Video surveillance systems for use in security applications - Part 2-33: Video transmission protocols - Cloud uplink and remote management system access

This part of the IEC 62676 series specifies management systems interfaces and mechanism for remote operational access to physical security devices such as video surveillance devices and systems. For video surveillance, the use cases focus on accessing live video and retrieving recordings. The mechanism defined in this specification are not restricted to surveillance applications but also cover remote access to security systems and electronic access control systems. Configuration of devices and management systems is out of scope of this specification.
Clause 4 introduces to remote management access. Clause 5 defines a set of requirements that the protocol needs to fulfil. Clause 6 extends the token-based resource-addressing scheme of the underlying specification IEC 60839-11-31. Clause 7 describes how to retrieve information about remote resources. Clause 8 defines how to connect to devices that are not directly reachable because they are e.g. located behind firewalls.

Videoüberwachungsanlagen für Sicherungsanwendungen - Teil 2-33: Cloud-Uplink und Fernzugriff von Managementsystemen

Systèmes de vidéosurveillance destinés à être utilisés dans les applications de sécurité - Partie 2-33: Protocoles de transmission vidéo - Liaison montante au nuage et accès au système de gestion à distance

IEC 62676-2-33:2022 spécifie les interfaces et les mécanismes des systèmes de gestion pour un accès opérationnel à distance aux dispositifs de sécurité physiques tels que les dispositifs et les systèmes de vidéosurveillance. Pour la vidéosurveillance, les cas d'utilisation concernent l'accès aux vidéos en direct et l'extraction des enregistrements. Les mécanismes définis dans le présent document ne se limitent pas aux applications de surveillance, mais couvrent également l'accès à distance aux systèmes de sécurité et aux systèmes de contrôle d'accès électronique. La configuration des dispositifs et des systèmes de gestion ne relève pas du domaine d'application du présent document.

Sistemi za videonadzor v varnostnih aplikacijah - 2-33. del: Protokoli video prenosa - Povezava do oblaka in oddaljen dostop do sistema upravljanja

Ta del skupine standardov IEC 62676 določa vmesnike sistemov upravljanja in mehanizem za oddaljen operativni dostop do fizičnih varnostnih naprav, kot so naprave in sistemi za videonadzor. Pri videonadzoru se primeri uporabe osredotočajo na dostop do videoposnetkov v živo in prenašanje posnetkov. Mehanizem, opredeljen v tej specifikaciji, ni omejen na aplikacije za videonadzor, temveč zajema tudi oddaljeni dostop do varnostnih sistemov in elektronskih sistemov za nadzor dostopa. Konfiguracija naprav in sistemov upravljanja ne spada na področje uporabe te specifikacije.
4. točka obravnava dostop za oddaljeno upravljanje. 5. točka določa zahteve, ki jih mora izpolnjevati protokol. 6. točka razširja shemo naslavljanja virov na osnovi žetonov, ki je obravnavana v osnovni specifikaciji IEC 60839-11-31. 7. točka opisuje, kako pridobiti informacije o oddaljenih virih. 8. točka določa, kako se povezati z napravami, ki niso neposredno dosegljive, ker so npr. za požarnimi zidovi.

General Information

Status
Published
Publication Date
19-Oct-2022
Technical Committee
Current Stage
6060 - National Implementation/Publication (Adopted Project)
Start Date
12-Oct-2022
Due Date
17-Dec-2022
Completion Date
20-Oct-2022

Buy Standard

Standard
EN IEC 62676-2-33:2022 - BARVE
English language
28 pages
sale 10% off
Preview
sale 10% off
Preview
e-Library read for
1 day

Standards Content (Sample)

SLOVENSKI STANDARD
SIST EN IEC 62676-2-33:2022
01-november-2022
Sistemi za videonadzor v varnostnih aplikacijah - 2-33. del: Protokoli video
prenosa - Povezava do oblaka in oddaljen dostop do sistema upravljanja
Video surveillance systems for use in security applications - Part 2-33: Video
transmission protocols - Cloud uplink and remote management system access
Systèmes de vidéosurveillance destinés à être utilisés dans les applications de sécurité -
Partie 2-33: Protocoles de transmission vidéo - Liaison montante au nuage et accès au
système de gestion à distance
Ta slovenski standard je istoveten z: EN IEC 62676-2-33:2022
ICS:
13.320 Alarmni in opozorilni sistemi Alarm and warning systems
SIST EN IEC 62676-2-33:2022 en
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.

