HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189760 (18 Oct 2025)

GB 50348-2018 English PDF

US$1229.00 · In stock
Delivery: <= 10 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB 50348-2018: Technical standard for security engineering
Status: Valid

GB 50348: Evolution and historical versions

Standard IDContents [version]USDSTEP2[PDF] delivered inStandard Title (Description)StatusPDF
GB 50348-2018English1229 Add to Cart 10 days [Need to translate] Technical standard for security engineering Valid GB 50348-2018
GB 50348-2004English140 Add to Cart 0--9 seconds. Auto-delivery Technical code for engineering of security and protection system Obsolete GB 50348-2004

PDF similar to GB 50348-2018


Standard similar to GB 50348-2018

GB 50516   GB/T 50312   GB 50339   GB 50346   

Basic data

Standard ID GB 50348-2018 (GB50348-2018)
Description (Translated English) Technical standard for security engineering
Sector / Industry National Standard
Classification of Chinese Standard P33;A90
Classification of International Standard 13.310; 91.040.10
Word Count Estimation 283,238
Date of Issue 2018-05-14
Date of Implementation 2018-12-01
Older Standard (superseded by this standard) GB 50348-2004
Quoted Standard GB 50057; GB 50198; GB 50311; GB 50312; GB/T 50319; GB/T 50326; GB 50343; GB 50464; GB/T 50525; GB/T 50719; GB 51158; GB 51204; GB/T 2828.1; GB 8702; GB/T 14549; GB/T 15211; GB/T 15408; GB 16796; GB/T 28181; GB/T 30148; JGJ 16; GA 1081; GA/T 1297; GA/T 14
Regulation (derived from) Ministry of Housing and Urban-Rural Development Announcement 2018 No. 84
Issuing agency(ies) Ministry of Housing and Urban-Rural Development of the People's Republic of China; State Administration for Market Regulation
Summary This standard is applicable to the construction of safety precautions for construction, reconstruction and expansion of new buildings, reconstructions and expansions, as well as system operation and maintenance.

GB 50348-2018: Technical standard for security engineering

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
1 General 1.0.1 In order to standardize the safety protection project construction procedures and project design, construction, supervision, inspection, acceptance, operation, maintenance and consulting services, improve the safety protection project construction quality and system operation and maintenance level, and protect personal safety and property safety, To maintain social security and stability, this standard is formulated. 1.0.2 This standard is applicable to the construction of safety protection engineering and system operation and maintenance of newly-built, rebuilt and expanded buildings (structures). 1.0.3 The construction of safety protection projects should be included in the overall planning of project construction, and be implemented simultaneously and independently checked and accepted according to factors such as its use function, safety protection management requirements and construction investment. 1.0.4 The construction of security protection projects should organically combine means such as human defense (personal defense), physical defense (material defense), and electronic defense (technical defense), through scientific and reasonable planning, design, construction, operation and maintenance, to build a A comprehensive prevention and control system that meets the requirements of security prevention management and has corresponding risk prevention capabilities. 1.0.5 All safety protection systems should have safety, reliability, maintainability and scalability, and be technologically advanced and economically applicable. 1.0.6 In the construction of security protection projects in special fields involving national security and state secrets, the relevant management requirements shall be followed, the security access mechanism shall be strictly enforced, and safe and controllable product equipment and professional design, construction and service teams that meet the requirements shall be selected 1.0.7 The construction of safety protection projects must comply with the provisions of relevant national laws and regulations. 1.0.8 The construction of safety protection engineering shall not only comply with this standard, but also comply with the provisions of relevant current national standards.

