2025-12-5 216.73.216.21
Code of China Chinese Classification Professional Classification ICS Classification Latest News Value-added Services

Position: Chinese Standard in English/GB 55029-2022
GB 55029-2022   General specification for safety prevention engineering (English Version)
Standard No.: GB 55029-2022 Status:valid remind me the status change

Email:

Target Language:English File Format:PDF
Word Count: 9500 words Translation Price(USD):285.0 remind me the price change

Email:

Implemented on:2022-10-1 Delivery: via email in 1~3 business day

→ → →

,,2022-10-1,16504448246370000e2ae4b5ee072b76
Standard No.: GB 55029-2022
English Name: General specification for safety prevention engineering
Chinese Name: 安全防范工程通用规范
Chinese Classification: A90;P33    
Professional Classification: GB    National Standard
Source Content Issued by: MOHURD
Issued on: 2022-03-10
Implemented on: 2022-10-1
Status: valid
Target Language: English
File Format: PDF
Word Count: 9500 words
Translation Price(USD): 285.0
Delivery: via email in 1~3 business day
1 general 1.0.1 to regulate the construction of security prevention projects, security systems operation and maintenance, improve the level of security, protection of personal safety and property security, and maintain social security and stability, the development of this specification. 1.0.2 security projects must be implemented to prevent the specification. 1.0.3 security prevention project construction. Security system operation and maintenance should follow the following principles: 1 prevention and risk-adapted. 2 human protection, physical protection, electronic protection combined, detection, delay, response coordination ; 3 to meet the requirements of deep protection, balanced protection. 4 to meet the security system to prevent safety, reliability and stability of operation requirements. 1.0.4 engineering construction of the technical methods and measures used to meet the requirements of this specification, by the rent off the responsible subject to determine. Among them, innovative technical methods and measures should be demonstrated and comply with the requirements of this specification on performance. 2. Basic provisions 2.0.1 security prevention project construction, security prevention system operation and maintenance should be the whole life cycle of coordinated management. 2.0.2 security system shall be composed of a physical protection system and electronic protection system, and shall comply with the following provisions: 1 should choose to use natural barriers, human river barriers, protective equipment (equipment), etc. to build a physical protection system; 2 should choose to intrusion and emergency alarm system, video surveillance system, population control system, parking garage (field) security management system, security inspection system building intercom system, electronic inspection system, security management platform to build electronic protection system. 2.0.3 security system using equipment, materials should be tested and qualified. 2.0.4 security systems and equipment login password should not be weak password, there should be no network security vulnerabilities and hidden dangers. When the systems and equipment based on different transmission networks networking, the corresponding network border security management measures should be taken. 2. 0.5 security project construction, security system operation and maintenance should be implemented to protect security responsibilities, should have the protection of state secrets, commercial secrets and personal privacy measures. 3. Engineering design 3.1 Arming design 3.1.1 security engineering design should be clear protection objects (including protection units, protection areas or parts, protection targets, etc.) and their security needs, to determine the need to prevent the risk. 3.1.2 security engineering design should be based on risk prevention requirements, to determine the protection points and systems, equipment functions, performance. High-risk protection objects should be designed to protect against security projects before the site survey. 3.1.3 perimeter protection should be based on the site environment and security management requirements, choose to set up physical protection, human intrusion detection, video surveillance and other facilities to effectively cover the area in need of protection, and should comply with the following provisions; 1 physical protection facilities should have the ability to block or delay the corresponding risk; 2 Human intrusion detection equipment should have the ability to detect one or more types of human intrusion such as climbing, overturning, digging, crossing, etc; 3 The images captured by the video surveillance device should clearly show the activities of the target of concern. 3.1.4 The protection of the population should be based on the site environment and security management requirements, the choice of physical protection, entrance and exit control, human intrusion detection, video surveillance and other facilities, and should comply with the following provisions: 1 in the premise of meeting the capacity, should reduce the number of people out of the perimeter. For entrances and exits connected to the perimeter and unattended, the protection capacity of the physical barrier shall be equivalent to that of the physical perimeter. 2 The population control device should be able to meet the requirements of target identification and access management, and should have the ability to prevent dismantling and technical opening. 3 The human intrusion detection equipment should have the ability to detect human intrusion at the entrance/exit area. 3.2 System architecture design 3.2.1 should be in accordance with the principle of safe and controlled open sharing, to determine the composition of the security system subsystems, integration / networking mode, transmission network. System management, storage mode, system power supply, interface protocols and other elements. . 