Shopping Cart

No products in the cart.

BSI PD CEN/TS 16702-2:2020

$198.66

Electronic fee collection. Secure monitoring for autonomous toll systems – Trusted recorder

Published By Publication Date Number of Pages
BSI 2020 58
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This document defines the requirements for the secure application module (SAM) used in the secure monitoring compliance checking concept. It specifies two different configurations of a SAM:

  • trusted recorder, for use inside a piece of on-board equipment (OBE);

  • verification SAM, for use in other EFC system entities.

This document describes

  • terms and definitions used to describe the configurations of the two SAMs;

  • operation of the two SAMs in the secure monitoring compliance checking concept;

  • functional requirements for the configurations of the two SAMs, including a classification of different security levels;

  • the interface, by means of transactions, messages and data elements, between an OBE or front end and the trusted recorder;

  • requirements on basic security primitives and key management procedures to support Secure Monitoring using a trusted recorder.

This document is consistent with the EFC architecture as defined in EN ISO 17573?1 and the derived suite of standards and Technical Specifications, especially CEN/TS 16702?1 and CEN ISO/TS 19299.

The following is outside the scope of this document:

  • The life cycle of a SAM and the way in which this is managed;

  • The interface commands needed to get a SAM in an operational state;

  • The interface definition of the verification SAM;

  • Definition of a hardware platform for the implementation of a SAM.

PDF Catalog

PDF Pages PDF Title
2 undefined
9 1 Scope
2 Normative references
10 3 Terms and definitions
14 4 Symbols and abbreviations
15 5 SAM concept and scenarios
5.1 General
5.2 The concepts of TR and verification SAM
17 5.3 Scenarios for a trusted recorder
5.3.1 General
5.3.2 Real-Time Freezing without using a Trusted Time Source
18 5.3.3 Real-Time Freezing using a Trusted Time Source
5.4 Scenarios for a verification SAM
5.4.1 General
5.4.2 MAC verification
19 5.5 General Scenarios
5.5.1 General
5.5.2 Assigning a Toll Domain Counter
20 5.5.3 Obtaining SAM Information
21 6 Functional requirements
6.1 General
6.1.1 SAM options
22 6.1.2 Presentation of requirements
6.2 Basic requirements
23 6.3 Key management
6.4 Cryptographic functions
24 6.5 Real-time freezing
25 6.6 Verification SAM
6.7 Toll Domain Counter
26 6.8 Trusted time source
27 6.9 Security protection level
28 7 Interface requirements
7.1 General
7.2 Calculate MAC for real-time freezing
7.2.1 General
29 7.2.2 Calculation of MAC
7.2.3 Coding of request
30 Coding of response
7.3 Calculate digital signature for real-time freezing
7.3.1 General
31 7.3.2 Calculation of digital signature
7.3.3 Coding of request
7.3.4 Coding of response
32 7.4 Get device information
7.4.1 General
7.4.2 Coding of request
33 7.4.3 Coding of response
7.5 Get toll domain counter information
7.5.1 General
7.5.2 Coding of request
34 7.5.3 Coding of response
7.6 Get key information
7.6.1 General
35 7.6.2 Coding of request
7.6.3 Coding of response
36 7.7 Error handling
37 Annex A (normative)Data type specification
A.1 General
A.2 Data specifications
38 Annex B (normative)Implementation Conformance Statement (ICS) proforma
B.1 Guidance for completing the ICS proforma
B.1.1 Purposes and structure
B.1.2 Abbreviations and conventions
B.1.2.1 General
B.1.2.2 Item column
B.1.2.3 Item description column
39 B.1.2.4 Status column
B.1.2.5 Reference column
B.1.2.6 Support column
B.1.2.7 Values supported column
B.1.2.8 References to items
40 B.1.2.9 Prerequisite line
B.1.3 Instructions for completing the ICS proforma
41 B.2 ICS proforma for trusted recorder
B.2.1 Identification implementation
B.2.1.1 Identification of TR supplier
B.2.1.2 Identification of TR
B.2.2 Identification of the technical specification
B.2.3 Global statement of conformance
42 B.2.4 ICS proforma tables for TR
B.2.4.1 TR Configurations
B.2.4.2 Requirements
45 B.2.4.3 Interface requirements
46 B.3 ICS proforma for verification SAM
B.3.1 Identification implementation
B.3.1.1 Identification of verification SAM supplier
B.3.1.2 Identification of verification SAM
B.3.2 Identification of the technical specification
B.3.3 Global statement of conformance
47 B.3.4 ICS proforma tables for verification SAM
B.3.4.1 TR Configurations
B.3.4.2 Requirements
50 B.3.4.3 Interface requirements
51 Annex C (informative)Trusted Time Source implementation issues
C.1 General
C.2 Possible implementations of a TTS
C.2.1 TTS based on a real time clock
C.2.1.1 General
C.2.1.2 Smartcard IC-based TR implementations
C.2.1.3 TR with external TTS
C.2.2 TTS with the need for external calibration
C.2.2.1 General
52 C.2.2.2 GNSS-based calibration
C.2.2.3 Calibration by trusted third party
C.2.2.4 Network Time Protocol based calibration
C.3 TTS power supply
53 Annex D (informative)Use of this document for the EETS
D.1 General
D.2 Overall relationship between European standardization and the EETS
D.3 European standardization work supporting the EETS
54 D.4 Correspondence between this document and the EETS
BSI PD CEN/TS 16702-2:2020
$198.66