2 terms

2.0.1 Security protection security Comprehensive use of human defense, physical prevention, electronic prevention and other means to prevent, delay, and stop the occurrence of intrusion, theft, robbery, sabotage, explosion, violent attack and other incidents. 2.0.2 personnel protection Organized prevention, disposal and other safety management behaviors by personnel with corresponding qualities, referred to as civil air defense. 2.0.3 Physical protection Physical protection measures that use buildings (structures), barriers, appliances, equipment, or combinations thereof to delay or prevent risk events from occurring, also known as physical defense. 2.0.4 electronic security Using sensing, communication, computer, information processing and control, biometric identification and other technologies to improve the protection means of detection, delay and response ability, also known as technical defense. 2.0.5 security system security system For the purpose of safety, a prevention system composed of technologies such as physical protection and electronic protection is comprehensively used. 2.0.6 security engineering security engineering A construction project implemented to establish a security system. 2.0.7 physical protection system physical protection system For the purpose of safety protection, it is an entity system composed of natural barriers, artificial barriers, anti-theft locks, cabinets and other appliances and equipment. 2.0.8 electronic protection system electronic protection system A system composed of various electronic devices for the purpose of safety precautions. It usually includes subsystems such as intrusion and emergency alarm, video surveillance, entrance and exit control, parking garage (field) safety management, explosion-proof safety inspection, electronic inspection, building intercom, etc. 2.0.9 intrusion and hold-up alarm system (I Using sensor technology and electronic information technology to detect illegal entry or attempted illegal entry into the fortified area, and the electronic system that the user actively triggers the emergency alarm device to send alarm information and process the alarm information. 2.0.10 video surveillance system (VSS) An electronic system that uses video technology to detect and monitor monitoring areas and displays and records live video images in real time. 2.0.11 access control system (ACS) An electronic system that uses custom character recognition and/or biometrics and other pattern recognition technologies to identify entry and exit targets and controls the opening and closing of entry and exit actuators. 2.0.12 security management system in parking lots It is an electronic system that realizes comprehensive management of personnel and vehicles entering and exiting the parking garage (field), monitoring, and the safety of personnel and vehicles in the garage (field). 2.0.13 anti-explosion security inspection system An electronic system that detects and (or) alarms explosives, weapons and (or) other contraband carried by people and vehicles and carried by objects. 2.0.14 electronic inspection system guard tour system An electronic system that manages and controls the inspection routes, methods and processes of inspectors. 2.0.15 building intercom system It is an electronic system that uses (visual) intercom to confirm visitors, and controls and manages visitors at the entrances and exits of buildings (groups), also known as visitor intercom system. 2.0.16 security management platform (SMP) Integrate the subsystems and related information systems of the security protection system to realize the organic linkage of the physical protection system, the electronic protection system and human protection resources, the centralized processing and sharing of information, the comprehensive research and judgment of risk events, and the command and dispatch of event disposal A combination of hardware and software for unified management, operation and maintenance of systems and equipment. 2.0.17 Protected object protected object Objects that need to be protected due to risks include units, buildings (structures) and their internal and external parts, areas and specific targets. 2.0.18 high risk protected object high risk protected object Key units for public security and security and key targets for preventing terrorist attacks determined by law. 2.0.19 defense object defense object The object that needs to be guarded against and poses a threat to the protected object. 2.0.20 risk The potential safety hazards of the protected object itself and the threats it faces may be invaded, stolen, robbed, sabotaged, exploded, and violently attacked. 2.0.21 risk assessment risk assessment Through risk identification, risk analysis, and risk evaluation, the process of confirming the risks that the security system needs to prevent. 2.0.22 level of risk The magnitude of a single risk or a combined risk that exists in the protected object itself and its surroundings and poses a threat to its safety, expressed in a combination of consequences and possibilities. 2.0.23 level of protection The level of precautions taken to ensure the safety of protected objects. 2.0.24 security grade security grade The ability level of the security protection system and equipment to resist different attacks. 2.0.25 detection Perception of explicit risk events and (or) implicit risk events. 2.0.26 delay delay Prolong or (and) postpone the process of risk events. 2.0.27 response response Actions taken in response to the occurrence of a risk event. 2.0.28 false alarm false alarm An alert issued in response to an unplanned event. 2.0.29 leakage alarm There is no alarm response to a programmed alarm event. 2.0.30 perimeter perimeter The area boundary of the protected object. 2.0.31 zone zone In the protected area, the intrusion and emergency alarm system can detect intrusion or artificially trigger the area of the emergency alarm device. 2.0.32 Surveillance area The on-site spatial range corresponding to the image captured by the video acquisition device of the video surveillance system. 2.0.33 controlled area/protected area The spatial area enclosed by physical boundaries corresponding to one or more access control points of the access control system. 2.0.34 Longitudinal-depth protection According to the environmental conditions and security management requirements of the protected object, implement protective measures for the entire prevention area from outside to inside or from inside to outside. Defense in depth is divided into overall defense in depth and partial defense in depth. 2.0.35 balanced protection balanced protection The safety protection level of each part of the safety protection system is basically the same, and there is no obvious weak link. 2.0.36 Surveillance center The central control room, which receives and processes security system information, handles alarm events, and manages and controls system equipment, is usually divided into a duty area and an equipment area. 2.0.37 system operation system operation The process of using the security system to carry out alarm event handling, video surveillance, access control and other security activities. 2.0.38 system maintenance system maintenance Maintenance activities are carried out to ensure the normal operation of the safety protection system and to continuously exert the safety protection effectiveness. 2.0.39 system effectiveness evaluation system effectiveness evaluation The analysis and evaluation process of the safety protection system to meet the expected effectiveness.

