{"id":244884,"date":"2024-10-19T16:05:51","date_gmt":"2024-10-19T16:05:51","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-61784-3-32017\/"},"modified":"2024-10-25T11:05:26","modified_gmt":"2024-10-25T11:05:26","slug":"bs-en-61784-3-32017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-61784-3-32017\/","title":{"rendered":"BS EN 61784-3-3:2017"},"content":{"rendered":"

This part of the IEC 61784-3 series specifies a safety communication layer (services and protocol) based on CPF 3 of IEC 61784-1, IEC 61784-2 (CP 3\/1, CP 3\/2, CP 3\/4, CP 3\/5 and CP 3\/6) and IEC 61158 Types 3 and 10. It identifies the principles for functional safety communications defined in IEC 61784-3 that are relevant for this safety communication layer. This safety communication layer is intended for implementation in safety devices only.<\/p>\n

\n

NOTE 1 It does not cover electrical safety and intrinsic safety aspects. Electrical safety relates to hazards such as electrical shock. Intrinsic safety relates to hazards associated with potentially explosive atmospheres.<\/p>\n<\/blockquote>\n

This part 1 defines mechanisms for the transmission of safety-relevant messages among participants within a distributed network using fieldbus technology in accordance with the requirements of IEC 61508 series2 for functional safety. These mechanisms may be used in various industrial applications such as process control, manufacturing automation and machinery.<\/p>\n

This part provides guidelines for both developers and assessors of compliant devices and systems.<\/p>\n

\n

NOTE 2 The resulting SIL claim of a system depends on the implementation of the selected functional safety communication profile within this system \u2013 implementation of a functional safety communication profile according to this part in a standard device is not sufficient to qualify it as a safety device.<\/p>\n<\/blockquote>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nNational foreword <\/td>\n<\/tr>\n
7<\/td>\nEnglish
CONTENTS <\/td>\n<\/tr>\n
13<\/td>\nFOREWORD <\/td>\n<\/tr>\n
15<\/td>\nFigures
Figure\u00a01 \u2013 Relationships of IEC\u00a0617843 with other standards (machinery) <\/td>\n<\/tr>\n
16<\/td>\nFigure\u00a02 \u2013 Relationships of IEC\u00a0617843 with other standards (process) <\/td>\n<\/tr>\n
19<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
21<\/td>\n3 Terms, definitions, symbols, abbreviated terms and conventions
3.1 Terms and definitions
3.1.1 Common terms and definitions <\/td>\n<\/tr>\n
27<\/td>\n3.1.2 CPF\u00a03: Additional terms and definitions <\/td>\n<\/tr>\n
31<\/td>\n3.2 Symbols and abbreviated terms
3.2.1 Common symbols and abbreviated terms <\/td>\n<\/tr>\n
32<\/td>\n3.2.2 CPF\u00a03: Additional symbols and abbreviated terms <\/td>\n<\/tr>\n
33<\/td>\n3.3 Conventions
4 Overview of FSCP\u00a03\/1 (PROFIsafe\u2122) <\/td>\n<\/tr>\n
34<\/td>\nFigure\u00a03 \u2013 Basic communication preconditions for FSCP\u00a03\/1
Figure\u00a04 \u2013 Structure of an FSCP\u00a03\/1 safety PDU <\/td>\n<\/tr>\n
35<\/td>\nFigure\u00a05 \u2013 Safety communication on CPF 3 <\/td>\n<\/tr>\n
36<\/td>\n5 General
5.1 External documents providing specifications for the profile
5.2 Safety functional requirements
5.3 Safety measures <\/td>\n<\/tr>\n
37<\/td>\n5.4 Safety communication layer structure
5.4.1 Principle of FSCP\u00a03\/1 safety communications
Figure\u00a06 \u2013 Standard CPF\u00a03 transmission system
Tables
Table\u00a01 \u2013 Deployed measures to master errors <\/td>\n<\/tr>\n
38<\/td>\n5.4.2 CPF\u00a03 communication structures
