DIN EN ISO 12813 Electronic fee collection - Compliance check communication for autonomous systems (ISO 12813:2015)
Данный раздел/документ содержится в продуктах:
- Техэксперт: Машиностроительный комплекс
- Картотека зарубежных и международных стандартов
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- 35
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- 35.040
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- ISO ISO/IEC 29190 Information technology - Security techniques - Privacy capability assessment model - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- ISO ISO/IEC 29115 Information technology - Security techniques - Entity authentication assurance framework - First Edition
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN CEN/TS 419241 Security Requirements for Trustworthy Systems supporting Server Signing
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- DIN EN 419251-1 Security requirements for device for authentication - Part 1: Protection profile for core functionality
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- ISO ISO/IEC 10181-2 Information Technology - Open Systems Interconnection - Security Frameworks for Open Systems: Authentication Framework - First Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- CSA CAN/CSA-ISO/IEC 9798-1:12 Information Technology - Security Techniques - Entity Authentication Mechanisms - Part 1: General
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 11770-1 Information technology - Security techniques - Key management - Part 1: Framework - Second Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27033-5 Information technology - Security techniques - Network security - Part 5: Securing communications across networks using Virtual Private Network (VPNs) - First Edition
- ISO ISO/IEC 27005 Information technology - Security techniques - Information security risk management - Second Edition
- CSA CAN/CSA-ISO/IEC 27033-1-10 Information technology - Security techniques - Network security - Part 1: Overview and concepts
- ISO ISO/IEC 27000 Information technology - Security techniques - Information security management systems - Overview and vocabulary - Fourth Edition
- ISO ISO/IEC 27002 Information technology — Security techniques — Code of practice for information security management - Second Edition
- Картотека зарубежных и международных стандартов
Deutsches Institut fur Normung e. V.
Electronic fee collection - Compliance check communication for autonomous systems (ISO 12813:2015)
N EN ISO 12813
Annotation
This International Standard defines requirements for short-range communication for the purposes of compliance checking in autonomous electronic fee-collecting systems. Compliance checking communication (CCC) takes place between a road vehicle’s on-board equipment (OBE) and an outside interrogator (road-side mounted equipment, mobile device or hand-held unit), and serves to establish whether the data that are delivered by the OBE correctly reflect the road usage of the corresponding vehicle according to the rules of the pertinent toll regime.
The operator of the compliance checking interrogator is assumed to be part of the toll charging role as defined in ISO 17573. The CCC permits identification of the OBE, vehicle and contract, and verification of whether the driver has fulfilled his obligations and the checking status and performance of the OBE. The CCC reads, but does not write, OBE data.
This International Standard is applicable to OBE in an autonomous mode of operation; it is not applicable to compliance checking in dedicated short-range communication (DSRC)-based charging systems.
It defines data syntax and semantics, but does not define a communication sequence. All the attributes defined herein are required in any OBE claimed to be compliant with this International Standard, even if some values are set to “not defined” in cases where certain functionality is not present in an OBE. The interrogator is free to choose which attributes are read, as well as the sequence in which they are read. In order to achieve compatibility with existing systems, the communication makes use of the attributes defined in ISO 14906 wherever useful.
The CCC is suitable for a range of short-range communication media. Specific definitions are given for the CEN-DSRC as specified in EN 15509, as well as for the use of ISO CALM IR, the Italian DSRC as specified in ETSI ES 200 674-1 and ARIB DSRC as alternatives to the CEN-DSRC. The attributes and functions defined are for compliance checking by means of the DSRC communication services provided by DSRC layer 7, with the CCC attributes and functions made available to the CCC applications at the road-side equipment (RSE) and OBE. The attributes and functions are defined on the level of application data units (ADU).