3.2.2 should be based on the site survey and risk prevention requirements and arming design, to determine the subsystems of the security system. 3.2.3 should be based on the sharing of various types of information resources, the actual need for exchange and the complexity of the system, choose one or more of the following system integration / networking: 1 subsystem equipment between the signal-driven linkage; 2 protocol communication linkage between subsystems;. 3 security management platform for the integration of subsystems; 4 security management platform between the network: 5 security management platform and other systems networking. 3.2.4 high-risk protection object security system should use a dedicated transmission network. 3.2.5 security prevention management platform should have integrated management information management, user management, device management, linkage control, self-referencing management, data statistics and other functions. 3.2.6 security system should be based on the need for information storage and management, to determine the storage mode. 3.3 Human precautions 3.3.1 should take into account the physical prevention, electronic prevention capabilities and the normal operation of the system, the need for emergency response, human resources to prevent the configuration. 3.3.2 should be equipped with security, system duty operation and maintenance personnel, and should be technical and skills training for each position. 3.3.3 should be equipped with the necessary personal protection, confrontational equipment. 3.3.4 Contingency plans shall be formulated for possible security and terrorist risk events and drills shall be organised. 3.4 Design of physical protection systems 3.4.1 The design of the physical protection system should be planned and synchronised with the building site selection, architectural design and landscape design. 3.4.2 The design of the physical protection system shall be tailored to the risk to be prevented, through the design of the physical protection of the perimeter, the design of the building (structure) and the design of the physical device, to achieve the corresponding deterrence, deterrence, delay and other protective capabilities. 3.4.3 The design of physical protection of the perimeter shall comply with the following provisions: 1 The type and location of the perimeter physical barrier shall be determined according to the site conditions and the risk to be guarded against; 2 When the object of protection requires protection against blast attack, physical barriers with corresponding protection capabilities shall be selected and the safety distance between the physical barriers and the object of protection shall be reasonably determined; 3 Physical barriers shall be provided for protection in rivers that cross the perimeter and in culverts, corridors and other holes that can accommodate the entry of the protected object; 4 The type, size, structural strength and fixing method of the physical barrier for vehicles leaving the perimeter shall be determined according to the type, weight and speed of the guarded vehicles. 3.4.4 The design of the building (structure) shall comply with the following provisions: 1 The traffic flow design of the building (structure) site shall be carried out, and the site and landscape shall be used to form barriers, buffer zones, isolation zones, etc. 2 flammable, explosive, toxic, radioactive and other protection objectives of the storage site should be set in a hidden and away from the crowd location. 3 When the high-risk protection target building (structure) building holes, ducts, duct corridors, ceiling, air ducts, slot boxes, pipes and other space size can accommodate the prevention of object access, should be used to close or block the physical barrier or physical components. 4 When the walls of the building (structure) have explosion-proof requirements, explosion-proof structure design should be carried out. Design. When doors and windows have requirements for burglary, explosion, bullet and smash protection, corresponding protective measures shall be used. 3.4.5 According to the security requirements of the protection target, such as anti-theft, anti-snooping, anti-smashing, anti-pry, anti-bombing, anti-explosion, etc., the corresponding physical devices shall be configured. 3.5 Design of electronic protection systems 3.5.1 The design of the human intrusion and emergency alarm system should be based on the risks to be prevented and the environmental conditions of the site and other factors, the selection of the appropriate equipment, the design of the installation location and transmission routing, with the concealed entry, forced intrusion and prying. Digging, chiseling and other human intrusion detection and alarm functions, and shall comply with the following provisions: 1 The system shall accurately and timely detect human intrusion and emergency alarm device trigger status and issue alarm signals; 2 Human intrusion detectors and control indicating devices should have anti-tampering alarm function; 3 When the alarm signal transmission cable is broken or short-circuited, or the detector power line is cut off, the control indication equipment shall be able to 3 When the alarm signal transmission cable is broken or short-circuited, or the power line of the detector is cut off, the control indication equipment shall be able to send out an alarm signal 4 The system shall have the function of parameter setting and user authority setting; 5 The system shall have the functions of setting, disarming, bypassing, duress alarm, etc; 6 system should be able to human intrusion, emergency, anti-demolition, fault and other alarm signal accurate instructions; 7 system should be able to record the operation, alarm and alarm handling events, and can not be changed 8 single controller