Figure\u00a07 \u2013 Safety layer architecture <\/td>\n<\/tr>\n
39<\/td>\nFigure\u00a08 \u2013 Basic communication layers
Figure\u00a09 \u2013 Multiport switch bus structure <\/td>\n<\/tr>\n
40<\/td>\nFigure\u00a010 \u2013 Linear bus structure
Figure\u00a011 \u2013 Crossing network borders with routers <\/td>\n<\/tr>\n
41<\/td>\n5.5 Relationships with FAL (and DLL, PhL)
5.5.1 Device model
Figure\u00a012 \u2013 Complete safety transmission paths <\/td>\n<\/tr>\n
42<\/td>\n5.5.2 Application and communication relationships
5.5.3 Data types
Figure\u00a013 \u2013 IO Device model
Table\u00a02 \u2013 Data types for FSCP\u00a03\/1 <\/td>\n<\/tr>\n
43<\/td>\n6 Safety communication layer services
6.1 F-Host services
Figure\u00a014 \u2013 FSCP\u00a03\/1 communication structure <\/td>\n<\/tr>\n
44<\/td>\nFigure\u00a015 \u2013 F user interface of F-Host driver instances <\/td>\n<\/tr>\n
45<\/td>\nFigure 16 \u2013 Motivation for "Channel-related Passivation" <\/td>\n<\/tr>\n
46<\/td>\n6.2 F-Device services <\/td>\n<\/tr>\n
47<\/td>\nFigure\u00a017 \u2013 F-Device driver interfaces <\/td>\n<\/tr>\n
48<\/td>\n6.3 Diagnosis
6.3.1 Safety alarm generation
6.3.2 F-Device safety layer diagnosis including the iPar-Server <\/td>\n<\/tr>\n
49<\/td>\n7 Safety communication layer protocol
7.1 Safety PDU format
7.1.1 Safety PDU structure
Table\u00a03 \u2013 Safety layer diagnosis messages <\/td>\n<\/tr>\n
50<\/td>\n7.1.2 Safety IO data
7.1.3 Status and Control Byte
Figure\u00a018 \u2013 Safety PDU for CPF\u00a03
Figure\u00a019 \u2013 Status\u00a0Byte <\/td>\n<\/tr>\n
51<\/td>\nFigure\u00a020 \u2013 Control\u00a0Byte <\/td>\n<\/tr>\n
52<\/td>\n7.1.4 (Virtual) MonitoringNumber
Figure\u00a021 \u2013 The Toggle\u00a0Bit function <\/td>\n<\/tr>\n
53<\/td>\n7.1.5 (Virtual) MNR mechanism (F_CRC_Seed=0)
7.1.6 (Virtual) MNR mechanism (F_CRC_Seed=1)
Figure\u00a022 \u2013 F-Device MonitoringNumber
Table 4 \u2013 MonitoringNumber of an F-Host PDU
Table 5 \u2013 MonitoringNumber of an F-Device PDU <\/td>\n<\/tr>\n
54<\/td>\nTable 6 \u2013 MonitoringNumber of an F-Host PDU
Table 7 \u2013 MonitoringNumber of an F-Device PDU <\/td>\n<\/tr>\n
55<\/td>\n7.1.7 CRC2 Signature (F_CRC_Seed=0)
Figure\u00a023 \u2013 F-Host CRC2 signature generation (F_CRC_Seed=0) <\/td>\n<\/tr>\n
56<\/td>\n7.1.8 CRC2 Signature (F_CRC_Seed=1)
Figure\u00a024 \u2013 Details of the CRC2 signature calculation (F_CRC_Seed=0)
Figure\u00a025 \u2013 CRC2 signature calculation (F_CRC_Seed=1) <\/td>\n<\/tr>\n
57<\/td>\n7.1.9 Non-safety IO data
7.2 FSCP\u00a03\/1 behavior
7.2.1 General
Figure\u00a026 \u2013 Details of the CRC2 signature calculation (F_CRC_Seed=1)
Figure\u00a027 \u2013 Safety layer communication relationship <\/td>\n<\/tr>\n
58<\/td>\n7.2.2 F-Host state diagram
Figure\u00a028 \u2013 F-Host state diagram <\/td>\n<\/tr>\n
59<\/td>\nTable 8 \u2013 Definition of terms used in F-Host state diagram
Table\u00a09 \u2013 F-Host states and transitions <\/td>\n<\/tr>\n
61<\/td>\n7.2.3 F-Device state diagram <\/td>\n<\/tr>\n
62<\/td>\nFigure\u00a029 \u2013 F-Device state diagram
Table 10 \u2013 Definition of terms used in Figure\u00a029 <\/td>\n<\/tr>\n
63<\/td>\nTable\u00a011 \u2013 F-Device states and transitions <\/td>\n<\/tr>\n
65<\/td>\n7.2.4 Sequence diagrams
Figure 30 \u2013 Interaction F-Host \/ F-Device during start-up <\/td>\n<\/tr>\n
66<\/td>\nFigure\u00a031 \u2013 Interaction F-Host \/ F-Device during F-Host power off \u2192 on <\/td>\n<\/tr>\n
67<\/td>\nFigure\u00a032 \u2013 Interaction F-Host \/ F-Device with delayed power on <\/td>\n<\/tr>\n