3 Basic Regulations

3.0.1 Safety precaution engineering construction and system operation and maintenance should be managed throughout the life cycle and planned as a whole. The project construction procedures and requirements should be followed, the objectives of each stage should be determined, and the project construction, system operation and maintenance should be carried out in a planned and step-by-step manner. 3.0.2 The construction of safety protection engineering should follow the following principles. 1 Combination of human defense, material defense and technical defense, coordination of detection, delay and response; 2 The protection level of the protected object is compatible with the risk level; 3 The security level of the system and equipment is compatible with the object of protection and its attack means; 4 Satisfy the depth, balance and anti-vulnerability requirements of protection; 5 Meet the security and reliability requirements of the system; 6 Meet the electromagnetic compatibility and environmental adaptability requirements of the system; 7 Meet the real-time and original integrity requirements of the system; 8 To meet the requirements of system compatibility, scalability and maintainability; 1 The protection of the perimeter shall meet the following requirements. 1) Protective measures such as physical protection and (or) intrusion detection and (or) video surveillance should be reasonably selected according to the site environment and security management requirements; 2) The defense capabilities of different physical protection measures against different risks should be considered; 3) The detection capabilities of different intrusion detection equipment for different intrusion behaviors such as overturning, traversing, and digging, and the response capabilities of civil air defense after intrusion detection alarms should be considered; 4) The monitoring effect of video surveillance equipment on the perimeter environment should be considered, at least the activities of personnel in the perimeter environment should be able to be seen clearly. 2 The protection of entrances and exits shall meet the following requirements. 1) Protective measures such as physical protection and (or) access control and (or) intrusion detection and (or) video surveillance should be reasonably selected according to the on-site environment and security management requirements; 2) The defense capabilities of different physical protection measures against different risks should be considered; 3) Different types of reading technologies for entrance and exit control and their ability to defend against illegal intrusions (forcible entry, trailing entry, technical opening, etc.) should be considered; 4) The detection capabilities of different intrusion detection equipment for different intrusion behaviors such as overturning and traversing, as well as the response capabilities of civil air defense after intrusion detection alarms should be considered; 5) The monitoring effect of video surveillance equipment on entrances and exits should be considered. Usually, the facial features of people entering and exiting and the number plates of vehicles entering and exiting should be able to be clearly identified. 3 The protection of passageways and public areas shall comply with the following regulations. 1) Video monitoring should be selected, and the monitoring effect should be able to clearly see the traffic conditions of people, objects, and vehicles in the monitoring area; important points should clearly distinguish the facial features of the people and the license plate of the vehicle; 2) For passages and public areas around high-risk protected objects, intrusion detection and/or physical protection measures can be selected. 4 The protection of important areas and parts such as the monitoring center, financial room, and water, electrical, and heating equipment room should meet the following regulations. 1) Protective measures such as physical protection and (or) access control and (or) intrusion detection and (or) video surveillance should be reasonably selected according to the on-site environment and security management requirements; 2) Anti-theft doors and (or) anti-theft windows should be selected for physical protection. Other protective measures should consider the type of equipment selected and its ability to prevent illegal intrusion, response time after alarm, and monitoring effect of video surveillance. 5 The protection of the protection target shall comply with the following regulations. 1) Protective measures such as physical protection and (or) area intrusion detection and (or) displacement detection and (or) video surveillance should be reasonably selected according to the on-site environment and security management requirements; 2) Corresponding physical protection measures should be taken according to the specific conditions of different protection targets and the risks of confrontation;

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB 50348-2018_English be delivered?

Answer: Upon your order, we will start to translate GB 50348-2018_English as soon as possible, and keep you informed of the progress. The lead time is typically 6 ~ 10 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB 50348-2018_English with my colleagues?

Answer: Yes. The purchased PDF of GB 50348-2018_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to [email protected]. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.

Question 5: Should I purchase the latest version GB 50348-2018?

Answer: Yes. Unless special scenarios such as technical constraints or academic study, you should always prioritize to purchase the latest version GB 50348-2018 even if the enforcement date is in future. Complying with the latest version means that, by default, it also complies with all the earlier versions, technically.