{"id":385146,"date":"2024-10-20T03:29:18","date_gmt":"2024-10-20T03:29:18","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-60839-11-332021\/"},"modified":"2024-10-26T06:19:22","modified_gmt":"2024-10-26T06:19:22","slug":"bs-en-iec-60839-11-332021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-60839-11-332021\/","title":{"rendered":"BS EN IEC 60839-11-33:2021"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | undefined <\/td>\n<\/tr>\n | ||||||
5<\/td>\n | Annex ZA (normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | English CONTENTS <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | FOREWORD <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | INTRODUCTION <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 1 Scope 2 Normative references <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 4 Overview 4.1 General <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 4.2 Namespaces Figures Figure 1 \u2013 Overview of service dependencies Tables Table 1 \u2013 Defined namespaces in this document Table 2 \u2013 Referenced namespaces (with prefix) <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 4.3 Error handling 5 Credential service 5.1 General <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.2 Service capabilities 5.2.1 General 5.2.2 ServiceCapabilities data structure Figure 2 \u2013 Main data structures in the credential service <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.2.3 GetServiceCapabilities command Table 3 \u2013 GetServiceCapabilities command <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.3 Credential information 5.3.1 General 5.3.2 Data structures <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 5.3.3 GetCredentialInfoList command Table 4 \u2013 GetCredentialInfo command <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 5.3.4 GetCredentials command Table 5 \u2013 GetCredentialInfoList command <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 5.3.5 GetCredentialList command Table 6 \u2013 GetCredentials command <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 5.3.6 CreateCredential command Table 7 \u2013 GetCredentialList command <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | Table 8 \u2013 CreateCredential command <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 5.3.7 SetCredential command <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | Table 9 \u2013 SetCredential command <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 5.3.8 ModifyCredential command <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 5.3.9 DeleteCredential command Table 10 \u2013 ModifyCredential command <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 5.3.10 GetCredentialState command 5.3.11 EnableCredential command Table 11 \u2013 DeleteCredential command Table 12 \u2013 GetCredentialState command <\/td>\n<\/tr>\n | ||||||
38<\/td>\n | 5.3.12 DisableCredential command 5.3.13 ResetAntipassbackViolation command Table 13 \u2013 EnableCredential command Table 14 \u2013 DisableCredential command <\/td>\n<\/tr>\n | ||||||
39<\/td>\n | 5.3.14 GetSupportedFormatTypes command 5.3.15 GetCredentialIdentifiers command Table 15 \u2013 ResetAntipassbackViolation command Table 16 \u2013 GetSupportedFormatTypes command <\/td>\n<\/tr>\n | ||||||
40<\/td>\n | 5.3.16 SetCredentialIdentifier command Table 17 \u2013 GetCredentialIdentifiers command Table 18 \u2013 SetCredentialIdentifier command <\/td>\n<\/tr>\n | ||||||
