BSI PD CEN/TS 16702-2:2020
$198.66
Electronic fee collection. Secure monitoring for autonomous toll systems – Trusted recorder
Published By | Publication Date | Number of Pages |
BSI | 2020 | 58 |
This document defines the requirements for the secure application module (SAM) used in the secure monitoring compliance checking concept. It specifies two different configurations of a SAM:
-
trusted recorder, for use inside a piece of on-board equipment (OBE);
-
verification SAM, for use in other EFC system entities.
This document describes
-
terms and definitions used to describe the configurations of the two SAMs;
-
operation of the two SAMs in the secure monitoring compliance checking concept;
-
functional requirements for the configurations of the two SAMs, including a classification of different security levels;
-
the interface, by means of transactions, messages and data elements, between an OBE or front end and the trusted recorder;
-
requirements on basic security primitives and key management procedures to support Secure Monitoring using a trusted recorder.
This document is consistent with the EFC architecture as defined in EN ISO 17573?1 and the derived suite of standards and Technical Specifications, especially CEN/TS 16702?1 and CEN ISO/TS 19299.
The following is outside the scope of this document:
-
The life cycle of a SAM and the way in which this is managed;
-
The interface commands needed to get a SAM in an operational state;
-
The interface definition of the verification SAM;
-
Definition of a hardware platform for the implementation of a SAM.
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
9 | 1 Scope 2 Normative references |
10 | 3 Terms and definitions |
14 | 4 Symbols and abbreviations |
15 | 5 SAM concept and scenarios 5.1 General 5.2 The concepts of TR and verification SAM |
17 | 5.3 Scenarios for a trusted recorder 5.3.1 General 5.3.2 Real-Time Freezing without using a Trusted Time Source |
18 | 5.3.3 Real-Time Freezing using a Trusted Time Source 5.4 Scenarios for a verification SAM 5.4.1 General 5.4.2 MAC verification |
19 | 5.5 General Scenarios 5.5.1 General 5.5.2 Assigning a Toll Domain Counter |
20 | 5.5.3 Obtaining SAM Information |
21 | 6 Functional requirements 6.1 General 6.1.1 SAM options |
22 | 6.1.2 Presentation of requirements 6.2 Basic requirements |
23 | 6.3 Key management 6.4 Cryptographic functions |
24 | 6.5 Real-time freezing |
25 | 6.6 Verification SAM 6.7 Toll Domain Counter |
26 | 6.8 Trusted time source |
27 | 6.9 Security protection level |
28 | 7 Interface requirements 7.1 General 7.2 Calculate MAC for real-time freezing 7.2.1 General |
29 | 7.2.2 Calculation of MAC 7.2.3 Coding of request |
30 | Coding of response 7.3 Calculate digital signature for real-time freezing 7.3.1 General |
31 | 7.3.2 Calculation of digital signature 7.3.3 Coding of request 7.3.4 Coding of response |
32 | 7.4 Get device information 7.4.1 General 7.4.2 Coding of request |
33 | 7.4.3 Coding of response 7.5 Get toll domain counter information 7.5.1 General 7.5.2 Coding of request |
34 | 7.5.3 Coding of response 7.6 Get key information 7.6.1 General |
35 | 7.6.2 Coding of request 7.6.3 Coding of response |
36 | 7.7 Error handling |
37 | Annex A (normative)Data type specification A.1 General A.2 Data specifications |
38 | Annex B (normative)Implementation Conformance Statement (ICS) proforma B.1 Guidance for completing the ICS proforma B.1.1 Purposes and structure B.1.2 Abbreviations and conventions B.1.2.1 General B.1.2.2 Item column B.1.2.3 Item description column |
39 | B.1.2.4 Status column B.1.2.5 Reference column B.1.2.6 Support column B.1.2.7 Values supported column B.1.2.8 References to items |
40 | B.1.2.9 Prerequisite line B.1.3 Instructions for completing the ICS proforma |
41 | B.2 ICS proforma for trusted recorder B.2.1 Identification implementation B.2.1.1 Identification of TR supplier B.2.1.2 Identification of TR B.2.2 Identification of the technical specification B.2.3 Global statement of conformance |
42 | B.2.4 ICS proforma tables for TR B.2.4.1 TR Configurations B.2.4.2 Requirements |
45 | B.2.4.3 Interface requirements |
46 | B.3 ICS proforma for verification SAM B.3.1 Identification implementation B.3.1.1 Identification of verification SAM supplier B.3.1.2 Identification of verification SAM B.3.2 Identification of the technical specification B.3.3 Global statement of conformance |
47 | B.3.4 ICS proforma tables for verification SAM B.3.4.1 TR Configurations B.3.4.2 Requirements |
50 | B.3.4.3 Interface requirements |
51 | Annex C (informative)Trusted Time Source implementation issues C.1 General C.2 Possible implementations of a TTS C.2.1 TTS based on a real time clock C.2.1.1 General C.2.1.2 Smartcard IC-based TR implementations C.2.1.3 TR with external TTS C.2.2 TTS with the need for external calibration C.2.2.1 General |
52 | C.2.2.2 GNSS-based calibration C.2.2.3 Calibration by trusted third party C.2.2.4 Network Time Protocol based calibration C.3 TTS power supply |
53 | Annex D (informative)Use of this document for the EETS D.1 General D.2 Overall relationship between European standardization and the EETS D.3 European standardization work supporting the EETS |
54 | D.4 Correspondence between this document and the EETS |