Information technology — Home Electronic System (HES) Application Model — Part 4: Security System for HES

Residential security systems are among the most popular applications in a home automation system. This model is intended to be generic. It is applicable to a wide variety of security functions that extend well-beyond traditional intrusion detection. Potential applications of home security as represented in this model include activity monitoring, duress monitoring, and safety monitoring of personal well-being. The intrusion and safety applications of a security system are similar for commercial buildings. This generic model can therefore be extended to commercial building security functions.

Technologie de l'information — Modèle d'application du système électronique des bâtiments d'habitation (HES) — Partie 4: Système de sécurité pour le HES

General Information

Status
Published
Publication Date
18-Jul-2001
Current Stage
9093 - International Standard confirmed
Completion Date
13-Jul-2018
Ref Project

Relations

Buy Standard

Technical report
ISO/IEC TR 15067-4:2001 - Information technology -- Home Electronic System (HES) Application Model
English language
15 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

TECHNICAL
ISO/IEC
REPORT
TR 15067-4
First edition
2001-06
INFORMATION TECHNOLOGY –
HOME ELECTRONIC SYSTEM (HES)
APPLICATION MODEL
Part 4:
Security system for HES
Reference number
ISO/IEC TR 15067-4:2001(E)

---------------------- Page: 1 ----------------------
TECHNICAL ISO/IEC
REPORT
TR 15067-4
First edition
2001-06
INFORMATION TECHNOLOGY –
HOME ELECTRONIC SYSTEM (HES)
APPLICATION MODEL
Part 4:
Security system for HES
 ISO/IEC 2001
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any
means, electronic or mechanical, including photocopying and microfilm, without permission in writing from the publisher.
ISO/IEC Copyright Office Case postale 56 CH-1211 Genève 20 Switzerland
•
PRICE CODE
H
For price, see current catalogue

---------------------- Page: 2 ----------------------
2 TR 15067-4 © ISO/IEC:2001(E)
CONTENTS
Page
FOREWORD . 3
INTRODUCTION .5
1 Scope . 6
2 A typical security system . 6
2.1 Modes of operation . 6
2.1.1 Intrusion detection. 6
2.1.2 Restricted movement sensing. 6
2.1.3 Activity monitoring . 6
2.1.4 Duress notification. 7
2.1.5 Safety monitoring . 7
2.2 Components of a security system . 7
2.2.1 Sensors . 8
2.2.2 Control panels. 9
2.2.3 Security system controller. 9
2.2.4 Alarms . 10
3 The HES security system model . 10
3.1 Physical model. 10
3.1.1 Fully HES compatible . 10
3.1.2 Partial HES compatible. 10
3.1.3 Isolated network . 11
3.2 Logical model. 13
3.3 Message flows . 15
3.3.1 Sensors ←→ Zone control. 15
3.3.2 Zone control ←→ Partition control . 15
3.3.3 Partition control → Alarm. 16
3.3.4 Partition control ←→ External. 16

---------------------- Page: 3 ----------------------
TR 15067-4 © ISO/IEC:2001(E) 3
INFORMATION TECHNOLOGY –
HOME ELECTRONIC SYSTEM (HES) APPLICATION MODEL
Part 4: Security system for HES
FOREWORD
1) ISO (International Organization for Standardization) and IEC (International Electrotechnical Commission) form
the specialized system for worldwide standardization. National bodies that are members of ISO or IEC
participate in the development of International Standards through technical committees established by the
respective organization to deal with particular fields of technical activity. ISO and IEC technical committees
collaborate in fields of mutual interest. Other international organizations, governmental and non-governmental,
in liaison with ISO and IEC, also take part in the work.
2) In the field of information technology, ISO and IEC have established a joint technical committee,
ISO/IEC JTC 1. Draft International Standards adopted by the joint technical committee are circulated to national
bodies for voting. Publication as an International Standard requires approval by at least 75 % of the national
bodies casting a vote.
3) Attention is drawn to the possibility that some of the elements of this Technical Report may be the subject of
patent rights. ISO and IEC shall not be held responsible for identifying any or all such patent rights.
The main task of IEC and ISO technical committees is to prepare International Standards. In
exceptional circumstances, a technical committee may propose the publication of a technical
report of one of the following types:
• type 1, when the required support cannot be obtained for the publication of an International
Standard, despite repeated efforts;
• type 2, when the subject is still under technical development or where, for any other
reason, there is the future but not immediate possibility of an agreement on an International
Standard;
• type 3, when the technical committee has collected data of a different kind from that which
is normally published as an International Standard, for example ‘state of the art’.
Technical reports of types 1 and 2 are subject to review within three years of publication to
decide whether they can be transformed into International Standards. Technical reports of
type 3 do not necessarily have to be reviewed until the data they provide are considered to be
no longer valid or useful.
ISO/IEC 15067, which is a technical report of type 3, was prepared by subcommittee 25:
Interconnection of information technology equipment, of ISO/IEC joint technical committee 1:
Information technology.
This publication has been drafted in accordance with ISO/IEC directives, Part 3.
This document is not to be regarded as an International Standard. It is proposed for provisional
application so that information and experience of its use in practice may be gathered.
Comments on the content of this document should be sent to IEC Central Office.

---------------------- Page: 4 ----------------------
4 TR 15067-4 © ISO/IEC:2001(E)
Technical Report ISO/IEC TR 15067 currently consists of four parts:
- Part 1: Application services and protocol (under consideration)
- Part 2: Lighting model for HES
- Part 3: Model of an energy management system for HES (under consideration)
- Part 4: Model of a security system for HES

---------------------- Page: 5 ----------------------
TR 15067-4 © ISO/IEC:2001(E) 5
INTRODUCTION
This model of a security system for residences extends the set of HES (Home Electronic
System) application models. ISO/IEC JTC 1/SC 25, WG 1 has already developed and SC 25
has accepted models for lighting and energy management. These models are intended to
facilitate validation of the language being specified for HES in ISO/IEC TR 15067-1:
Information technology - Home Electronic System (HES) application model – Application
services and protocol.
These models have been developed to foster interoperability among products from competing
or complementary manufacturers. Product interoperability is essential when using home control
standards, such as HES. This Technical Report defines a typical security system and describes
the communications services needed. A high-level model for a security system using HES is
presented.