---------------------- Page: 1 ----------------------
SIST EN IEC 62676-2-33:2022

---------------------- Page: 2 ----------------------
SIST EN IEC 62676-2-33:2022


EUROPEAN STANDARD EN IEC 62676-2-33

NORME EUROPÉENNE

EUROPÄISCHE NORM September 2022
ICS 13.320

English Version
Video surveillance systems for use in security applications -
Part 2-33: Video transmission protocols - Cloud uplink and
remote management system access
(IEC 62676-2-33:2022)
Systèmes de vidéosurveillance destinés à être utilisés dans Videoüberwachungsanlagen für Sicherungsanwendungen -
les applications de sécurité - Partie 2-33: Protocoles de Teil 2-33: Cloud-Uplink und Fernzugriff von
transmission vidéo - Liaison montante au nuage et accès Managementsystemen
au système de gestion à distance (IEC 62676-2-33:2022)
(IEC 62676-2-33:2022)
This European Standard was approved by CENELEC on 2022-08-26. CENELEC members are bound to comply with the CEN/CENELEC
Internal Regulations which stipulate the conditions for giving this European Standard the status of a national standard without any alteration.
Up-to-date lists and bibliographical references concerning such national standards may be obtained on application to the CEN-CENELEC
Management Centre or to any CENELEC member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by translation
under the responsibility of a CENELEC member into its own language and notified to the CEN-CENELEC Management Centre has the
same status as the official versions.
CENELEC members are the national electrotechnical committees of Austria, Belgium, Bulgaria, Croatia, Cyprus, the Czech Republic,
Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, the
Netherlands, Norway, Poland, Portugal, Republic of North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland,
Türkiye and the United Kingdom.


European Committee for Electrotechnical Standardization
Comité Européen de Normalisation Electrotechnique
Europäisches Komitee für Elektrotechnische Normung
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2022 CENELEC All rights of exploitation in any form and by any means reserved worldwide for CENELEC Members.
 Ref. No. EN IEC 62676-2-33:2022 E

---------------------- Page: 3 ----------------------
SIST EN IEC 62676-2-33:2022
EN IEC 62676-2-33:2022 (E)
European foreword
The text of document 79/658/FDIS, future edition 1 of IEC 62676-2-33, prepared by IEC/TC 79 "Alarm
and electronic security systems" was submitted to the IEC-CENELEC parallel vote and approved by
CENELEC as EN IEC 62676-2-33:2022.
The following dates are fixed:
• latest date by which the document has to be implemented at national (dop) 2023-05-26
level by publication of an identical national standard or by endorsement
• latest date by which the national standards conflicting with the (dow) 2025-08-26
document have to be withdrawn
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CENELEC shall not be held responsible for identifying any or all such patent rights.
Any feedback and questions on this document should be directed to the users’ national committee. A
complete listing of these bodies can be found on the CENELEC website.
Endorsement notice
The text of the International Standard IEC 62676-2-33:2022 was approved by CENELEC as a
European Standard without any modification.
In the official version, for Bibliography, the following notes have to be added for the standards
indicated:
IEC 60839-11-32 NOTE Harmonized as EN 60839-11-32
IEC 60839-11-33 NOTE Harmonized as EN IEC 60839-11-33
IEC 62676-2-31 NOTE Harmonized as EN IEC 62676-2-31
IEC 62676-2-32 NOTE Harmonized as EN IEC 62676-2-32
2

---------------------- Page: 4 ----------------------
SIST EN IEC 62676-2-33:2022
EN IEC 62676-2-33:2022 (E)
Annex ZA
(normative)

