IEC 62676-4:2014
Video surveillance systems for use in security applications - Part 4: Application guidelines

Standard No.
IEC 62676-4:2014
Release Date
2014
Published By
International Electrotechnical Commission (IEC)
Latest
IEC 62676-4:2014
Replace
IEC 79/455/FDIS:2014
Scope
This part of IEC 62676 gives recommendations and requirements for the selection@ planning@ installation@ commissioning@ maintaining and testing video surveillance systems (VSS) comprising of image capture device(s)@ interconnection(s) and image handling device(s)@ for use in security applications. The objectives of this part of IEC 62676 are to: a) provide a framework to assist customers@ installers and users in establishing their requirements@ b) assist specifiers and users in determining the appropriate equipment required for a given application@ c) provide means of evaluating objectively the performance of the VSS.

IEC 62676-4:2014 Referenced Document

  • IEC 62676-1-1:2013 Video surveillance systems for use in security applications - Part 1-1: System requirements - General
  • IEC 62676-1-2:2013 Video surveillance systems for use in security applications - Part 1-2: System requirements - Performance requirements for video transmission
  • IEC 62676-2-1:2013 Video surveillance systems for use in security applications - Part 2-1: Video transmission protocols - General requirements
  • IEC 62676-2-2:2013 Video surveillance systems for use in security applications - Part 2-2: Video transmission protocols - IP interoperability implementation based on HTTP and REST services
  • IEC 62676-2-3:2013 Video surveillance systems for use in security applications - Part 2-3: Video transmission protocols - IP interoperability implementation based on WEB services
  • IEC 62676-3:2013 Video surveillance systems for use in security applications - Part 3: Analog and digital video interfaces

IEC 62676-4:2014 history

  • 2014 IEC 62676-4:2014 Video surveillance systems for use in security applications - Part 4: Application guidelines
Video surveillance systems for use in security applications - Part 4: Application guidelines



Copyright ©2024 All Rights Reserved