Home Cart Quotation About-Us
www.ChineseStandard.net
SEARCH

GB 55029-2022 English PDF

US$1259.00 · In stock
Delivery: <= 8 days. True-PDF full-copy in English will be manually translated and delivered via email.
GB 55029-2022: (General specification for security engineering)
Status: Valid
Standard IDUSDBUY PDFLead-DaysStandard Title (Description)Status
GB 55029-20221259 Add to Cart 8 days (General specification for security engineering) Valid

Similar standards

GB 55031   GB 55030   

Basic data

Standard ID: GB 55029-2022 (GB55029-2022)
Description (Translated English): (General specification for security engineering)
Sector / Industry: National Standard
Word Count Estimation: 63,673
Date of Issue: 2022-03-10
Date of Implementation: 2022-10-01
Issuing agency(ies): Ministry of Housing and Urban-Rural Development of the People's Republic of China; State Administration for Market Regulation

GB 55029-2022: (General specification for security engineering)

---This is a DRAFT version for illustration, not a final translation. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.) will be manually/carefully translated upon your order.
1 General 1.0.1 This specification is formulated to standardize the construction of safety protection projects, the operation and maintenance of safety protection systems, improve the level of safety protection, protect personal safety and property safety, and maintain social security and stability. 1.0.2 Safety protection engineering must implement this specification. 1.0.3 Safety protection engineering construction, safety protection system operation and maintenance should follow the following principles. 1 Prevention is commensurate with risk; 2 Combination of human defense, physical defense and electronic defense, coordination of detection, delay and response; 3 Meet the requirements of protection in depth and balanced protection; 4 Meet the requirements for safe, reliable and stable operation of the security system. 1.0.4 Whether the technical methods and measures adopted in the project construction meet the requirements of this specification shall be judged by the relevant responsible parties. Among them, the innovative technical methods and measures should be demonstrated and meet the relevant performance requirements in this specification.

2 Basic regulations

2.0.1 The construction of safety protection projects and the operation and maintenance of safety protection systems should be coordinated and managed throughout the life cycle. 2.0.2 The safety protection system shall consist of a physical protection system and an electronic protection system, and shall meet the following requirements. 1 should choose to use natural barriers, artificial barriers, protective appliances (equipment), etc. to build physical protection systems; 2 Intrusion and emergency alarm system, video surveillance system, entrance and exit control system, parking garage (field) safety management system, safety inspection system, apartment intercom system, electronic inspection system, safety protection management platform, etc. should be selected to construct the electronic protection system. 2.0.3 The equipment and materials used in the safety protection system shall pass the inspection. 2.0.4 The security system and device login passwords should not be weak passwords, and there should be no network security loopholes and hidden dangers. When systems and devices based on different transmission networks are networked, corresponding network border security management measures should be taken. 2.0.5 Safety protection project construction, safety protection system operation and maintenance should implement safety and confidentiality responsibilities, and should have measures to protect state secrets, commercial secrets and personal privacy.

