ISO-TR-15067-4-2001.pdf

上传人:哈尼dd 文档编号:3779933 上传时间:2019-09-23 格式:PDF 页数:18 大小:647.89KB
返回 下载 相关 举报
ISO-TR-15067-4-2001.pdf_第1页
第1页 / 共18页
ISO-TR-15067-4-2001.pdf_第2页
第2页 / 共18页
ISO-TR-15067-4-2001.pdf_第3页
第3页 / 共18页
ISO-TR-15067-4-2001.pdf_第4页
第4页 / 共18页
ISO-TR-15067-4-2001.pdf_第5页
第5页 / 共18页
亲,该文档总共18页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《ISO-TR-15067-4-2001.pdf》由会员分享,可在线阅读,更多相关《ISO-TR-15067-4-2001.pdf(18页珍藏版)》请在三一文库上搜索。

1、TECHNICAL REPORT ISOIIEC TR 15067-4 First edition 2001 -06 INFORMATION TECHNOLOGY - HOME ELECTRONIC SYSTEM (HES) APPLICATION MOD EL Part 4: Security system for HES Reference number ISOAEC TR 15067-42001 (E) Copyright International Organization for Standardization Provided by IHS under license with I

2、SO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 04:55:43 MDTNo reproduction or networking permitted without license from IHS -,-,- TECHNICAL REPORT ISOIIEC TR 1506714 First edition 2001 -06 INFORMATION TECHNOLOGY - HOME ELECTRONIC SYSTEM (HES) APPLICATION MODEL Part 4: S

3、ecurity system for HES O ISO/IEC 2001 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the publisher. ISOAEC Copyr

4、ight Office Case postale 56 CH-121 1 Genve 20 Switzerland PRICECODE H For price, see current catalogue Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 04:55:43 MDTNo reproduction

5、 or networking permitted without license from IHS -,-,- 2 CONTENTS TR 15067-4 O ISO/IEC:2001 (E) Page FOREWORD 3 INTRODUCTION 5 1 Scope 6 2 A typical security system 6 2.1 Modes of operation . 6 2.1.1 Intrusion detection . 6 2.1.2 Restricted movement sensing 6 2.1.3 Activity monitoring . 6 2.1.4 Dur

6、ess notification . 7 2.1.5 Safety monitoring 7 Components of a security system . 7 2.2.1 Sensors 8 2.2.2 Control panels . 9 2.2.3 Security system controller 9 2.2.4 Alarms 10 The HES security system model . 10 3.1 Physical model 10 3.1.1 Fully HES compatible 10 3.1.2 Partial HES compatible 10 3.1.3

7、Isolated network 11 3.2 Logical model 13 3.3 Message flows 15 Sensors c-) Zone control 15 Zone control +-+ Partition control 15 Partition control + Alarm . 16 Partition control e External . 16 2.2 3 3.3.1 3.3.2 3.3.3 3.3.4 . Copyright International Organization for Standardization Provided by IHS un

8、der license with ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 04:55:43 MDTNo reproduction or networking permitted without license from IHS -,-,- TR 15067-4 O ISO/IEC:2001 (E) 3 INFORMATION TECHNOLOGY - HOME ELECTRONIC SYSTEM (HES) APPLICATION MODEL Part 4: Security s

9、ystem for HEC FOREWORD 1) IS0 (International Organization for Standardization) and IEC (International Electrotechnical Commission) form the specialized system for worldwide standardization. National bodies that are members of IS0 or IEC participate in the development of International Standards throu

10、gh technical committees established by the respective organization to deal with particular fields of technical activity. IS0 and IEC technical committees collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental, in liaison with IS0 and IEC, also

11、take part in the work. 2) In the field of information technology, IS0 and IEC have established a joint technical committee, ISOiIEC JTC 1. Draft International Standards adopted by the joint technical committee are circulated to national bodies for voting. Publication as an International Standard req

12、uires approval by at least 75 % of the national bodies casting a vote. 3) Attention is drawn to the possibility that some of the elements of this Technical Report may be the subject of patent rights. IS0 and IEC shall not be held responsible for identifying any or all such patent rights. The main ta

13、sk of IEC and IS0 technical committees is to prepare International Standards. In exceptional circumstances, a technical committee may propose the publication of a technical report of one of the following types: 0 type 1, when the required support cannot be obtained for the publication of an Internat

