{"id":231033,"date":"2024-10-19T15:02:29","date_gmt":"2024-10-19T15:02:29","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-24534-52011\/"},"modified":"2024-10-25T09:19:41","modified_gmt":"2024-10-25T09:19:41","slug":"bs-iso-24534-52011","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-24534-52011\/","title":{"rendered":"BS ISO 24534-5:2011"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
9<\/td>\n | 1 Scope <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 4 Symbols and abbreviations <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 5 System communications concept 5.1 General 5.2 Overview 5.2.1 Vehicle registration identification <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 5.2.2 System concept and supported interfaces <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 5.2.3 Roles involved 5.2.4 The communications context for reading <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 5.2.5 The communications context for writing 5.2.6 Service levels supported <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 5.3 Security services 5.3.1 Assumptions 5.3.2 Entity authentication while reading ERI data 5.3.3 Confidentiality while reading ERI data <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 5.3.4 Keys for authentication and confidentiality 5.3.5 Access control to ERI data 5.4 Communication architecture description 5.4.1 Overall communication concept for identifying vehicles <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 5.4.2 Overall communication concept for remote access 5.4.3 The onboard communication <\/td>\n<\/tr>\n | ||||||
24<\/td>\n | 5.5 Interfaces 5.5.1 The short-range air interface <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 5.5.2 The onboard interface with the ERT 6 Interface requirements 6.1 Overview 6.2 Abstract transaction definitions 6.2.1 Transaction overview <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 6.2.2 Session phases 6.2.3 ERI transactions and protocol data units 6.2.3.1 The transaction concept <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 6.2.3.2 ERI protocol data units <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 6.2.4 Mutual authentication 1 6.2.4.1 Service definition 6.2.4.2 Protocol specification 6.2.5 Mutual authentication 2 6.2.5.1 Service definition <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 6.2.5.2 Protocol specification 6.2.6 Get secret key ERI data 6.2.6.1 Service definition 6.2.6.2 The request primitive 6.2.6.3 The response primitive <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 6.2.6.4 Protocol specification 6.2.7 Set secret key ERI data 6.2.7.1 Service definition 6.2.7.2 The request primitive 6.2.7.3 The response primitive 6.2.7.4 Protocol specification <\/td>\n<\/tr>\n | ||||||
31<\/td>\n | 6.2.8 Commissioning secret key ERT 6.2.8.1 Service definition 6.2.8.2 The request primitive 6.2.8.3 The response primitive 6.2.8.4 Protocol specification 6.2.9 Decommissioning secret key ERT 6.2.9.1 Service definition <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 6.2.9.2 The request primitive 6.2.9.3 The response primitive 6.2.9.4 Protocol specification 6.2.10 Update access control list 6.2.10.1 Service definition <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | 6.2.10.2 The request primitive 6.2.10.3 The response primitive 6.2.10.4 Protocol specification 6.2.11 Get ciphertext access control list entry 6.2.11.1 Service definition 6.2.11.2 The request primitive 6.2.11.3 The response primitive <\/td>\n<\/tr>\n | ||||||
34<\/td>\n | 6.2.11.4 Protocol specification 6.2.12 End of Session 6.2.12.1 Service definition 6.2.12.2 The request primitive 6.2.12.3 The response primitive 6.2.12.4 Protocol specification <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | 6.3 The onboard interface to the ERT 6.3.1 General ERT interface requirements 6.3.2 An ISO 14443 interface 6.4 The short-range air interface 6.4.1 General short-range air interface requirements <\/td>\n<\/tr>\n | ||||||
36<\/td>\n | 6.4.2 The use of the DRSC application layer protocol 6.4.2.1 General 6.4.2.2 Use of the DSRC initialization service 6.4.2.3 Use of the DSRC action request <\/td>\n<\/tr>\n | ||||||
37<\/td>\n | 6.4.2.4 Use of the DSRC action response 6.4.3 Lower layers 6.5 Remote access interface <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Intelligent transport systems. Automatic vehicle and equipment identification. Electronic Registration Identification (ERI) for vehicles – Secure communications using symmetrical techniques<\/b><\/p>\n |