system alarm response time should not exceed 2s; 9 backup power supply should be able to ensure that the normal working time of the system is not less than 8h. 3.5.2 video surveillance system design should be based on video image acquisition, target identification needs and site environmental conditions and other factors, select the appropriate equipment, with monitoring areas and targets for video capture, transmission, processing, control, display, storage and playback and other functions, and should comply with the following provisions: 1 The monitoring area of the system should effectively cover the protection area. Part and target, the monitoring effect should meet the needs of scene monitoring or target feature recognition; 2 The system shall have the ability to control the front-end video capture equipment in real time or to adjust the working status in accordance with the authorization. 4 Engineering construction 4.0.1 security prevention projects should be constructed in accordance with the deepening design documents. 4.0.2 should check the incoming equipment and materials and their quality certification documents before construction, and should be installed after passing the inspection. 4.0.3 concealed works should be process acceptance, acceptance before the next process. 5 Project inspection and acceptance. 5.0.1 high-risk protection of the object of security works should be inspected. 5.0.2 engineering inspection, the system should be functional, performance and other tests. 5.0.3 completion of the project should be organized after the completion of acceptance, including construction acceptance, technical acceptance and data review. 5.0.4 The completion inspection of the project shall make an acceptance conclusion on the quality of the project. 6 System operation and maintenance 6.0.1 security works completed after the handover, security systems should be carried out to prevent the operation and maintenance work. 6.0.2 security systems should be developed to run and maintain the program, the establishment of personnel, funding, systems and technical support, including operation and maintenance of the security system 6.0.3 system operation should confirm the operational content, the preparation of operational guidance documents, the development of daily management, duty, on-site disposal. Security and confidentiality, training and assessment systems. 6.0.4 At the same time to receive emergency alarms from the monitoring centre and the police centre of the public security authorities, the duty officer of the monitoring centre should verify whether the public security authorities have received the alarm information.
1 general 2. Basic provisions 3. Engineering design 4 Engineering construction 5 Project inspection and acceptance. 6 System operation and maintenance
Code of China
Standard
GB 55029-2022  General specification for safety prevention engineering (English Version)
Standard No.GB 55029-2022
Statusvalid
LanguageEnglish
File FormatPDF
Word Count9500 words
Price(USD)285.0
Implemented on2022-10-1
Deliveryvia email in 1~3 business day
Detail of GB 55029-2022
Standard No.
GB 55029-2022
English Name
General specification for safety prevention engineering
Chinese Name
安全防范工程通用规范
Chinese Classification
A90;P33
Professional Classification
GB
ICS Classification
Issued by
MOHURD
Issued on
2022-03-10
Implemented on
2022-10-1
Status
valid
Superseded by
Superseded on
Abolished on
Superseding
Language
English
File Format
PDF
Word Count
9500 words
Price(USD)
285.0
Keywords
GB 55029-2022, GB/T 55029-2022, GBT 55029-2022, GB55029-2022, GB 55029, GB55029, GB/T55029-2022, GB/T 55029, GB/T55029, GBT55029-2022, GBT 55029, GBT55029
Introduction of GB 55029-2022
1 general 1.0.1 to regulate the construction of security prevention projects, security systems operation and maintenance, improve the level of security, protection of personal safety and property security, and maintain social security and stability, the development of this specification. 1.0.2 security projects must be implemented to prevent the specification. 1.0.3 security prevention project construction. Security system operation and maintenance should follow the following principles: 1 prevention and risk-adapted. 2 human protection, physical protection, electronic protection combined, detection, delay, response coordination ; 3 to meet the requirements of deep protection, balanced protection. 4 to meet the security system to prevent safety, reliability and stability of operation requirements. 1.0.4 engineering construction of the technical methods and measures used to meet the requirements of this specification, by the rent off the responsible subject to determine. Among them, innovative technical methods and measures should be demonstrated and comply with the requirements of this specification on performance. 2. Basic provisions 2.0.1 security prevention project construction, security prevention system operation and maintenance should be the whole life cycle of coordinated management. 2.0.2 security system shall be composed of a physical protection system and electronic protection system, and shall comply with the following provisions: 1 should choose to use natural barriers, human river barriers, protective equipment (equipment), etc. to build a physical protection system; 2 should choose to intrusion and emergency alarm system, video surveillance system, population control system, parking garage (field) security management system, security inspection system building intercom system, electronic inspection system, security management platform to build electronic protection system. 2.0.3 security system using equipment, materials should be tested and qualified. 2.0.4 security systems and equipment login password should not be weak password, there should be no network security vulnerabilities and hidden dangers. When the systems and equipment based on different transmission networks networking, the corresponding network border security management measures should be taken. 