14、ional Standard, despite repeated efforts; 0 type 2, when the subject is still under technical development or where, for any other reason, there is the future but not immediate possibility of an agreement on an International Standard; type 3, when the technical committee has collected data of a diffe

15、rent kind from that which is normally published as an International Standard, for example state of the art. Technical reports of types 1 and 2 are subject to review within three years of publication to decide whether they can be transformed into International Standards. Technical reports of type 3 d

16、o not necessarily have to be reviewed until the data they provide are considered to be no longer valid or useful. 0 ISO/IEC 15067, which is a technical report of type 3, was prepared by subcommittee 25: Iriterconnection of information technology equipment, of ISO/IEC joint technical committee 1 : In

17、formation technology. This publication has been drafted in accordance with ISO/IEC directives, Part 3. This document is not to be regarded as an International Standard. It is proposed for provisional application so that information and experience of its use in practice may be gathered. Comments on t

18、he content of this document should be sent to IEC Central Office. Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 04:55:43 MDTNo reproduction or networking permitted without lice

19、nse from IHS -,-,- 4 TR 15067-4 O ISO/IEC:2001(E) Technical Report ISO/IEC TR 15067 currently consists of four parts: - - - - Part 7: Application services and protocol (under consideration) Part 2: Lighting model for HES Part 3: Model of an energy management system for HES (under consideration) Part

20、 4: Model of a security system for HES Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 04:55:43 MDTNo reproduction or networking permitted without license from IHS -,-,- TR 15067

21、-4 O ISO/IEC:2001 (E) 5 INTRODUCTION This model of a security system for residences extends the set of HES (Home Electronic System) application models. ISO/IEC JTC 1/SC 25, WG 1 has already developed and SC 25 has accepted models for lighting and energy management. These models are intended to facil

22、itate validation of the language being specified for HES in ISO/IEC TR 15067-1: Information technology - Home Electronic System (HES) application model - Application services and protocol. These models have been developed to foster interoperability among products from competing or complementary manu

23、facturers. Product interoperability is essential when using home control standards, such as HES. This Technical Report defines a typical security system and describes the communications services needed. A high-level model for a security system using HES is presented. Copyright International Organiza

24、tion for Standardization Provided by IHS under license with ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 04:55:43 MDTNo reproduction or networking permitted without license from IHS -,-,- 6 TR 15067-4 O ISO/IEC:2001 (E) IN FORMATION TECHNO LO GY - HOME ELECTRONIC SYS

25、TEM (HES) APPLICATION MODEL Part 4: Security system for HES 1 Scope Residential security systems are among the most popular applications in a home automation system. This model is intended to be generic. It is applicable to a wide variety of security functions that extend well-beyond traditional int

26、rusion detection. Potential applications of home security as represented in this model include activity monitoring, duress monitoring, and safety monitoring of personal well-being. The intrusion and safety applications of a security system are similar for commercial buildings. This generic model can

27、 therefore be extended to commercial building security functions. 2 A typical security system 2.1 Modes of operation A modern security system provides more than detection of unauthorized entry into a building. The range of applications of a security system spans: 2.1.1 Intrusion detection Sensor dev

28、ices are installed to detect intrusion at particular locations in a building. The sensor types are described in 2.2.1. Sensors are connected to a security controller that is programmed with various algorithms. When a sensor is armed and tripped, the controller may sound an audible alarm locally and/

29、or may issue a notification to a remote site, for example via telephone. The activation of the controller and choice of algorithm depends on user inputs from one or more control panels (user interfaces). 2.1.2 Restricted movement sensing Typically, this mode of operating a security system is chosen

30、when the occupants are sleeping. Sensors at the perimeter of the house and in selected rooms are armed. Activity and movement in the bedroom will not trip the alarm. Therefore, one or more motion detectors in the bedroom and possikly some window sensors are not monitored. All other sensors are monit

31、ored as for intrusion detection. 2.1.3 Activity monitoring This is a relatively new application of a security system. The system is specifically programmed to alert a monitoring station or place a call to a family member upon the absence of internal motion. Examples where this scheme i s used includ

32、e: 2.1.3.1 Elderly person monitoring The objective is to determine if the person is moving about the house while home. The absence of motion over a period of an hour or two when the person is not expected to be sleeping might indicate that the person needs help. Copyright International Organization