3 engineering design

3.1 Arming Design 2 should be equipped with communication equipment for internal and external communication; 3 An emergency alarm device shall be installed and be able to send alarm information to the outside; 4 When the duty area of the monitoring center and the equipment area are two independent physical areas and are not adjacent, protective measures should be taken for the transmission cables between the two areas; 5 In addition to complying with the provisions of paragraphs 1 to 3 of this article, the equipment area of the independent monitoring center shall also be equipped with intrusion detection and entrance and exit control devices. 3.1.10 The protection of the protection target should be based on the site environment and security management requirements, choose to set up physical protection, intrusion detection, displacement detection, video surveillance and other facilities. and should meet the following regulations. 1 Physical protection facilities should meet the requirements of different protection objectives against corresponding risks; 2 Intrusion detection, displacement detection and other devices should be able to detect intrusion behaviors approaching and moving protection targets; 3 The video surveillance area should cover the protection target, and the collected images should be able to clearly show the activities of people in the surveillance area; 4 When the protection target involves confidentiality or privacy protection needs; video surveillance should meet the requirements of confidentiality or privacy protection. 3.1.11 When it is necessary to check the safety of passers-by, objects, and vehicles, a safety inspection area shall be set up at or near the entrance and exit of the protected area, and corresponding safety inspection and disposal facilities shall be equipped. 3.1.12 Before designing the safety protection system for special environments such as flammable and explosive, hazard identification should be carried out, and equipment and deployment locations should be selected according to the type of hazardous location, and pipeline routing should be planned. 3.1.13 When the protected object is determined to be the key target of terrorist attacks, in addition to complying with the provisions of Articles 3.1.2 to 3.1.12 of this specification, one or more of the following protective measures shall be selected. 1 Strengthen perimeter defense measures; 2 Carry out security checks on people, objects, vehicles, etc. entering and leaving; 3 Pedestrian access gates, vehicle physical barriers, safety buffer zones, isolation areas, etc. are set up at important entrances and exits, aisles and passages; 4 Strengthen video surveillance and dynamic monitoring and early warning in densely populated areas; 5 The monitoring center and other important parts (areas) jointly set up physical protection and electronic protection facilities; 6 Take defensive measures against unmanned aerial vehicles; 7 Strengthen the allocation of human resources for prevention. 3.2 System Architecture Design 3.2.1 The subsystem composition, integration/network mode, transmission network, system management, storage mode, system power supply, interface protocol and other elements of the security protection system shall be determined in accordance with the principles of security, controllability, and openness and sharing. 3.2.2 The subsystems of the safety protection system shall be determined according to the site survey and risk prevention requirements and the deployment design. 3.2.3 One or more of the following system integration/networking methods should be selected according to the actual needs of sharing and exchanging various information resources and the complexity of the system. 1 Signal drive linkage between subsystem devices; 2 Protocol communication linkage between subsystems; 3 The security management platform integrates each subsystem; 4 Networking among security protection management platforms; 5 The security management platform is connected to other systems. 3.2.4 The security protection system for high-risk protected objects should use a dedicated transmission network. 3.2.5 The security management platform should have functions such as integrated management, information management, user management, equipment management, linkage control, monthly log management, and data statistics. 3.2.6 The storage mode shall be determined according to the needs of security system information storage and management. 3.2.7 The power supply mode and safeguard measures shall be determined according to the distribution characteristics of the security protection system and its equipment, power supply conditions and security guarantee requirements. 3.2.8.The system interface and information transmission, exchange, and control protocols should be determined according to the needs of security system integration/networking and information sharing applications. 3.3 Human precautions 3.3.1 Human defense resources should be allocated in comprehensive consideration of physical defense, electronic defense capabilities, normal system operation, and emergency response needs. 3.3.2 Personnel such as security guards, system check-in operation and maintenance shall be equipped, and technical and skill training shall be carried out for personnel in each position. 3.3.3 Necessary personal protection and confrontational equipment should be equipped. 3.3.4 Contingency plans should be formulated for possible public security and terrorist risk events, and drills should be organized. 3.4 Physical protection system design 3.4.1 The physical protection system design should be planned and synchronized with building site selection, architectural design, and landscape design. 3.4.2 The design of the physical protection system should aim at the risks that need to be prevented, and realize the corresponding protection capabilities such as deterrence, blocking, and delay through the design of perimeter physical protection, building (structure) structure design, and physical device design. 3.4.3 The perimeter physical protection design should meet the following requirements. 1 The type and location of the perimeter physical barrier should be determined according to the site conditions and the risks to be prevented; 2 When the protected object has the requirement to defend against explosive attacks, a physical barrier with corresponding protective capabilities should be selected, and the safe distance between the physical barrier and the protected object should be reasonably determined. 3 For the rivers passing through the perimeter, culverts, pipe corridors and other holes that can accommodate the objects to be protected, physical barriers should be set up for protection; 4 The type, specification, size, structural strength, and fixing method of the vehicle physical barrier at the perimeter entrance and exit should be determined according to the type, weight, speed and other factors of the guarding vehicle. 3.4.4 The design of buildings (structures) shall meet the following requirements. 1 The traffic flow design of the building (structure) site should be carried out, and the site and landscape should be used to form barriers, buffer zones, isolation zones, etc. 2 The storage places for flammable, explosive, poisonous, radioactive and other protected objects should be set up in concealed and far away from the crowd. 