Essais relatifs aux risques du feu - Partie 2-10: Essais au fil incandescent/chauffant - Appareillag...
L'IEC 60695-2-10:2021 spécifie l’appareillage et la méthode commune d’essai au fil incandescent pour simuler l’effet de contraintes thermiques qui peuvent être produites par des sources de chaleur telles que des éléments incandescents ou des résistances surchargées, sur de courtes durées, afin d’évaluer de façon simulée les dangers d’incendie. La méthode d’essai décrite dans le présent…
This document specifies electrical safety requirements for voltage class B electric circuits of electric propulsion systems and conductively connected auxiliary electric systems of electrically propelled road vehicles.
It specifies electrical safety requirements for protection of persons against electric shock and thermal incidents.
It does not provide comprehensive safety information for…
Information technology — Determination of chemical emission rates from electronic equipment — Part 1...
This document (all parts) specifies methods to determine chemical emission rates of analytes from ICT & CE equipment during intended operation in an Emission Test Chamber (ETC).
This document (all parts) includes specific methods for equipment using consumables, such as printers, and equipment not using consumables, such as monitors and PC’s.
Part 1 specifies the methods to determine the…
Photovoltaic devices - Procedures for temperature and irradiance corrections to measured I-V charact...
IEC 60891:2021 defines procedures to be followed for temperature and irradiance corrections to the measured I-V (current-voltage) characteristics (also known as I-V curves) of photovoltaic (PV) devices. It also defines the procedures used to determine factors relevant to these corrections. Requirements for I-V measurement of PV devices are laid down in IEC 60904-1 and its relevant subparts.
This…
Dispositifs photovoltaïques - Procédures pour les corrections en fonction de la température et de l&...
IEC 60891:2021 définit des procédures à suivre pour les corrections en fonction de la température et de l'éclairement appliquées aux caractéristiques I-V (courant-tension) mesurées (également appelées courbes I-V) des dispositifs photovoltaïques (PV). Il définit également les procédures utilisées pour déterminer les facteurs appropriés pour ces corrections. Les exigences pour le mesurage I-V…
Traceability of rare earths in the supply chain from mine to separated products
This document specifies requirements for, and gives guidance on, the design and use of a traceability system in a rare earth supply chain. It specifies the information to be recorded by supply chain businesses for rare earth materials or products passing through the supply chain from mine to separated products.
Information security — Key management — Part 3: Mechanisms using asymmetric techniques
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data…
Information technology — Coded representation of immersive media — Part 17: Reference software and c...
This document specifies the conformance and reference software for omnidirectional media format (specified in ISO/IEC 23090‑2). This document describes the reference software modules and the features that is supports. It also provides a description of how the reference software can be utilized.
In addition, the document lists and describes test vectors comprising ISO base media file format files…
Information technology - Coded representation of immersive media - Part 17: Reference software and c...
This document specifies the conformance and reference software for omnidirectional media format (specified in ISO/IEC 23090‑2). This document describes the reference software modules and the features that is supports. It also provides a description of how the reference software can be utilized.
In addition, the document lists and describes test vectors comprising ISO base media file format files…
Information security - Key management - Part 3: Mechanisms using asymmetric techniques
This document defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals.
a) Establish a shared secret key for use in a symmetric cryptographic technique between two entities A and B by key agreement. In a secret key agreement mechanism, the secret key is computed as the result of a data…