41<\/td>\n | 5.3.17 DeleteCredentialIdentifier command 5.3.18 GetCredentialAccessProfiles command Table 19 \u2013 DeleteCredentialIdentifier command Table 20 \u2013 GetCredentialAccessProfiles command <\/td>\n<\/tr>\n | ||||||
42<\/td>\n | 5.3.19 SetCredentialAccessProfiles command 5.3.20 DeleteCredentialAccessProfiles command Table 21 \u2013 SetCredentialAccessProfiles command <\/td>\n<\/tr>\n | ||||||
43<\/td>\n | 5.4 Notification topics 5.4.1 General 5.4.2 Event overview (informative) 5.4.3 Status changes Table 22 \u2013 DeleteCredentialAccessProfiles command <\/td>\n<\/tr>\n | ||||||
44<\/td>\n | 5.4.4 Configuration changes <\/td>\n<\/tr>\n | ||||||
45<\/td>\n | 6 Access rules service 6.1 General Figure 3 \u2013 Main data structures in the access rules service <\/td>\n<\/tr>\n | ||||||
46<\/td>\n | 6.2 Service capabilities 6.2.1 General 6.2.2 ServiceCapabilities data structure 6.2.3 GetServiceCapabilities command 6.3 Access profile information 6.3.1 General Table 23 \u2013 GetServiceCapabilities command <\/td>\n<\/tr>\n | ||||||
47<\/td>\n | 6.3.2 Data structures 6.3.3 GetAccessProfileInfo command <\/td>\n<\/tr>\n | ||||||
48<\/td>\n | 6.3.4 GetAccessProfileInfoList command Table 24 \u2013 GetAccessProfileInfo command <\/td>\n<\/tr>\n | ||||||
49<\/td>\n | 6.3.5 GetAccessProfiles command Table 25 \u2013 GetAccessProfileInfoList command <\/td>\n<\/tr>\n | ||||||
50<\/td>\n | 6.3.6 GetAccessProfileList command Table 26 \u2013 GetAccessProfiles command <\/td>\n<\/tr>\n | ||||||
51<\/td>\n | 6.3.7 CreateAccessProfile command Figure 4 \u2013 Multiple schedules per access point Table 27 \u2013 GetAccessProfileList command <\/td>\n<\/tr>\n | ||||||
52<\/td>\n | 6.3.8 SetAccessProfile command Figure 5 \u2013 Result of schedule union Table 28 \u2013 CreateAccessProfile command <\/td>\n<\/tr>\n | ||||||
53<\/td>\n | 6.3.9 ModifyAccessProfile command Table 29 \u2013 SetAccessProfile command <\/td>\n<\/tr>\n | ||||||
54<\/td>\n | 6.3.10 DeleteAccessProfile command Table 30 \u2013 ModifyAccessProfile command <\/td>\n<\/tr>\n | ||||||
55<\/td>\n | 6.4 Notification topics 6.4.1 General 6.4.2 Event overview (informative) 6.4.3 Configuration changes Table 31 \u2013 DeleteAccessProfile command <\/td>\n<\/tr>\n | ||||||
56<\/td>\n | 7 Authentication behaviour service 7.1 General 7.2 Example Table 32 \u2013 Example of schedule state to security level mapping <\/td>\n<\/tr>\n | ||||||
57<\/td>\n | 7.3 Service capabilities 7.3.1 General 7.3.2 ServiceCapabilities data structure Figure 6 \u2013 Authentication behaviour example <\/td>\n<\/tr>\n | ||||||
58<\/td>\n | 7.3.3 GetServiceCapabilities command 7.4 Authentication profile information 7.4.1 General Table 33 \u2013 GetServiceCapabilities command <\/td>\n<\/tr>\n | ||||||
59<\/td>\n | 7.4.2 Data structures Figure 7 \u2013 Related objects of an authentication profile <\/td>\n<\/tr>\n | ||||||
60<\/td>\n | 7.4.3 GetAuthenticationProfileInfo command <\/td>\n<\/tr>\n | ||||||
61<\/td>\n | 7.4.4 GetAuthenticationProfileInfoList command Table 34 \u2013 GetAuthenticationProfileInfo command <\/td>\n<\/tr>\n | ||||||
62<\/td>\n | 7.4.5 GetAuthenticationProfiles command Table 35 \u2013 GetAuthenticationProfileInfoList command <\/td>\n<\/tr>\n | ||||||
63<\/td>\n | 7.4.6 GetAuthenticationProfileList command Table 36 \u2013 GetAuthenticationProfiles command <\/td>\n<\/tr>\n | ||||||
