Cards and security devices for personal identification - Contactless proximity objects - Part 4: Tra...
This document specifies a half-duplex block transmission protocol featuring the special needs of a contactless environment and defines the activation and deactivation sequence of the protocol.
This document is intended to be used in conjunction with other parts of ISO/IEC 14443 and is applicable to proximity cards or objects of Type A and Type B.
Printed electronics - Part 403-1: Printability - Requirements for reproducibility - Basic patterns f...
IEC 62899-403-1:2018(E) specifies commonly-utilized basic design patterns to evaluate printing machines with pattern reproducibility from the view point of printability in the field of printed electronics. These basic patterns consist of several evaluation patterns and register marks. Printability is derived from the evaluation of the reproducibility of these printed patterns produced by the…
Safety requirements for power electronic converter systems and equipment - Part 2: Power electronic ...
IEC 62477-2:2018 applies to power electronic converter systems (PECS) and equipment, their components for electronic power conversion and electronic power switching, including the means for their control, protection, monitoring and measurement, such as with the main purpose of converting electric power, with rated system voltages from 1 000 V AC or 1 500 V DC up to 36 kV AC or 54 kV DC.
This…
Exigences de sécurité applicables aux systèmes et matériels électroniques de conversion de puissance...
L'IEC 62477-2:2018 s'applique aux matériels et aux systèmes électroniques de conversion de puissance (SECP), à leurs composants pour la conversion de puissance électronique et la commande (ouverture et fermeture) électronique de puissance, y compris les moyens de commande, de protection, de surveillance et de mesure, ayant pour principale fonction la conversion de puissance électrique,…
Security aspects - Guidelines for their inclusion in publications
IEC GUIDE 120:2018 provides guidelines on the security topics to be covered in IEC publications, and aspects of how to implement them. These guidelines can be used as a checklist for the combination of publications used in implementation of systems.
This document includes what is often referred to as “cyber security”.
This document excludes non electrotechnical aspects of security such as…