3 When the openings, pipe trenches, pipe corridors, ceilings, air ducts, trough boxes, pipes and other space dimensions of the high-risk protection object buildings (structures) can accommodate the entry of the protection objects, physical barriers or physical components should be used to close or block. 4 When the walls of buildings (structures) have explosion-proof requirements, explosion-proof structure design shall be carried out. When doors and windows have anti-theft, anti-explosion, anti-bullet, anti-smashing requirements, etc., corresponding protective measures should be adopted. 3.4.5 Corresponding physical devices should be configured according to the safety requirements of the protection target such as anti-theft, anti-peeping, anti-smashing, anti-prying, anti-bullet, and anti-explosion. 3.4.6 When setting up protective facilities with sharp edges that are likely to cause harm to the human body when touched, warning signs should be set up in the installation area. 3.5 Electronic protection system design 3.5.1 The design of the intrusion and emergency alarm system should be based on the risks that need to be prevented and the environmental conditions of the site. The corresponding equipment should be selected. The installation location and transmission route should be designed. Behavior detection and alarm function, and should meet the following requirements. 1 The system should accurately and timely detect the intrusion behavior and the triggering state of the emergency alarm device, and send out an alarm signal; 2.The intrusion detector and control indicating equipment shall have the tamper-proof alarm function; 3 When the alarm signal transmission cable is disconnected or short-circuited, and the power cord of the detector is cut off, the control indicating device should be able to send out an alarm signal; 4.The system should have parameter setting and user authority setting functions; 5.The system should have functions such as arming, disarming, bypass, and duress alarm; 6.The system should be able to accurately indicate alarm signals such as intrusion, emergency, tamper-proof, and fault; 7 The system should be able to record events such as operations, alarms and alarm handling, and cannot be changed; 8 The alarm response time of the single controller system should not exceed 2s; 9 The backup power supply should be able to guarantee the normal working time of the system for not less than 8 hours. 3.5.2 The design of the video surveillance system should select the corresponding equipment based on factors such as video image collection, target recognition and on-site environmental conditions. It is capable of video collection, transmission, processing, control, display, storage and playback of the monitoring area and targets. and other functions, and shall meet the following requirements. 1 The monitoring area of the system should effectively cover the protection area, parts and targets, and the monitoring effect should meet the needs of scene monitoring or target feature recognition; 2.The system should have the ability to control the front-end video acquisition equipment in real time or adjust the working status according to the authorization; 3 The system should have the ability to dispatch specified video signals to specified terminals in real time according to the authorization; 4 The system should be able to display all video images in the system in real time; 5 The storage time of video image information should not be less than 30d; 6 The system should have functions such as device management, user management and log management. 3.5.3 The design of the entrance and exit control system should be based on the safety management requirements of the passing objects entering and exiting each controlled area, and select the appropriate type of reading, control and execution equipment. It has the functions of credential identification and inspection, entry and exit authorization, control and management, and should meet the requirements of The following provisions. 1 The components installed outside the controlled area shall take tamper protection measures; 2.The entrance and exit control points of the evacuation passages shall meet the requirements that personnel can pass through without the certificate reading operation in emergency situations; 3 The entrance and exit control points opened after power failure should be equipped with backup power supply, and the normal working time of the actuator should be ensured for no less than 48 hours; 4 When the system shares credentials with other non-security business systems or the credentials are "one-card" application mode, the access control system should be managed independently; 5 The part of the connection cable of the actuator located outside the controlled area of the entrance and exit shall be enclosed and protected. 3.5.4 The design of the parking garage (field) safety management system should be based on the safety management requirements for vehicles entering and leaving the parking garage (field), select the appropriate type of reading, control and execution devices, and have the ability to identify, pass control and information on entering and exiting vehicles. recording and other functions, and shall meet the following requirements. 1.The system should be able to give an indication of whether the vehicle can pass through the reading of the vehicle; 2 The executive device should have the function of anti-smashing cars; 3 The executive device should have the function of manual opening in an emergency. 3.5.5 The design of the safety inspection system should be based on the safety management requirements of the protected objects for personnel, vehicles and prohibited and restricted items, select corresponding equipment, and be able to conduct safety inspections of personnel, objects and vehicles entering the protected unit or area, and check the prohibited and restricted items The function of detecting, displaying, alarming and recording the explosives, weapons, controlled instruments or other contraband carried by the vehicle, and shall meet the following requirements. 1 When selecting imaging-type human body security inspection equipment, protective processing measures should be taken for images of private parts of the human body; 2 When the micro-dose X-ray safety inspection equipment is working normally, the dose equivalent rate around the working position of the staff should not be greater than 0.5μSv/h; 3 The system should be equipped with explosion-proof disposal facilities. 3.5.6 The design of the building intercom system should be based on safety management requirements. Select intercom or visual intercom equipment. It has the functions of confirming the identity of the visitor through audio and video means, and controlling the opening and exit of the door lock. It should meet the following requirements. Regulations. 1 There should be a two-way intercom function between the visitor pager and the user receiver; 2 When the controlled door is opened for more than the preset time and the anti-tampering device of the visitor pager is triggered, an on-site warning message shall be issued. 3.5.7 The electronic inspection system should be able to supervise and manage the working status of personnel inspection according to the pre-compiled inspection plan, with functions such as inspection route, inspection time, inspection personnel setting and statistical reports. The online electronic inspection system should be able to report to the police in time for abnormal situations that do not conform to the inspection plan.