64<\/td>\n | 7.4.7 CreateAuthenticationProfile command Table 37 \u2013 GetAuthenticationProfileList command <\/td>\n<\/tr>\n | ||||||
65<\/td>\n | 7.4.8 SetAuthenticationProfile command Table 38 \u2013 CreateAuthenticationProfile command <\/td>\n<\/tr>\n | ||||||
66<\/td>\n | 7.4.9 ModifyAuthenticationProfile command Table 39 \u2013 SetAuthenticationProfile command <\/td>\n<\/tr>\n | ||||||
67<\/td>\n | 7.4.10 DeleteAuthenticationProfile command Table 40 \u2013 ModifyAuthenticationProfile command <\/td>\n<\/tr>\n | ||||||
68<\/td>\n | 7.5 Security level information 7.5.1 General Figure 8 \u2013 Related objects of a security level Table 41 \u2013 DeleteAuthenticationProfile command <\/td>\n<\/tr>\n | ||||||
69<\/td>\n | 7.5.2 Data structures <\/td>\n<\/tr>\n | ||||||
70<\/td>\n | Figure 9 \u2013 Security level examples <\/td>\n<\/tr>\n | ||||||
71<\/td>\n | 7.5.3 GetSecurityLevelInfo command 7.5.4 GetSecurityLevelInfoList command Table 42 \u2013 GetSecurityLevelInfo command <\/td>\n<\/tr>\n | ||||||
72<\/td>\n | 7.5.5 GetSecurityLevels command Table 43 \u2013 GetSecurityLevelInfoList command <\/td>\n<\/tr>\n | ||||||
73<\/td>\n | 7.5.6 GetSecurityLevelList command Table 44 \u2013 GetSecurityLevels command <\/td>\n<\/tr>\n | ||||||
74<\/td>\n | 7.5.7 CreateSecurityLevel command Table 45 \u2013 GetSecurityLevelList command <\/td>\n<\/tr>\n | ||||||
75<\/td>\n | 7.5.8 SetSecurityLevel command Table 46 \u2013 CreateSecurityLevel command <\/td>\n<\/tr>\n | ||||||
76<\/td>\n | 7.5.9 ModifySecurityLevel command Table 47 \u2013 SetSecurityLevel command <\/td>\n<\/tr>\n | ||||||
77<\/td>\n | 7.5.10 DeleteSecurityLevel command Table 48 \u2013 ModifySecurityLevel command Table 49 \u2013 DeleteSecurityLevel command <\/td>\n<\/tr>\n | ||||||
78<\/td>\n | 7.6 Notification topics 7.6.1 General 7.6.2 Event overview (informative) 7.6.3 Configuration changes <\/td>\n<\/tr>\n | ||||||
79<\/td>\n | 8 Schedule service 8.1 General Figure 10 \u2013 Main data structures in the schedule service <\/td>\n<\/tr>\n | ||||||
81<\/td>\n | 8.2 Recurrence 8.2.1 General 8.2.2 Weekly recurrence Figure 11 \u2013 Recurrence support matrix <\/td>\n<\/tr>\n | ||||||
82<\/td>\n | 8.2.3 Extended recurrence 8.2.4 Standard schedule recurrence 8.2.5 Special day recurrence Figure 12 \u2013 Recurring events with an exception <\/td>\n<\/tr>\n | ||||||
83<\/td>\n | 8.3 Service capabilities 8.3.1 General 8.3.2 ServiceCapabilities data structure Figure 13 \u2013 Recurring events with a special day <\/td>\n<\/tr>\n | ||||||
84<\/td>\n | 8.3.3 GetServiceCapabilities command 8.4 Schedule information 8.4.1 General 8.4.2 Data structures Table 50 \u2013 GetServiceCapabilities command <\/td>\n<\/tr>\n | ||||||
86<\/td>\n | Figure 14 \u2013 SpecialDaysSchedule example Figure 15 \u2013 Example of special day with time part <\/td>\n<\/tr>\n | ||||||
87<\/td>\n | 8.4.3 GetScheduleInfo command <\/td>\n<\/tr>\n | ||||||
88<\/td>\n | 8.4.4 GetScheduleInfoList command Table 51 \u2013 GetScheduleInfo command <\/td>\n<\/tr>\n | ||||||
89<\/td>\n | 8.4.5 GetSchedules command Table 52 \u2013 GetScheduleInfoList command <\/td>\n<\/tr>\n | ||||||
90<\/td>\n | 8.4.6 GetScheduleList command Table 53 \u2013 GetSchedules command <\/td>\n<\/tr>\n | ||||||
91<\/td>\n | 8.4.7 CreateSchedule command Table 54 \u2013 GetScheduleList command <\/td>\n<\/tr>\n | ||||||
92<\/td>\n | 8.4.8 SetSchedule command Table 55 \u2013 CreateSchedule command <\/td>\n<\/tr>\n | ||||||
