Ultrasons - Transducteurs - Définitions et méthodes de mesure pour la focalisation des champs transm...
L'IEC 61828:2020
– donne les définitions des caractéristiques du champ transmis de transducteurs focalisants et non focalisants pour des applications ultrasonores médicales;
– établit la relation entre ces définitions et les descriptions théoriques, la conception et le mesurage des champs transmis par des transducteurs focalisants;
– donne des méthodes de mesure pour l'obtention de…
Intelligent transport systems — Information for emergency service support via personal ITS station —...
This document defines the use cases and general requirements for supporting emergency services via P-ITS-S. Any automotive-related service providers can refer to this document for developing eCall service systems into eCall non-supportive vehicles.
The P-ITS-S acts as a monitoring and data transmitting device which gathers a vehicle's speed, impact and airbag deployment signal to assess the…
Information technology - Automatic identification and data capture techniques - Direct Part Mark (DP...
This document is an engineering document intended for verifier manufacturers and application specification developers.
This document describes modifications to the symbol quality methodology defined in ISO/IEC 15415 and a symbology specification. It defines alternative illumination conditions, some new terms and parameters, modifications to the measurement and subsequent grading of certain…
Information technology — Automatic identification and data capture techniques — Direct Part Mark (DP...
This document is an engineering document intended for verifier manufacturers and application specification developers.
This document describes modifications to the symbol quality methodology defined in ISO/IEC 15415 and a symbology specification. It defines alternative illumination conditions, some new terms and parameters, modifications to the measurement and subsequent grading of certain…
Graphic technology — Image quality evaluation methods for printed matter — Part 31: Evaluation of th...
This document specifies the Contrast?Resolution test chart, the requirements on the printing process needed to reproduce this test chart, the required characteristics of a high resolution scanner needed to digitize the information reproduced on printed test charts, and the requirements on the interpretation of this digitized data. It also specifies the resolution-score method for evaluating the…
Information technology - Radio frequency identification for item management - RFID Emblem
This document specifies the design and use of the RFID Emblem: an easily identified visual guide that indicates the presence of radio frequency identification (RFID). It does not address the location of the RFID Emblem on a label. Specific placement requirements are left to application standards developers.
This document also specifies an RFID Index, which can be included in the RFID Emblem and…
Information technology — Radio frequency identification for item management — RFID Emblem
This document specifies the design and use of the RFID Emblem: an easily identified visual guide that indicates the presence of radio frequency identification (RFID). It does not address the location of the RFID Emblem on a label. Specific placement requirements are left to application standards developers.
This document also specifies an RFID Index, which can be included in the RFID Emblem and…
Blockchain and distributed ledger technologies — Security management of digital asset custodians
This document discusses the threats, risks, and controls related to:
— systems that provide digital asset custodian services and/or exchange services to their customers (consumers and businesses) and management of security when an incident occurs;
— asset information (including the signature key of the digital asset) that a custodian of digital assets manages.
This document is addressed…
Information security, cybersecurity and privacy protection — Physically unclonable functions — Part ...
This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs. Since it depends on the application which security requirements a PUF needs to meet, this documents also describes the typical use cases of a PUF.
Amongst PUF use cases,…
Information security, cybersecurity and privacy protection - Physically unclonable functions - Part ...
This document specifies the security requirements for physically unclonable functions (PUFs). Specified security requirements concern the output properties, tamper-resistance and unclonability of a single and a batch of PUFs. Since it depends on the application which security requirements a PUF needs to meet, this documents also describes the typical use cases of a PUF.
Amongst PUF use cases,…