• Shopping Cart
    There are no items in your cart

CEN/TS 16702-2:2015

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by

Electronic fee collection - Secure monitoring for autonomous toll systems - Part 2: Trusted recorder

Withdrawn date

03-11-2023

Superseded by

CEN/TS 16702-2:2020

Published date

03-25-2015

Sorry this product is not available in your region.

Foreword
Introduction
1 Scope
2 Normative references
3 Terms and definitions
4 Symbols and abbreviations
5 SAM concept and scenarios
6 Functional requirements
7 Interface requirements
Annex A (normative) - Data type specification
Annex B (normative) - Implementation Conformance
        Statement (ICS) proforma
Annex C (informative) - Trusted time source
        implementation issues
Annex D (informative) - Use of this Technical
        Specification for the EETS
Bibliography

This Technical Specification defines the requirements for the Secure Application Module (SAM) used in the secure monitoring compliance checking concept. It specifies two different configurations of a SAM:—Trusted Recorder, for use inside an OBE;—Verification SAM, for use in other EFC system entities.The Technical Specification describes—terms and definitions used to describe the two Secure Application Module configurations;—operation of the two Secure Application Modules in the secure monitoring compliance checking concept;—functional requirements for the two Secure Application Modules configurations, including a classification of different security levels;—the interface, by means of transactions, messages and data elements, between an OBE or Front End and the Trusted Recorder;—requirements on basic security primitives and key management procedures to support Secure Monitoring using a Trusted Recorder.This Technical Specification is consistent with the EFC architecture as defined in ISO 17573 and the derived suite of standards and Technical Specifications, especially CEN/TS 16702-1:2014 and CEN/TS 16439.The following is outside the scope of this Technical Specification:—The life cycle of a Secure Application Module and the way in which this is managed.—The interface commands needed to get a Secure Application Module in an operational state.—The interface definition of the Verification SAM.—Definition of a hardware platform for the implementation of a Secure Application Module.

Committee
CEN/TC 278
DocumentType
Technical Specification
PublisherName
Comite Europeen de Normalisation
Status
Withdrawn
SupersededBy

BS EN ISO 12813 : 2015 ELECTRONIC FEE COLLECTION - COMPLIANCE CHECK COMMUNICATION FOR AUTONOMOUS SYSTEMS
CEN ISO/TS 19299:2015 Electronic fee collection - Security framework (ISO/TS 19299:2015)
CEN ISO/TS 17574:2017 Electronic fee collection - Guidelines for security protection profiles (ISO/TS 17574:2017)
ISO/TS 19299:2015 Electronic fee collection Security framework
DIN CEN ISO/TS 19299;DIN SPEC 74125:2016-02 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
PD CEN ISO/TS 19299:2015 Electronic fee collection. Security framework
S.R. CEN ISO/TS 17574:2017 ELECTRONIC FEE COLLECTION - GUIDELINES FOR SECURITY PROTECTION PROFILES (ISO/TS 17574:2017)
S.R. CEN ISO/TS 19299:2015 ELECTRONIC FEE COLLECTION - SECURITY FRAMEWORK (ISO/TS 19299:2015)
ISO/TS 17574:2017 Electronic fee collection — Guidelines for security protection profiles
PD CEN ISO/TS 17574:2017 Electronic fee collection. Guidelines for security protection profiles

ISO/IEC 18031:2011 Information technology Security techniques Random bit generation
ISO 12855:2015 Electronic fee collection Information exchange between service provision and toll charging
ISO/IEC 9646-7:1995 Information technology Open Systems Interconnection Conformance testing methodology and framework Part 7: Implementation Conformance Statements
ISO/IEC 14888-3:2016 Information technology — Security techniques — Digital signatures with appendix — Part 3: Discrete logarithm based mechanisms
CEN/TS 16439:2013 Electronic fee collection - Security framework
ISO 17573:2010 Electronic fee collection Systems architecture for vehicle-related tolling
ISO/IEC 18033-3:2010 Information technology Security techniques Encryption algorithms Part 3: Block ciphers
FIPS PUB 140-2 : 0 SECURITY REQUIREMENTS FOR CRYPTOGRAPHIC MODULES
ISO/IEC 19790:2012 Information technology — Security techniques — Security requirements for cryptographic modules
CEN/TS 16702-1:2014 Electronic fee collection - Secure monitoring for autonomous toll systems - Part 1: Compliance checking
ISO 14816:2005 Road transport and traffic telematics — Automatic vehicle and equipment identification — Numbering and data structure
EN ISO 12855:2015 Electronic fee collection - Information exchange between service provision and toll charging (ISO 12855:2015)
ISO 14906:2011 Electronic fee collection Application interface definition for dedicated short-range communication
ISO/IEC 7816-4:2013 Identification cards Integrated circuit cards Part 4: Organization, security and commands for interchange
ISO/IEC 9797-1:2011 Information technology Security techniques Message Authentication Codes (MACs) Part 1: Mechanisms using a block cipher
ISO/IEC 10118-3:2004 Information technology Security techniques Hash-functions Part 3: Dedicated hash-functions
ISO/IEC 7812-1:2017 Identification cards — Identification of issuers — Part 1: Numbering system
ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.