68<\/td>\nFigure\u00a033 \u2013 Interaction F-Host \/ F-Device during power off \u2192 on <\/td>\n<\/tr>\n
69<\/td>\nFigure\u00a034 \u2013 Interaction F-Host \/ F-Device while host recognizes CRC error <\/td>\n<\/tr>\n
70<\/td>\nFigure\u00a035 \u2013 Interaction F-Host \/ F-Device while device recognizes CRC error <\/td>\n<\/tr>\n
71<\/td>\n7.2.5 Timing diagram for a MonitoringNumber reset
7.2.6 Monitoring of safety times
Figure\u00a036 \u2013 Impact of the MNR reset signal <\/td>\n<\/tr>\n
72<\/td>\nFigure\u00a037 \u2013 Monitoring the message transit time F-Host \u2194 F-Output
Figure\u00a038 \u2013 Monitoring the message transit time F-Input \u2194 F-Host <\/td>\n<\/tr>\n
74<\/td>\n7.3 Reaction in the event of a malfunction
7.3.1 Unintended repetition
Figure\u00a039 \u2013 Extended watchdog time on request
Table\u00a012 \u2013 SIL monitor times <\/td>\n<\/tr>\n
75<\/td>\n7.3.2 Loss
7.3.3 Insertion
7.3.4 Incorrect sequence
7.3.5 Corruption of safety data
7.3.6 Unacceptable delay
7.3.7 Masquerade <\/td>\n<\/tr>\n
76<\/td>\n7.3.8 Addressing
7.3.9 Memory failures within switches
Table\u00a013 \u2013 Remedies for switch failures <\/td>\n<\/tr>\n
77<\/td>\n7.3.10 Loop-back
7.3.11 Network boundaries and router
Table\u00a014 \u2013 Safety network boundaries <\/td>\n<\/tr>\n
78<\/td>\n7.4 F-Startup and parameter change at runtime
7.4.1 Standard startup procedure
7.4.2 iParameter assignment deblocking
8 Safety communication layer management
8.1 F-Parameter
8.1.1 Summary
Figure\u00a040 \u2013 iParameter assignment deblocking by the F-Host <\/td>\n<\/tr>\n
79<\/td>\n8.1.2 F_Source\/Destination_Address (Codename)
8.1.3 F_WD_Time (F-Watchdog time)
Table 15 \u2013 Codename octet order <\/td>\n<\/tr>\n
80<\/td>\n8.1.4 F_WD_Time_2 (secondary F-Watchdog time)
8.1.5 F_Prm_Flag1 (Parameters for the safety layer management)
Figure\u00a041 \u2013 Effect of F_WD_Time_2
Figure\u00a042 \u2013 F_Prm_Flag1 <\/td>\n<\/tr>\n
81<\/td>\nFigure\u00a043 \u2013 F_Check_SeqNr
Figure\u00a044 \u2013 F_Check_iPar
Figure\u00a045 \u2013 F_SIL <\/td>\n<\/tr>\n
82<\/td>\n8.1.6 F_Prm_Flag2 (Parameters for the safety layer management)
Figure\u00a046 \u2013 F_CRC_Length
Figure\u00a047 \u2013 F_CRC_Seed
Figure\u00a048 \u2013 F_Prm_Flag2 <\/td>\n<\/tr>\n
83<\/td>\n8.1.7 F_iPar_CRC (value of iPar_CRC across iParameters)
Figure 49 \u2013 F_Passivation
Figure\u00a050 \u2013 F_Block_ID
Figure\u00a051 \u2013 F_Par_Version <\/td>\n<\/tr>\n
84<\/td>\n8.1.8 F_Par_CRC calculation (across F-Parameters)
8.1.9 Structure of the F-Parameter record data object
8.2 iParameter and iPar_CRC
Figure\u00a052 \u2013 F-Parameter <\/td>\n<\/tr>\n
85<\/td>\n8.3 Safety parameterization
8.3.1 Objectives
Figure\u00a053 \u2013 iParameter block <\/td>\n<\/tr>\n
86<\/td>\n8.3.2 GSDL and GSDML safety extensions
Table 16 \u2013 GSDL keywords for F-Parameters and F-IO structures <\/td>\n<\/tr>\n
87<\/td>\nFigure\u00a054 \u2013 F-Parameter extension within the GSDML specification <\/td>\n<\/tr>\n
88<\/td>\n8.3.3 Securing safety parameters and GSD data <\/td>\n<\/tr>\n
89<\/td>\nFigure\u00a055 \u2013 F_Par_CRC signature including iPar_CRC
Figure 56 \u2013 Algorithm to build CRC0 <\/td>\n<\/tr>\n
90<\/td>\nTable 17 \u2013 GSD example in GSDL notation <\/td>\n<\/tr>\n
91<\/td>\nFigure 57 \u2013 GSD example in GSDML notation
Table 18 \u2013 Serialized octet stream for the examples <\/td>\n<\/tr>\n
92<\/td>\n8.4 Safety configuration
8.4.1 Securing the safety IO data description (CRC7)
Table\u00a019 \u2013 IO data structure items <\/td>\n<\/tr>\n
