• Shopping Cart
    There are no items in your cart

BS ISO/IEC 9541-3 : 1994

Current

Current

The latest, up-to-date edition.

INFORMATION TECHNOLOGY - FONT INFORMATION INTERCHANGE - PART 3: GLYPH SHAPE REPRESENTATION

Available format(s)

Hardcopy , PDF

Language(s)

English

Published date

01-01-1994

€303.84
Excluding VAT

Section 1 - General
1.1 Scope
1.2 Conformance
1.3 Normative references
1.4 Notation
1.5 Overview of glyph shape representation
1.6 Specification of glyph shapes (GSHAPES)
1.7 Extensions to the font interchange format
1.7.1 ASN.1
1.7.2 SGML
Section 2 - Type 1 glyph shape representation
2.1 Scope
2.2 Definitions
2.3 Overview of Type 1 glyph shape representation
         architecture
2.4 Type 1 glyph shape concepts
2.4.1 Glyph coordinate system
2.4.2 Glyph procedure language
2.4.3 Glyph procedure interpreter
2.4.4 Alignment position
2.4.5 Flat position
2.4.6 Overshoot position
2.4.7 Overshoot suppression
2.4.8 Alignment zone
2.4.9 Hints
2.4.10 Hint zone
2.4.11 Path direction
2.4.12 Reference point
2.4.13 Flex mechanism
2.4.14 Hint substitution
2.4.15 Bezier curve
2.5 Glyph procedure interpreter model
2.6 Type 1 shape properties (T1SHAPES)
2.6.1 General properties (T1GENERAL)
2.6.1.1 Password (PASSWORD)
2.6.1.2 Paint type (PAINTTYPE)
2.6.1.3 Unique identifier (UNIQUEID)
2.6.2 Typographic colour properties (T1COLOR)
2.6.2.1 Top alignment zones (BLUEVALUES)
2.6.2.2 Bottom alignment zones (OTHERBLUES)
2.6.2.3 Family top alignment (FAMILYBLUES)
2.6.2.4 Family bottom alignment zones
         (FAMILYOTHERBLUES)
2.6.2.5 Overshoot suppression size (BLUESCALE)
2.6.2.6 Overshoot enforcement extent (BLUESHIFT)
2.6.2.7 Zone tolerance (BLUEFUZZ)
2.6.2.8 Stem width information (STEMWIDTHPROPS)
2.6.2.8.1 Standard horizontal width (STDHW)
2.6.2.8.2 Standard vertical width (STDVW)
2.6.2.8.3 Stem snap horizontal (STEMSNAPH)
2.6.2.8.4 Stem snap vertical (STEMSNAPV)
2.6.2.8.5 Force bold (FORCEBOLD)
2.6.2.8.6 Language group (LANGUAGEGROUP)
2.6.3 Glyph properties (T1GLYPH)
2.6.3.1 Glyph procedure encryption (GLYPHENCRYPT)
2.6.3.2 Glyph prefix length (LENIV)
2.6.3.3 Accent Component Table (ACCENTENCODING)
2.6.3.4 Subroutines (SUBRS)
2.6.3.5 Glyph procedure properties (GLYPHPROCPROPS)
2.6.3.5.1 Glyph name property (GNAME)
2.6.3.5.2 Glyph procedure (GLYPHPROC)
2.7 Glyph procedure semantics
2.7.1 Virtual machine
2.7.1.1 Glyph procedure tokens
2.7.1.2 Glyph procedure interpreter
2.7.1.3 Operand list
2.7.1.4 State variables
2.7.1.4.1 Current point
2.7.1.4.2 Escapement
2.7.1.4.3 Current path
2.7.1.4.4 Horizontal stems
2.7.1.4.5 Vertical stems
2.7.1.4.6 Dot section
2.7.1.5 Implicit results stack
2.7.2 Data types
2.7.2.1 Object types
2.7.2.1.1 Integer
2.7.2.1.2 Number
2.7.3 Glyph procedure operators
2.7.3.1 Operators for starting and finishing
2.7.3.1.1 Reference point and escapement (rpe)
2.7.3.1.2 Horizontal reference point and escapement
           (xrpe)
2.7.3.1.3 End glyph (endglyph)
2.7.3.1.4 Standard indexed accented glyph (siag)
2.7.3.2 Path construction operators