4 Engineering construction

4.0.1 The safety protection project should be constructed according to the detailed design documents 4.0.2 The incoming equipment and materials and their quality certification documents shall be inspected before construction, and shall be installed after passing the inspection. 4.0.3 Process acceptance should be carried out for concealed works; the next process can only be carried out after passing the acceptance. 4.0.4 The cable connection points, cable ends, cable inspection holes, branches, etc. of the safety protection project shall be uniformly numbered and permanently identified. 4.0.5 The installation of security equipment and laying of pipelines of cultural relics protection units shall take protection measures for the cultural relics itself and the style and appearance of cultural relics. 4.0.6 When installing safety protection equipment in flammable, explosive and other special environments, corresponding construction techniques shall be adopted according to the category of hazardous places. 4.0.7 "After the preliminary acceptance of the safety protection project is passed or the project rectification is completed, the system trial operation shall be carried out, and the time shall not be less than 30 days.

5 Engineering inspection and acceptance

5.0.1 The safety protection engineering of high-risk protection objects should be inspected. 5.0.2 During engineering inspection, the system function and performance shall be inspected. 5.0.3 After the completion of the project, the completion acceptance shall be organized, including construction acceptance, technical acceptance and data review. 5.0.4 The completion acceptance of the project should make the acceptance conclusion of the project qu......
Image     

Tips & Frequently Asked Questions:

Question 1: How long will the true-PDF of GB 55029-2022_English be delivered?

Answer: Upon your order, we will start to translate GB 55029-2022_English as soon as possible, and keep you informed of the progress. The lead time is typically 5 ~ 8 working days. The lengthier the document the longer the lead time.

Question 2: Can I share the purchased PDF of GB 55029-2022_English with my colleagues?

Answer: Yes. The purchased PDF of GB 55029-2022_English will be deemed to be sold to your employer/organization who actually pays for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. If you need your currency to be printed on the invoice, please write an email to Sales@ChineseStandard.net. In 2 working-hours, we will create a special link for you to pay in any currencies. Otherwise, follow the normal steps: Add to Cart -- Checkout -- Select your currency to pay.