93<\/td>\n8.4.2 DataItem data type section examples <\/td>\n<\/tr>\n
94<\/td>\nFigure\u00a058 \u2013 DataItem section for F_IN_OUT_1 <\/td>\n<\/tr>\n
95<\/td>\nFigure\u00a059 \u2013 DataItem section for F_IN_OUT_2 <\/td>\n<\/tr>\n
96<\/td>\nFigure\u00a060 \u2013 DataItem section for F_IN_OUT_5 <\/td>\n<\/tr>\n
97<\/td>\n8.5 Data type information usage
8.5.1 F-Channel driver
Figure\u00a061 \u2013 DataItem section for F_IN_OUT_6 <\/td>\n<\/tr>\n
98<\/td>\n8.5.2 Rules for standard F-Channel drivers
Figure\u00a062 \u2013 F-Channel driver as "glue" between F-Device and user program
Table\u00a020 \u2013 Sample F-Channel drivers <\/td>\n<\/tr>\n
99<\/td>\n8.5.3 Recommendations for F-Channel drivers
Figure\u00a063 \u2013 Layout example of an F-Channel driver <\/td>\n<\/tr>\n
100<\/td>\n8.6 Safety parameter assignment mechanisms
8.6.1 F-Parameter assignment
8.6.2 General iParameter assignment
Figure\u00a064 \u2013 F-Parameter assignment for simple F-Devices and F-Slaves <\/td>\n<\/tr>\n
101<\/td>\n8.6.3 System integration requirements for iParameterization tools
Figure\u00a065 \u2013 F and iParameter assignment for complex F-Devices
Table\u00a021 \u2013 Requirements for iParameterization <\/td>\n<\/tr>\n
102<\/td>\nFigure\u00a066 \u2013 System integration of CPD-Tools <\/td>\n<\/tr>\n
103<\/td>\n8.6.4 iPar-Server
Figure\u00a067 \u2013 iPar-Server mechanism (commissioning) <\/td>\n<\/tr>\n
104<\/td>\nFigure\u00a068 \u2013 iPar-Server mechanism (for example F-Device replacement) <\/td>\n<\/tr>\n
105<\/td>\nFigure\u00a069 \u2013 iPar-Server request coding ("status model") <\/td>\n<\/tr>\n
106<\/td>\nFigure\u00a070 \u2013 Coding of SR_Type
Table\u00a022 \u2013 Specifier for the iPar-Server Request <\/td>\n<\/tr>\n
107<\/td>\nFigure\u00a071 \u2013 iPar-Server request coding ("alarm model")
Table\u00a023 \u2013 Structure of the Read_RES_PDU ("read record") <\/td>\n<\/tr>\n
108<\/td>\nTable\u00a024 \u2013 Structure of the Write_REQ_PDU ("write record")
Table\u00a025 \u2013 Structure of the Pull_RES_PDU ("Pull")
Table\u00a026 \u2013 Structure of the Push_REQ_PDU ("Push") <\/td>\n<\/tr>\n
109<\/td>\nFigure\u00a072 \u2013 iPar-Server state diagram <\/td>\n<\/tr>\n
110<\/td>\nTable\u00a027 \u2013 iPar-Server states and transitions <\/td>\n<\/tr>\n
111<\/td>\nTable\u00a028 \u2013 iPar-Server management measures <\/td>\n<\/tr>\n
112<\/td>\n9 System requirements
9.1 Indicators and switches
9.2 Installation guidelines
9.3 Safety function response time
9.3.1 Model <\/td>\n<\/tr>\n
113<\/td>\nFigure\u00a073 \u2013 Example safety function with a critical response time path
Figure\u00a074 \u2013 Simplified typical response time model <\/td>\n<\/tr>\n
114<\/td>\n9.3.2 Calculation and optimization
Figure\u00a075 \u2013 Frequency distributions of typical response times of the model <\/td>\n<\/tr>\n
115<\/td>\nFigure\u00a076 \u2013 Context of delay times and watchdog times <\/td>\n<\/tr>\n
116<\/td>\n9.3.3 Adjustment of watchdog times for FSCP\u00a03\/1
Figure\u00a077 \u2013 Timing sections forming the FSCP\u00a03\/1 F_WD_Time <\/td>\n<\/tr>\n
117<\/td>\n9.3.4 Engineering tool support
9.3.5 Retries (repetition of messages)
Figure\u00a078 \u2013 Frequency distribution of response times with message retries <\/td>\n<\/tr>\n
118<\/td>\n9.4 Duration of demands
Figure\u00a079 \u2013 Retries with CP\u00a03\/1
Figure\u00a080 \u2013 Retries with CP\u00a03\/RTE <\/td>\n<\/tr>\n
119<\/td>\n9.5 Constraints for the calculation of system characteristics
9.5.1 Probabilistic considerations
Figure\u00a081 \u2013 Residual error probabilities for the 24-bit CRC polynomial <\/td>\n<\/tr>\n
