Cena s DPH / bez DPH
Hlavní stránka>BS EN IEC 62676-2-33:2022 Video surveillance systems for use in security applications Video transmission protocols. Cloud uplink and remote management system access
Sponsored link
sklademVydáno: 2023-06-23
BS EN IEC 62676-2-33:2022 Video surveillance systems for use in security applications Video transmission protocols. Cloud uplink and remote management system access

BS EN IEC 62676-2-33:2022

Video surveillance systems for use in security applications Video transmission protocols. Cloud uplink and remote management system access

Formát
Dostupnost
Cena a měna
Anglicky Zabezpečené PDF
K okamžitému stažení
6448 Kč
Čtěte normu po dobu 1 hodiny. Více informací v kategorii E-READING
Čtení normy
na 1 hodinu
644.80 Kč
Čtěte normu po dobu 24 hodin. Více informací v kategorii E-READING
Čtení normy
na 24 hodin
1934.40 Kč
Anglicky Tisk
Skladem
6448 Kč
Označení normy:BS EN IEC 62676-2-33:2022
Počet stran:30
Vydáno:2023-06-23
ISBN:978 0 539 06246 5
Status:Standard
Popis

BS EN IEC 62676-2-33:2022


This standard BS EN IEC 62676-2-33:2022 Video surveillance systems for use in security applications is classified in these ICS categories:
  • 13.320 Alarm and warning systems
This part of the IEC 62676 series specifies management systems interfaces and mechanism for remote operational access to physical security devices such as video surveillance devices and systems. For video surveillance, the use cases focus on accessing live video and retrieving recordings. The mechanism defined in this specification are not restricted to surveillance applications but also cover remote access to security systems and electronic access control systems. Configuration of devices and management systems is out of scope of this specification. Clause 4 introduces to remote management access. Clause 5 defines a set of requirements that the protocol needs to fulfil. Clause 6 extends the token-based resource-addressing scheme of the underlying specification IEC 60839-11-31. Clause 7 describes how to retrieve information about remote resources. Clause 8 defines how to connect to devices that are not directly reachable because they are e.g. located behind firewalls.