---------------------- Page: 6 ----------------------
6 TR 15067-4 © ISO/IEC:2001(E)
INFORMATION TECHNOLOGY –
HOME ELECTRONIC SYSTEM (HES) APPLICATION MODEL
Part 4: Security system for HES
1 Scope
Residential security systems are among the most popular applications in a home automation
system. This model is intended to be generic. It is applicable to a wide variety of security
functions that extend well-beyond traditional intrusion detection. Potential applications of home
security as represented in this model include activity monitoring, duress monitoring, and safety
monitoring of personal well-being.
The intrusion and safety applications of a security system are similar for commercial buildings.
This generic model can therefore be extended to commercial building security functions.
2 A typical security system
2.1 Modes of operation
A modern security system provides more than detection of unauthorized entry into a building.
The range of applications of a security system spans:
2.1.1 Intrusion detection
Sensor devices are installed to detect intrusion at particular locations in a building. The sensor
types are described in 2.2.1. Sensors are connected to a security controller that is programmed
with various algorithms. When a sensor is armed and tripped, the controller may sound an
audible alarm locally and/or may issue a notification to a remote site, for example via
telephone. The activation of the controller and choice of algorithm depends on user inputs from
one or more control panels (user interfaces).
2.1.2 Restricted movement sensing
Typically, this mode of operating a security system is chosen when the occupants are sleeping.
Sensors at the perimeter of the house and in selected rooms are armed. Activity and
movement in the bedroom will not trip the alarm. Therefore, one or more motion detectors in
the bedroom and possibly some window sensors are not monitored. All other sensors are
monitored as for intrusion detection.
2.1.3 Activity monitoring
This is a relatively new application of a security system. The system is specifically programmed
to alert a monitoring station or place a call to a family member upon the absence of internal
motion. Examples where this scheme is used include:
2.1.3.1 Elderly person monitoring
The objective is to determine if the person is moving about the house while home. The
absence of motion over a period of an hour or two when the person is not expected to be
sleeping might indicate that the person needs help.

---------------------- Page: 7 ----------------------
TR 15067-4 © ISO/IEC:2001(E) 7
2.1.3.2 Latch-key child
The term latch-key child describes a young child who returns from school to an empty house
because both parents are working. The child carries a key to the house, called the latch-key.
Upon returning home from school, the child enters a unique security code, different from the
one the parents use. This sets the system to call a parent at work when the child enters the
house. Alternatively, the system might be programmed to alert the parents if the child has not
returned home on time.
2.1.4 Duress notification
2.1.4.1 Panic alarm
Many security systems provide panic switches that are wall mounted in one or more locations.
If under duress or physical threat, the occupant can issue an alert through the security system
by operating this switch. A special duress notification is sent to the monitoring station.
2.1.4.2 Medical alert
An adjunct to a security system might be a pendant switch worn by an ill, disabled, or elderly
person. When a switch on this pendant is pressed, an alert is issued to summon medical help.
2.1.4.3 Forced disarm
A forced disarm might be a situation where the occupant is forced under threat of physical
assault to enter the house with an aggressor and warned not to trip the security system. Some
security systems offer a method of disarming a security system and simultaneously indicating
silently that this action was done under force. A special disarm code is entered into the security
control panel.
2.1.5 Safety monitoring
2.1.5.1 Fire
Among the system sensors might be smoke and heat detectors to monitor for fire. Whether a
safety system and security system are embodied in one network may depend on local fire
codes. Such codes may differ between residential and commercial buildings.
2.1.5.2 Environmental pollutants
Monitors for environmental pollutants may be installed in heavily-insulated buildings or as part
of a safety system when using gas for heating or cooking. The security system might link to the
ventilation system to clear any accumulating gases, such as carbon dioxide, carbon monoxide,
or oxides of nitrogen.
2.1.5.3 Water leaks
This may include pipe breaks, seepage, or building sprinkler activation.
2.1.5.4 Over or under temperature
This may be offered in climates with extreme temperatures or in commercial establishments
selling or manufacturing perishable products.
2.1.5.5 Earthquake
2.1.5.6 Machinery failure
2.2 Components of a security system
In early-developed security systems, many sensors were wired in a series loop from the
controller. The sensors were normally closed. Each series loop is called a zone. If any one
sensor in a series loop opened, the controller issued an alarm and possibly indicated which
zone had a tripped sensor. However, it was not possible to determine which sensor in the loop
tripped.

---------------------- Page: 8 ----------------------
8 TR 15067-4 © ISO/IEC:2001(E)
The most recent systems wire each sensor individually to the controller. Alternatively, some
sensors may share a bus that allows individual communications to each sensor. Nevertheless,
the term zone is still used, but now refers to a logical grouping of sensors that are armed or
disarmed as a unit. However, it is now possible to determine which sensor in a zone tripped.
Also, each sensor in a zone may be accessed for diagnostic purposes.
In a home automation environment, the security system might provide information to other
home systems. For example, a lighting system or heating/cooling system might query the
security controller about room occupancy. The controller would determine occupancy from
sensor inputs. Also, the controller might adjust various sensor sensitivities appropriately for
each system task. Therefore, the concept of disabling a zone logically for security purposes
should not physically disable the sensor for other applications.
Some security controllers have sufficient cap
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.