120<\/td>\nFigure\u00a082 \u2013 Residual error probabilities for the 32-bit CRC polynomial <\/td>\n<\/tr>\n
121<\/td>\n9.5.2 Safety related assumptions
Figure\u00a083 \u2013 Monitoring of corrupted messages
Table 29 \u2013 Definition of terms in Figure\u00a083 <\/td>\n<\/tr>\n
122<\/td>\n9.5.3 Non safety related constraints (availability)
9.6 Maintenance
9.6.1 F-Module commissioning \/ replacement
9.6.2 Identification and maintenance functions
9.7 Safety manual <\/td>\n<\/tr>\n
123<\/td>\nTable\u00a030 \u2013 Information to be included in the safety manual <\/td>\n<\/tr>\n
124<\/td>\n9.8 Wireless transmission channels
9.8.1 Black channel approach
9.8.2 Availability
9.8.3 Security measures
Figure 84 \u2013 Considerations against systematic loop-back configuration errors <\/td>\n<\/tr>\n
125<\/td>\nFigure\u00a085 \u2013 Security for WLAN networks
Table 31 \u2013 Definition of terms in Figure\u00a085
Table\u00a032 \u2013 Security measures for WLAN (IEEE 802.11) <\/td>\n<\/tr>\n
126<\/td>\nFigure\u00a086 \u2013 Security for Bluetooth networks
Table 33 \u2013 Definition of terms in Figure\u00a086 <\/td>\n<\/tr>\n
127<\/td>\n9.8.4 Stationary and mobile applications
9.9 Conformance classes
Table\u00a034 \u2013 Security measures for Bluetooth (IEEE 802.15.1)
Table\u00a035 \u2013 F-Host conformance class requirements <\/td>\n<\/tr>\n
129<\/td>\n10 Assessment
10.1 Safety policy
10.2 Obligations
Table 36 \u2013 Main characteristics of protocol versions
Table 37 \u2013 F-Host\/F-Device conformance matrix <\/td>\n<\/tr>\n
131<\/td>\nAnnex A (informative) Additional information for functional safety communication profiles of CPF 3
A.1 Hash function calculation
Figure\u00a0A.1 \u2013 Typical "C" procedure of a cyclic redundancy check <\/td>\n<\/tr>\n
132<\/td>\nTable\u00a0A.1 \u2013 The table "Crctab24" for 24 bit CRC signature calculations <\/td>\n<\/tr>\n
133<\/td>\nTable\u00a0A.2 \u2013 The table "Crctab32" for 32 bit CRC signature calculations <\/td>\n<\/tr>\n
134<\/td>\nA.2 Example values for MonitoringNumbers (MNR)
Table\u00a0A.3 \u2013 The table "Crctab16" for 16 bit CRC signature calculations <\/td>\n<\/tr>\n
135<\/td>\nA.3 Response time measurements
Figure\u00a0A.2 \u2013 Comparison of the response time model and a real application
Table\u00a0A.4 \u2013 Values of CN_incrNR_64 and MNR for F-Host PDU <\/td>\n<\/tr>\n
136<\/td>\nFigure\u00a0A.3 \u2013 Frequency distribution of measured response times <\/td>\n<\/tr>\n
137<\/td>\nFigure\u00a0A.4 \u2013 F-Host with standard and safety-related application programs <\/td>\n<\/tr>\n
138<\/td>\nAnnex B (informative) Information for assessment of the functional safety communication profiles of CPF 3 <\/td>\n<\/tr>\n
139<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Industrial communication networks. Profiles – Functional safety fieldbuses. Additional specifications for CPF 3<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2017<\/td>\n144<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":244886,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[385,2641],"product_tag":[],"class_list":{"0":"post-244884","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-25-040-40","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/244884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/244886"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=244884"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=244884"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=244884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}