Normative references to international publications
with their corresponding European publications
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments)
applies.
NOTE 1  Where an International Publication has been modified by common modifications, indicated by (mod),
the relevant EN/HD applies.
NOTE 2  Up-to-date information on the latest versions of the European Standards listed in this annex is available
here: www.cenelec.eu.
Publication Year Title EN/HD Year
IEC 60839-11-31 - Alarm and electronic security systems - EN 60839-11-31 -
Part 11-31: Electronic access control systems
- Core interoperability protocol based on Web
services
IETF RFC 4122 - A Universally Unique IDentifier (UUID) URN - -
Namespace
IETF RFC 5246 - The Transport Layer Security (TLS) Protocol, - -
Version 1.2
IETF RFC 6125 - Representation and Verification of Domain- - -
Based Application Service Identity within
Internet Public Key Infrastructure Using X.509
(PKIX) Certificates in the Context of
Transport Layer Security (TLS)
IETF RFC 7540 - Hypertext Transfer Protocol Version 2 - -
(HTTP/2)

3

---------------------- Page: 5 ----------------------
SIST EN IEC 62676-2-33:2022

---------------------- Page: 6 ----------------------
SIST EN IEC 62676-2-33:2022




IEC 62676-2-33

®


Edition 1.0 2022-07




INTERNATIONAL



STANDARD




NORME


INTERNATIONALE
colour

inside










Video surveillance systems for use in security applications –

Part 2-33: Video transmission protocols – Cloud uplink and remote management

system access



Systèmes de vidéosurveillance destinés à être utilisés dans les applications de

sécurité –


Partie 2-33: Protocoles de transmission vidéo – Liaison montante au nuage et

accès au système de gestion à distance












INTERNATIONAL

ELECTROTECHNICAL

COMMISSION


COMMISSION

ELECTROTECHNIQUE


INTERNATIONALE




ICS 13.320 ISBN 978-2-8322-3973-5




Warning! Make sure that you obtained this publication from an authorized distributor.

Attention! Veuillez vous assurer que vous avez obtenu cette publication via un distributeur agréé.

® Registered trademark of the International Electrotechnical Commission
Marque déposée de la Commission Electrotechnique Internationale

---------------------- Page: 7 ----------------------
SIST EN IEC 62676-2-33:2022
– 2 – IEC 62676-2-33:2022 © IEC 2022
CONTENTS
FOREWORD . 4
INTRODUCTION . 6
1 Scope . 7
2 Normative references . 7
3 Terms and definitions . 7
4 Overview . 8
4.1 General . 8
4.2 Remote access . 8
4.3 Cloud uplink . 9
5 Requirements . 10
5.1 General . 10
5.2 Functional requirements. 10
5.3 Protocol requirements . 11
6 Resource addressing . 11
6.1 Token based addressing . 11
6.2 Remote tokens . 12
6.3 Token context . 12
7 Resource queries . 12
7.1 General . 12
7.2 Resource event . 13
7.3 Location filter . 13
7.4 Prefix filter . 14
7.5 Scope filter . 14
7.6 Select filter . 14
7.7 Live checks . 15
7.8 Informative examples . 15
7.8.1 Live video . 15
7.8.2 Forensic . 15
8 Uplink . 16
8.1 Protocol . 16
8.1.1 Connection establishment . 16
8.1.2 Connection management . 16
8.1.3 Authentication . 17
8.1.4 HTTP/2 frames . 17
8.1.5 HTTP transactions . 17
8.2 Configuration interface . 17
8.2.1 Configuration parameters . 17
8.2.2 GetUplinks . 17
8.2.3 SetUplink . 18
8.2.4 DeleteUplink . 18
8.2.5 Capabilities . 18
Annex A (informative) Addressing scheme . 19
A.1 Overview . 19
A.2 Field definitions . 19
A.2.1 Zone code . 19
A.2.2 Agency code . 19