33、for Standardization Provided by IHS under license with ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 04:55:43 MDTNo reproduction or networking permitted without license from IHS -,-,- TR 15067-4 O ISO/IEC:2001(E) 7 2.1.3.2 Latch-key child The term latch-key child desc

34、ribes a young child who returns from school to an empty house because both parents are working. The child carries a key to the house, called the latch-key. Upon returning home from school, the child enters a unique security code, different from the one the parents use. This sets the system to call a

35、 parent at work when the child enters the house. Alternatively, the system might be programmed to alert the parents if the child has not returned home on time. 2.1.4 Duress notification 2.1.4.1 Panic alarm Many security systems provide panic switches that are wall mounted in one or more locations. I

36、f under duress or physical threat, the occupant can issue an alert through the security system by operating this switch. A special duress notification is sent to the monitoring station. 2.1.4.2 Medical alert An adjunct to a security system might be a pendant switch worn by an ill, disabled, or elder

37、ly person. When a switch on this pendant is pressed, an alert is issued to summon medical help. 2.1.4.3 Forced disarm A forced disarm might be a situation where the occupant is forced under threat of physical assault to enter the house with an aggressor and warned not to trip the security system. So

38、me security systems offer a method of disarming a security system and simuitaneously indicating silently that this action was done under force. A special disarm code is entered into the security control panel. 2.1.5 Safety monitoring 2.1.5.1 Fire Among the system sensors might be smoke and heat dete

39、ctors to monitor for fire. Whether a safety system and security system are embodied in one network may depend on local fire codes. Such codes may differ between residential and commercial buildings. 2.1 S.2 Environmental pollutants Monitors for environmental pollutants may be installed in heavily-in

40、sulated buildings or as part of a safety system when using gas for heating or cooking. The security system might link to the ventilation system to clear any accumulating gases, such as carbon dioxide, carbon monoxide, or oxides of nitrogen. 2.1 S.3 Water leaks This may include pipe breaks, seepage,

41、or building sprinkler activation. 2.1 S.4 This may be offered in climates with extreme temperatures or in commercial establishments selling or manufacturing perishable products. 2.1 5 5 Earthquake 2.1.5.6 Machinery failure 2.2 In early-developed security systems, many sensors were wired in a series

42、loop from the controller. The sensors were normally closed. Each series loop is called a zone. If any one sensor in a series loop opened, the controller issued an alarm and possibly indicated which zone had a tripped sensor. However, it was not possible to determine which sensor in the loop tripped.

43、 Over or under temperature Components of a security system Copyright International Organization for Standardization Provided by IHS under license with ISO Licensee=NASA Technical Standards 1/9972545001 Not for Resale, 04/20/2007 04:55:43 MDTNo reproduction or networking permitted without license fro

44、m IHS -,-,- 8 TR 15067-4 O ISO/IEC:2001 (E) The most recent systems wire each sensor individually to the controller. Alternatively, some sensors may share a bus that allows individual communications to each sensor. Nevertheless, the term zone is still used, but now refers to a logical grouping of se

45、nsors that are armed or disarmed as a unit. However, it is now possible to determine which sensor in a zone tripped. Also, each sensor in a zone may be accessed for diagnostic purposes. In a home automation environment, the security system might provide information to other home systems. For example

46、, a lighting system or heating/cooling system might query the security controller about room occupancy. The controller would determine occupancy from sensor inputs. Also, the controller might adjust various sensor sensitivities appropriately for each system task. Therefore, the concept of disabling

47、a zone logically for security purposes should not physically disable the sensor for other applications. Some security controllers have sufficient capacity to serve multiple independent security systems. Applications might include apartments or offices in a building. Also, a section of a house, such

48、as an in-law apartment or a home office, might be programmed with separate algorithms. Each independent subsystem is called a partition. Following are the physical elements of a generic security system: 2.2.1 Sensors Contact sensor: a switch trips if a door or window is opened. A contact sensor may be placed below a mat so that it is tripped by someone walking across the mat. Acoustic sensor (also called a shock sensor): a sensor attached to a window is tripped by the sound of breaking glass. Glass break sensor: a conductive foil used com

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 其他


经营许可证编号:宁ICP备18001539号-1