; Link; GPS_Pos; HV_Pos; Angle; Icon
These elements are used to:
• position a partner camera on a map (georeferenced or background image);
• integrate a partner plan (image) into the cartographic management system;
• position navigation links between maps.
Table A.1 describes the specifications of the document fields.
Table A.1 – Specification of the document fields
Field Authorized values Description
Partner text Name of partner. This unique identifier is used as a key for the
association of all the resources of the third-party system.
Map text Name of the georeferenced map or site map. This unique identifier
is used as a key for the association of objects o
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...