---------------------- Page: 8 ----------------------
SIST EN IEC 62676-2-33:2022
IEC 62676-2-33:2022 © IEC 2022 – 3 –
A.2.3 Device type code . 20
A.2.4 Serial number . 22
A.2.5 Examples . 22
Annex B (informative) APIs with token adaption . 24
B.1 General . 24
B.2 Consuming live video . 24
B.3 Controlling PTZ cameras . 24
B.4 Retrieving recordings . 24
B.5 Forwarding of events . 24
Bibliography . 25


Figure 1 – Hierarchical system example . 9
Figure 2 – Standard connection initiated from the client . 9
Figure 3 – Connection initiation from the device . 10
Figure 4 – Connection initiation sequence . 16
Figure A.1 – Fields of the device ID scheme . 19


Table A.1 – The zone code elements . 19
Table A.2 – Industry coding . 20
Table A.3 – Device type codes . 21
Table A.4 – Serial number value . 22

---------------------- Page: 9 ----------------------
SIST EN IEC 62676-2-33:2022
– 4 – IEC 62676-2-33:2022 © IEC 2022
INTERNATIONAL ELECTROTECHNICAL COMMISSION
____________

VIDEO SURVEILLANCE SYSTEMS FOR
USE IN SECURITY APPLICATIONS –

Part 2-33: Video transmission protocols – Cloud uplink and remote
management system access

FOREWORD
1) The International Electrotechnical Commission (IEC) is a worldwide organization for standardization comprising
all national electrotechnical committees (IEC National Committees). The object of IEC is to promote international
co-operation on all questions concerning standardization in the electrical and electronic fields. To this end and
in addition to other activities, IEC publishes International Standards, Technical Specifications, Technical Reports,
Publicly Available Specifications (PAS) and Guides (hereafter referred to as “IEC Publication(s)”). Their
preparation is entrusted to technical committees; any IEC National Committee interested in the subject dealt with
may participate in this preparatory work. International, governmental and non-governmental organizations liaising
with the IEC also participate in this preparation. IEC collaborates closely with the International Organization for
Standardization (ISO) in accordance with conditions determined by agreement between the two organizations.
2) The formal decisions or agreements of IEC on technical matters express, as nearly as possible, an international
consensus of opinion on the relevant subjects since each technical committee has representation from all
interested IEC National Committees.
3) IEC Publications have the form of recommendations for international use and are accepted by IEC National
Committees in that sense. While all reasonable efforts are made to ensure that the technical content of IEC
Publications is accurate, IEC cannot be held responsible for the way in which they are used or for any
misinterpretation by any end user.
4) In order to promote international uniformity, IEC National Committees undertake to apply IEC Publications
transparently to the maximum extent possible in their national and regional publications. Any divergence between
any IEC Publication and the corresponding national or regional publication shall be clearly indicated in the latter.
5) IEC itself does not provide any attestation of conformity. Independent certification bodies provide conformity
assessment services and, in some areas, access to IEC marks of conformity. IEC is not responsible for any
services carried out by independent certification bodies.
6) All users should ensure that they have the latest edition of this publication.
7) No liability shall attach to IEC or its directors, employees, servants or agents including individual experts and
members of its technical committees and IEC National Committees for any personal injury, property damage or
other damage of any nature whatsoever, whether direct or indirect, or for costs (including legal fees) and
expenses arising out of the publication, use of, or reliance upon, this IEC Publication or any other IEC
Publications.
8) Attention is drawn to the Normative references cited in this publication. Use of the referenced publications is
indispensable for the correct application of this publication.
9) Attention is drawn to the possibility that some of the elements of this IEC Publication may be the subject of patent
rights. IEC shall not be held responsible for identifying any or all such patent rights.
IEC 62676-2-33 has been prepared by IEC technical committee 79: Alarm and electronic
security systems. It is an International Standard.
The text of this International Standard is based on the following documents:
Draft Report on voting
79/658/FDIS 79/666/RVD

Full information on the voting for its approval can be found in the report on voting indicated in
the above table.
The language used for the development of this International Standard is English.

