PD CEN/TS 16702-2:2015
Superseded
A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.
View Superseded by
Electronic fee collection. Secure monitoring for autonomous toll systems Trusted recorder
Hardcopy , PDF
08-04-2020
English
30-04-2015
Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviations
5 SAM concept and scenarios
6 Functional requirements
7 Interface requirements
Annex A (normative) - Data type specification
Annex B (normative) - Implementation Conformance
Statement (ICS) proforma
Annex C (informative) - Trusted time source
implementation issues
Annex D (informative) - Use of this Technical
Specification for the EETS
Bibliography
Specifies the requirements for the Secure Application Module (SAM) used in the secure monitoring compliance checking concept.
Committee |
EPL/278
|
DocumentType |
Standard
|
Pages |
52
|
PublisherName |
British Standards Institution
|
Status |
Superseded
|
SupersededBy |
This Technical Specification defines the requirements for the Secure Application Module (SAM) used in the secure monitoring compliance checking concept. It specifies two different configurations of a SAM: — Trusted Recorder, for use inside an OBE; — Verification SAM, for use in other EFC system entities. The Technical Specification describes — terms and definitions used to describe the two Secure Application Module configurations; — operation of the two Secure Application Modules in the secure monitoring compliance checking concept; — functional requirements for the two Secure Application Modules configurations, including a classification of different security levels; — the interface, by means of transactions, messages and data elements, between an OBE or Front End and the Trusted Recorder; — requirements on basic security primitives and key management procedures to support Secure Monitoring using a Trusted Recorder. This Technical Specification is consistent with the EFC architecture as defined in ISO 17573 and the derived suite of standards and Technical Specifications, especially CEN/TS 16702-1:2014 and CEN/TS 16439. The following is outside the scope of this Technical Specification: — The life cycle of a Secure Application Module and the way in which this is managed. — The interface commands needed to get a Secure Application Module in an operational state. — The interface definition of the Verification SAM. — Definition of a hardware platform for the implementation of a Secure Application Module.
Standards | Relationship |
CEN/TS 16702-2:2015 | Identical |
ISO/IEC 18031:2011 | Information technology Security techniques Random bit generation |
ISO 12855:2015 | Electronic fee collection Information exchange between service provision and toll charging |
ISO/IEC 9646-7:1995 | Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements |
ISO/IEC 14888-3:2016 | Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms |
CEN/TS 16439:2013 | Electronic fee collection - Security framework |
ISO 17573:2010 | Electronic fee collection Systems architecture for vehicle-related tolling |
ISO/IEC 18033-3:2010 | Information technology Security techniques Encryption algorithms Part 3: Block ciphers |
FIPS PUB 140-2 : 0 | SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES |
ISO/IEC 19790:2012 | Information technology — Security techniques — Security requirements for cryptographic modules |
CEN/TS 16702-1:2014 | Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking |
ISO 14816:2005 | Road transport and traffic telematics — Automatic vehicle and equipment identification — Numbering and data structure |
EN ISO 12855:2015 | Electronic fee collection - Information exchange between service provision and toll charging (ISO 12855:2015) |
ISO 14906:2011 | Electronic fee collection Application interface definition for dedicated short-range communication |
ISO/IEC 7816-4:2013 | Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange |
ISO/IEC 9797-1:2011 | Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher |
ISO/IEC 10118-3:2004 | Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions |
ISO/IEC 7812-1:2017 | Identification cards — Identification of issuers — Part 1: Numbering system |
ISO/IEC 27000:2016 | Information technology Security techniques Information security management systems Overview and vocabulary |
Access your standards online with a subscription
Features
-
Simple online access to standards, technical information and regulations.
-
Critical updates of standards and customisable alerts and notifications.
-
Multi-user online standards collection: secure, flexible and cost effective.