로봇 유지보수 — 로봇 유지보수 · 예지보전 · 진동 분석 · OEE · IoT 진단
The Robot Maintenance standard (WIA-ROBOT-MAINT-001) documents the WIA Standards canonical envelope shape, API surface, protocol exchanges, and ecosystem integration for robot maintenance hosts that need to interoperate across jurisdictions, vendors, and operational contexts.
The standard composes with the wider WIA Standards family to inherit cross-standard composition, audit transport (W3C Trace Context plus OpenTelemetry semantic conventions), and federation handshakes (per WIA-INTENT) without per-standard re-implementation.
spec/PHASE-1.md — Phase 1 wire-format envelopesspec/PHASE-2.md — Phase 2 REST + JSON-RPC surfacespec/PHASE-3.md — Phase 3 protocol exchanges and federationspec/PHASE-4.md — Phase 4 ecosystem composition and compliancecli/robot-maintenance.sh — POSIX shell helper with sample envelope generatorsA standard is conformant when (1) every Phase 1 envelope it emits validates against the published JSON Schema for that envelope class, (2) every Phase 2 endpoint it exposes honours the documented status codes, content shapes, and error envelopes, (3) every Phase 3 protocol exchange it participates in honours the handshake order, signature requirements, and audit hook contract, and (4) Phase 4 ecosystem composition reaches the required cross-standard capabilities (audit transport, identity, federation) per the Phase 4 Sec 4 capability matrix.
A first implementation of the Robot Maintenance standard typically follows: stand up the reference container at wia/robot-maintenance-host:1.0.0; run the conformance suite end-to-end; replace mock backend with real backend; wire audit-log replication; onboard a single trusted peer for federation; expand to multiple peers; promote to production with the warning-envelope subscription enabled.
The Robot Maintenance standard composes with the wider WIA Standards family. Implementations reuse the cross-standard audit transport (W3C Trace Context plus OpenTelemetry semantic conventions per wia.standard.slug = robot-maintenance), the cross-standard identity (WIA-OMNI-API), and the cross-standard runtime trust list (WIA-AIR-SHIELD).
Within the 1.x line, every Phase 1 envelope shape, every Phase 2 endpoint, and every Phase 3 protocol exchange MUST remain reachable. Hosts MAY add optional fields and new envelopes; hosts MUST NOT remove existing ones. Breaking changes ride a major version bump with a 12-month deprecation window per IETF RFC 8594 and 9745.
Hosts that process personal data through Robot Maintenance envelopes MUST honour the operator's per-jurisdiction privacy law (EU GDPR, UK GDPR, California CPRA, Brazil LGPD, Canada PIPEDA, Korea PIPA, Japan APPI, Australia Privacy Act).
Hosts publish a continuity-of-operations envelope per ISO 22301:2019 + ISO/IEC 27031 + NIST SP 800-34 Rev 1 covering: per-host RTO, per-host RPO, per-host backup envelope, per-host failover-rehearsal envelope, per-host vendor-exit envelope. Composes with WIA Secure Enclave for sealed-backup envelopes.
Every Phase 1 envelope SHOULD emit a structured log line at the host's audit transport: timestamp per RFC 3339, host identifier, tenant identifier, envelope class, envelope identifier, operation outcome, and a W3C Trace Context traceparent propagated end-to-end. Phase 2 surfaces this trace identifier as the X-WIA-Trace-Id response header. Phase 3 protocol exchanges propagate the trace identifier inside the exchange envelope so federation crossings remain correlatable end-to-end.
Hosts SHOULD publish a capabilities document at /.well-known/wia-robot-maintenance-capabilities enumerating per-endpoint optionality. Clients MUST treat unsupported capabilities as absent rather than as an error. Hosts moving from one minor version to the next MUST publish the change in release notes with the per-capability migration window per IETF RFC 8594 + RFC 9745.
Maintained under the WIA Standards public-benefit governance model. See https://wiastandards.com/governance/ for committee composition, voting rules, and the per-standard release calendar.