---------------------- Page: 10 ----------------------
SIST EN IEC 62676-2-33:2022
IEC 62676-2-33:2022 © IEC 2022 – 5 –
A list of all the parts in the IEC 62676 series, under the general title Video surveillance systems
for use in security applications, can be found on the IEC website.
This document was drafted in accordance with ISO/IEC Directives, Part 2, and developed in
accordance with ISO/IEC Directives, Part 1 and ISO/IEC Directives, IEC Supplement, available
at www.iec.ch/members_experts/refdocs. The main document types developed by IEC are
described in greater detail at www.iec.ch/standardsdev/publications.
The committee has decided that the contents of this document will remain unchanged until the
stability date indicated on the IEC website under webstore.iec.ch in the data related to the
specific document. At this date, the document will be
• reconfirmed,
• withdrawn,
• replaced by a revised edition, or
• amended.

IMPORTANT – The "colour inside" logo on the cover page of this document indicates
that it contains colours which are considered to be useful for the correct understanding
of its contents. Users should therefore print this document using a colour printer.

---------------------- Page: 11 ----------------------
SIST EN IEC 62676-2-33:2022
– 6 – IEC 62676-2-33:2022 © IEC 2022
INTRODUCTION
Surveillance systems are important in public safety projects to maintain law and order as well
as public safety, and to assist the police to perform forensic analysis. Due to organizational and
security reasons, large-scale surveillance systems are split in segments, which can lead to
information silos. This document provides a standardized interface for management systems
such that authorized entities can easily access remote information using the same mechanism
they are using today for accessing local information.

---------------------- Page: 12 ----------------------
SIST EN IEC 62676-2-33:2022
IEC 62676-2-33:2022 © IEC 2022 – 7 –
VIDEO SURVEILLANCE SYSTEMS FOR
USE IN SECURITY APPLICATIONS –

Part 2-33: Video transmission protocols - Cloud uplink and remote
management system access



1 Scope
This document specifies management systems interfaces and mechanisms for remote
operational access to physical security devices such as video surveillance devices and systems.
For video surveillance, the use cases focus on accessing live video and retrieving recordings.
The mechanisms defined in this document are not restricted to surveillance applications, but
also cover remote access to security systems and electronic access control systems.
Configuration of devices and management systems is out of the scope of this document.
Clause 4 introduces remote management access. Clause 5 defines a set of requirements that
the protocol needs to fulfil. Clause 6 extends the token-based resource-addressing scheme of
IEC 60839-11-31. Clause 7 describes how to retrieve information about remote resources.
Clause 8 defines how to connect to devices that are not directly reachable because they are for
instance located behind firewalls.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies.
For undated references, the latest edition of the referenced document (including any
amendments) applies.
IEC 60839-11-31, Alarm and electronic security systems – Part 11-31: Electronic access control
systems – Core interoperability protocol based on Web services
IETF RFC 4122, A Universally Unique IDentifier (UUID) URN Namespace
IETF RFC 5246, The Transport Layer Security (TLS) Protocol, Version 1.2
IETF RFC 6125, Representation and Verification of Domain-Based Application Service
Identity within Internet Public Key Infrastructure Using X.509 (PKIX)
Certificates in the Context of Transport Layer Security (TLS)
IETF RFC 7540, Hypertext Transfer Protocol Version 2 (HTTP/2)
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
ISO and IEC maintain terminological databases for use in standardization at the following
addresses:
• IEC Electropedia: available at http://www.electropedia.org/
• ISO Online browsing platform: available at http://www.iso.org/obp