2. 0.5 security project construction, security system operation and maintenance should be implemented to protect security responsibilities, should have the protection of state secrets, commercial secrets and personal privacy measures. 3. Engineering design 3.1 Arming design 3.1.1 security engineering design should be clear protection objects (including protection units, protection areas or parts, protection targets, etc.) and their security needs, to determine the need to prevent the risk. 3.1.2 security engineering design should be based on risk prevention requirements, to determine the protection points and systems, equipment functions, performance. High-risk protection objects should be designed to protect against security projects before the site survey. 3.1.3 perimeter protection should be based on the site environment and security management requirements, choose to set up physical protection, human intrusion detection, video surveillance and other facilities to effectively cover the area in need of protection, and should comply with the following provisions; 1 physical protection facilities should have the ability to block or delay the corresponding risk; 2 Human intrusion detection equipment should have the ability to detect one or more types of human intrusion such as climbing, overturning, digging, crossing, etc; 3 The images captured by the video surveillance device should clearly show the activities of the target of concern. 3.1.4 The protection of the population should be based on the site environment and security management requirements, the choice of physical protection, entrance and exit control, human intrusion detection, video surveillance and other facilities, and should comply with the following provisions: 1 in the premise of meeting the capacity, should reduce the number of people out of the perimeter. For entrances and exits connected to the perimeter and unattended, the protection capacity of the physical barrier shall be equivalent to that of the physical perimeter. 2 The population control device should be able to meet the requirements of target identification and access management, and should have the ability to prevent dismantling and technical opening. 3 The human intrusion detection equipment should have the ability to detect human intrusion at the entrance/exit area. 3.2 System architecture design 3.2.1 should be in accordance with the principle of safe and controlled open sharing, to determine the composition of the security system subsystems, integration / networking mode, transmission network. System management, storage mode, system power supply, interface protocols and other elements. . 3.2.2 should be based on the site survey and risk prevention requirements and arming design, to determine the subsystems of the security system. 3.2.3 should be based on the sharing of various types of information resources, the actual need for exchange and the complexity of the system, choose one or more of the following system integration / networking: 1 subsystem equipment between the signal-driven linkage; 2 protocol communication linkage between subsystems;. 3 security management platform for the integration of subsystems; 4 security management platform between the network: 5 security management platform and other systems networking. 3.2.4 high-risk protection object security system should use a dedicated transmission network. 3.2.5 security prevention management platform should have integrated management information management, user management, device management, linkage control, self-referencing management, data statistics and other functions. 3.2.6 security system should be based on the need for information storage and management, to determine the storage mode. 3.3 Human precautions 3.3.1 should take into account the physical prevention, electronic prevention capabilities and the normal operation of the system, the need for emergency response, human resources to prevent the configuration. 3.3.2 should be equipped with security, system duty operation and maintenance personnel, and should be technical and skills training for each position. 3.3.3 should be equipped with the necessary personal protection, confrontational equipment. 3.3.4 Contingency plans shall be formulated for possible security and terrorist risk events and drills shall be organised. 3.4 Design of physical protection systems 3.4.1 The design of the physical protection system should be planned and synchronised with the building site selection, architectural design and landscape design. 3.4.2 The design of the physical protection system shall be tailored to the risk to be prevented, through the design of the physical protection of the perimeter, the design of the building (structure) and the design of the physical device, to achieve the corresponding deterrence, deterrence, delay and other protective capabilities. 3.4.3 The design of physical protection of the perimeter shall comply with the following provisions: 1 The type and location of the perimeter physical barrier shall be determined according to the site conditions and the risk to be guarded against; 2 When the object of protection requires protection against blast attack, physical barriers with corresponding protection capabilities shall be selected and the safety distance between the physical barriers and the object of protection shall be reasonably determined; 3 Physical barriers shall be provided for protection in rivers that cross the perimeter and in culverts, corridors and other holes that can accommodate the entry of the protected object; 4 The type, size, structural strength and fixing method of the physical barrier for vehicles leaving the perimeter shall be determined according to the type, weight and speed of the guarded vehicles. 