2.7.3.2.1 Closepath (closepath)
2.7.3.2.2 Horizontal lineto (hlineto)
2.7.3.2.3 Horizontal moveto (hmoveto)
2.7.3.2.4 Horizontal-vertical curveto (hvcurveto)
2.7.3.2.5 Relative lineto (rlineto)
2.7.3.2.6 Relative moveto (rmoveto)
2.7.3.2.7 Relative relative curveto (rrcurveto)
2.7.3.2.8 Vertical-horizontal curveto (vhcurveto)
2.7.3.2.9 Vertical lineto (vlineto)
2.7.3.2.10 Vertical moveto (vmoveto)
2.7.3.2.11 Set current point (setcurrentpoint)
2.7.3.3 Hint operators
2.7.3.3.1 Dot section (dotsection)
2.7.3.3.2 Horizontal stem (hstem)
2.7.3.3.3 Horizontal stem 3 (hstem3)
2.7.3.3.4 Vertical stem (vstem)
2.7.3.3.5 Vertical stem 3 (vstem3)
2.7.3.4 Arithmetic operator
2.7.3.4.1 Divide (div)
2.7.3.5 Subroutine and subroutine-related operators
2.7.3.5.1 Call subroutine (callsubr)
2.7.3.5.2 Return (return)
2.7.3.5.3 Call utility subroutine (callutilsubr)
2.7.3.5.4 Return value (retval)
2.8 Subroutines
2.8.1 Calling utility subroutines
2.8.1.1 Calling utility subroutine 0
2.8.1.2 Calling utility subroutine 1
2.8.1.3 Calling utility subroutine 2
2.8.1.4 Calling utility subroutine 3
2.8.2 Hint substitution (Utility subroutine 3)
2.8.3 Flex mechanism
2.8.4 First four Subrs entries
2.8.5 Composite glyphs
2.8.5.1 Using the siag operator to create composite
         glyphs
2.8.5.2 Using subroutines to create composite glyphs
2.9 Interchange format
2.9.1 Extensions to font interchange format for type
         1 glyph shape information
2.9.1.1 ASN.1 interchange format
2.9.1.2 SGML interchange format
2.9.2 Interchange format for glyph procedures
2.9.2.1 Glyph procedure number representation
2.9.2.2 Glyph operator interchange representation
2.9.2.3 Glyph procedure encryption
Annexes
A. Default Accent Component Table
B. Compatibility with the installed base
B.1 Compatibility with installed base of glyph
         procedure interpreters
B.1.1 GlyphEncrypt property (GLYPHENCRYPT)
B.1.2 IenIV property (LENIV)
B.1.3 Hint zone values for ghost stems
B.1.4 Round stem up (ROUNDSTEMUP)
B.1.5 MinFeature (MINFEATURE)
B.1.6 Password (PASSWORD)
B.1.7 Accent Component Table
B.1.8 Interchange format
B.1.8.1 ASN.1 interchange format
B.1.8.2 SGML interchange format
C. Composite glyphs
C.1 Composite glyphs
C.1.1 Using the siag operator to create composite
         glyphs
C.1.2 Using subroutines to create composite glyphs
D. Interchange sample
Alphabetical index

Specifies the architecture and interchange formats of glyph shape representations. Coverage includes flat position, overshoot position, flex mechanism, path direction, hint zone, glyph procedure language, and alignment zone. Also gives detailed annexes.

Committee
IST/41
DevelopmentNote
Supersedes 91/64950 DC. (07/2005) Supersedes 08/30175278 DC. (09/2009) Available in CD-ROM format only. (10/2013)
DocumentType
Standard
Pages
64
PublisherName
British Standards Institution
Status
Current
SupersededBy
Supersedes

Standards Relationship
ISO/IEC 9541-3:1994 Identical

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.