---------------------- Page: 13 ----------------------
SIST EN IEC 62676-2-33:2022
– 8 – IEC 62676-2-33:2022 © IEC 2022
3.1
resource
IEC 62676-2 entity that can be addressed via a token
3.2
uplink
connection established by the local service to the remote client
4 Overview
4.1 General
IEC 62676-2-31 and IEC 62676-2-32 provide a detailed protocol definition for interacting with
video surveillance devices such as cameras and digital recorders. Similarly, IEC 60839-11-32
and IEC 60839-11-33 describe how to monitor and configure electronic access control systems.
These two parts are based on IEC 60839-11-31, which defines a communication mechanism
based on web services. This document extends IEC 60839-11-31 by adding cloud connectivity
and remote addressing to the framework. Note that this document does not contain any domain-
specific details, since all interfaces defined in the above-mentioned parts are applicable without
any modifications. Therefore, this document covers the integration of a wide range of physical
security systems into any management system. This document describes how a remote client
or management system connects to resources such as cameras. The approach shown here
allows scaling over several hierarchies. The examples in 4.2 show the mechanism principle with
two layers of video surveillance systems (VSS) called "lower level" and "higher level". In this
system, a higher-level VSS can retrieve a resource like device information from a lower-level
VSS, to trigger corresponding actions for different devices that are connected to the lower-level
VSS.
Access to remote VSS can require strict authentication constraints. The related definitions are
outside of the scope of this document.
4.2 Remote access
Figure 1 shows a typical management system topology as deployed for bigger installations. So-
called lower-level video surveillance systems incorporate numerous surveillance cameras and
other equipment to monitor a region of a premises or city district. Higher-level video
management systems allow supervision of large compounds.

---------------------- Page: 14 ----------------------
SIST EN IEC 62676-2-33:2022
IEC 62676-2-33:2022 © IEC 2022 – 9 –

Figure 1 – Hierarchical system example
In a way similar to the cameras shown in Figure 1, the VSSs expose an interface towards the
higher layer via which a client can access any resource placed below. Typically, the VSS
restricts the access to any of its associated resources depending on the authorization granted
to the client.
Instead of defining a new interface, this document defines a small set of rules explaining how
a VSS has to present resources to a higher-layer entity. Devices implementing IEC 60839-11-31
address resources via tokens for which this document defines a small set of mapping rules. In
the example of Figure 1, both the high-level VSS as well as clients A and B can use exactly the
same interface to control a camera as the lower-level VSS does today.
4.3 Cloud uplink
The IEC 60839-11-31 defines that the client initiates a connection to a device, as depicted in
Figure 2.

Figure 2 – Standard connection initiated from the client
This connection mechanism works very well within standard networks. However, in cases where
the device is located behind a firewall and the client resides in the cloud, the client cannot
establish the connection. In these cases, the device needs to establish the connection. Such a
connection is called "uplink" and needs to be initiated from the device, as depicted in Figure 3.

---------------------- Page: 15 ----------------------
SIST EN IEC 62676-2-33:2022
– 10 – IEC 62676-2-33:2022 © IEC 2022

Figure 3 – Connection initiation from the device
This document specifies a solution that allows a camera or management system to use an
uplink to facilitate existing web server functionality and RTSP server functionality using the
HTTP/2 protocol.
5 Requirements
5.1 General
To achieve the interconnection between High-level VSS (H-VSS) and Low-level VSS (L-VSS),
there are some basic requirements for the system.
5.2 Functional requirements
The detailed functional requirements of the interconnection between H-VSS and L-VSS are
described in two aspects: resource usage and configuration.
For resource usage acquired from L-VSS to H-VSS, the following requirements are described:
a) Live streaming control. Live streaming on demand, supporting on-demand image display,
zoom, capture and recording, and multi-user support for the same image resources on-
demand at the same time.
b) Historical image retrieval and playback. Retrieve historical image data of the device in the
network, according to the specified equipment, channel, time, alarm information, etc.,
playback and download. Playback supports the following methods: normal playback, fast
playback, slow playback, picture pause, image capture and zoom display. The recording
information is in the L-VSS.
c) Remote control. The remote operation of the device can be controlled remotely by manual
or automatic operation, e.g. using pan, tilt or zoom (PTZ) functions. Optionally support
locking to gain exclusive access.
d) Output of the decoded image. Real-time image decode, the output could be displayed.
Remote control of video wall located in L-VSS.
e) Storage management. Hierarchical distributed storage management, combining device
storage and client storage, to support the storage settings of location, time, backup strategy,
finishing strategies, etc.
• Content transfers from L-VSS and H-VSS.
f) Client management. L-VSS s
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.