93<\/td>\n | 8.4.9 ModifySchedule command Table 56 \u2013 SetSchedule command <\/td>\n<\/tr>\n | ||||||
94<\/td>\n | 8.4.10 DeleteSchedule command Table 57 \u2013 ModifySchedule command Table 58 \u2013 DeleteSchedule command <\/td>\n<\/tr>\n | ||||||
95<\/td>\n | 8.5 Special day group information 8.5.1 General 8.5.2 Data structures 8.5.3 GetSpecialDayGroupInfo command <\/td>\n<\/tr>\n | ||||||
96<\/td>\n | 8.5.4 GetSpecialDayGroupInfoList command Table 59 \u2013 GetSpecialDayGroupInfo command <\/td>\n<\/tr>\n | ||||||
97<\/td>\n | 8.5.5 GetSpecialDayGroups command Table 60 \u2013 GetSpecialDayGroupInfoList command <\/td>\n<\/tr>\n | ||||||
98<\/td>\n | 8.5.6 GetSpecialDayGroupList command Table 61 \u2013 GetSpecialDayGroups command <\/td>\n<\/tr>\n | ||||||
99<\/td>\n | 8.5.7 CreateSpecialDayGroup command Table 62 \u2013 GetSpecialDayGroupList command <\/td>\n<\/tr>\n | ||||||
100<\/td>\n | 8.5.8 SetSpecialDayGroup command Table 63 \u2013 CreateSpecialDayGroup command <\/td>\n<\/tr>\n | ||||||
101<\/td>\n | 8.5.9 ModifySpecialDayGroup command Table 64 \u2013 SetSpecialDayGroup command <\/td>\n<\/tr>\n | ||||||
102<\/td>\n | 8.5.10 DeleteSpecialDayGroup command 8.6 Schedule status 8.6.1 ScheduleState data structure Table 65 \u2013 ModifySpecialDayGroup command Table 66 \u2013 DeleteSpecialDayGroup command <\/td>\n<\/tr>\n | ||||||
103<\/td>\n | 8.6.2 GetScheduleState command Figure 16 \u2013 Schedule states <\/td>\n<\/tr>\n | ||||||
104<\/td>\n | 8.7 Notification topics 8.7.1 General 8.7.2 Event overview (informative) 8.7.3 Status changes Table 67 \u2013 GetScheduleState command <\/td>\n<\/tr>\n | ||||||
105<\/td>\n | 8.7.4 Configuration changes <\/td>\n<\/tr>\n | ||||||
106<\/td>\n | 8.8 Examples 8.8.1 General 8.8.2 Access 24 \u00d7 7 for admin staff 8.8.3 Access on Monday and Wednesday from 06:00 to 20:00 for cleaning staff 8.8.4 Access from Friday 18:00 to 07:00 for maintenance staff <\/td>\n<\/tr>\n | ||||||
107<\/td>\n | 8.8.5 Access on weekdays from 08:00 to 17:00 for employees <\/td>\n<\/tr>\n | ||||||
108<\/td>\n | 8.8.6 Access from January 15, 2014, to January 14, 2015, from 09:00 to 18:00 8.8.7 Special days example 1 <\/td>\n<\/tr>\n | ||||||
109<\/td>\n | 8.8.8 Special days example 2 <\/td>\n<\/tr>\n | ||||||
111<\/td>\n | 8.8.9 Special days example 3 <\/td>\n<\/tr>\n | ||||||
112<\/td>\n | Annex A (normative)Access control interface XML schemata A.1 Credential service WSDL <\/td>\n<\/tr>\n | ||||||
132<\/td>\n | A.2 Access rules service WSDL <\/td>\n<\/tr>\n | ||||||
142<\/td>\n | A.3 Authentication behaviour service WSDL <\/td>\n<\/tr>\n | ||||||
160<\/td>\n | A.4 Schedule service WSDL <\/td>\n<\/tr>\n | ||||||
179<\/td>\n | Annex B (informative)Mapping of mandatory functions in IEC 60839-11-1 <\/td>\n<\/tr>\n | ||||||
180<\/td>\n | Table B.1 \u2013 Access point interface requirements <\/td>\n<\/tr>\n | ||||||
181<\/td>\n | Table B.2 \u2013 Indication and annunciation requirements <\/td>\n<\/tr>\n | ||||||
184<\/td>\n | Table B.3 \u2013 Recognition requirements <\/td>\n<\/tr>\n | ||||||
185<\/td>\n | Table B.4 \u2013 Duress signalling requirements <\/td>\n<\/tr>\n | ||||||
186<\/td>\n | Table B.5 \u2013 Overriding requirements Table B.6 \u2013 System self protection requirements <\/td>\n<\/tr>\n | ||||||
187<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Alarm and electronic security systems – Electronic access control systems. Access control configuration based on Web services<\/b><\/p>\n |