3.4.4 The design of the building (structure) shall comply with the following provisions: 1 The traffic flow design of the building (structure) site shall be carried out, and the site and landscape shall be used to form barriers, buffer zones, isolation zones, etc. 2 flammable, explosive, toxic, radioactive and other protection objectives of the storage site should be set in a hidden and away from the crowd location. 3 When the high-risk protection target building (structure) building holes, ducts, duct corridors, ceiling, air ducts, slot boxes, pipes and other space size can accommodate the prevention of object access, should be used to close or block the physical barrier or physical components. 4 When the walls of the building (structure) have explosion-proof requirements, explosion-proof structure design should be carried out. Design. When doors and windows have requirements for burglary, explosion, bullet and smash protection, corresponding protective measures shall be used. 3.4.5 According to the security requirements of the protection target, such as anti-theft, anti-snooping, anti-smashing, anti-pry, anti-bombing, anti-explosion, etc., the corresponding physical devices shall be configured. 3.5 Design of electronic protection systems 3.5.1 The design of the human intrusion and emergency alarm system should be based on the risks to be prevented and the environmental conditions of the site and other factors, the selection of the appropriate equipment, the design of the installation location and transmission routing, with the concealed entry, forced intrusion and prying. Digging, chiseling and other human intrusion detection and alarm functions, and shall comply with the following provisions: 1 The system shall accurately and timely detect human intrusion and emergency alarm device trigger status and issue alarm signals; 2 Human intrusion detectors and control indicating devices should have anti-tampering alarm function; 3 When the alarm signal transmission cable is broken or short-circuited, or the detector power line is cut off, the control indication equipment shall be able to 3 When the alarm signal transmission cable is broken or short-circuited, or the power line of the detector is cut off, the control indication equipment shall be able to send out an alarm signal 4 The system shall have the function of parameter setting and user authority setting; 5 The system shall have the functions of setting, disarming, bypassing, duress alarm, etc; 6 system should be able to human intrusion, emergency, anti-demolition, fault and other alarm signal accurate instructions; 7 system should be able to record the operation, alarm and alarm handling events, and can not be changed 8 single controller system alarm response time should not exceed 2s; 9 backup power supply should be able to ensure that the normal working time of the system is not less than 8h. 3.5.2 video surveillance system design should be based on video image acquisition, target identification needs and site environmental conditions and other factors, select the appropriate equipment, with monitoring areas and targets for video capture, transmission, processing, control, display, storage and playback and other functions, and should comply with the following provisions: 1 The monitoring area of the system should effectively cover the protection area. Part and target, the monitoring effect should meet the needs of scene monitoring or target feature recognition; 2 The system shall have the ability to control the front-end video capture equipment in real time or to adjust the working status in accordance with the authorization. 4 Engineering construction 4.0.1 security prevention projects should be constructed in accordance with the deepening design documents. 4.0.2 should check the incoming equipment and materials and their quality certification documents before construction, and should be installed after passing the inspection. 4.0.3 concealed works should be process acceptance, acceptance before the next process. 5 Project inspection and acceptance. 5.0.1 high-risk protection of the object of security works should be inspected. 5.0.2 engineering inspection, the system should be functional, performance and other tests. 5.0.3 completion of the project should be organized after the completion of acceptance, including construction acceptance, technical acceptance and data review. 5.0.4 The completion inspection of the project shall make an acceptance conclusion on the quality of the project. 6 System operation and maintenance 6.0.1 security works completed after the handover, security systems should be carried out to prevent the operation and maintenance work. 6.0.2 security systems should be developed to run and maintain the program, the establishment of personnel, funding, systems and technical support, including operation and maintenance of the security system 6.0.3 system operation should confirm the operational content, the preparation of operational guidance documents, the development of daily management, duty, on-site disposal. Security and confidentiality, training and assessment systems. 6.0.4 At the same time to receive emergency alarms from the monitoring centre and the police centre of the public security authorities, the duty officer of the monitoring centre should verify whether the public security authorities have received the alarm information.
Contents of GB 55029-2022
1 general 2. Basic provisions 3. Engineering design 4 Engineering construction 5 Project inspection and acceptance. 6 System operation and maintenance
About Us   |    Contact Us   |    Terms of Service   |    Privacy   |    Cancellation & Refund Policy   |    Payment
Tel: +86-10-8572 5655 | Fax: +86-10-8581 9515 | Email: coc@codeofchina.com | QQ: 672269886
Copyright: Beijing COC Tech Co., Ltd. 2008-2040
 
 
Keywords:
GB 55029-2022, GB/T 55029-2022, GBT 55029-2022, GB55029-2022, GB 55029, GB55029, GB/T55029-2022, GB/T 55029, GB/T55029, GBT55029-2022, GBT 55029, GBT55029