{"id":422753,"date":"2024-10-20T06:42:45","date_gmt":"2024-10-20T06:42:45","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iec-63173-22022\/"},"modified":"2024-10-26T12:35:09","modified_gmt":"2024-10-26T12:35:09","slug":"bs-iec-63173-22022","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iec-63173-22022\/","title":{"rendered":"BS IEC 63173-2:2022"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
4<\/td>\nEnglish
CONTENTS <\/td>\n<\/tr>\n
15<\/td>\nFOREWORD <\/td>\n<\/tr>\n
17<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
18<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
19<\/td>\n3 Terms, definitions and abbreviated terms
3.1 Terms and definitions <\/td>\n<\/tr>\n
23<\/td>\n3.2 Abbreviated terms
4 General description of SECOM
4.1 General <\/td>\n<\/tr>\n
24<\/td>\n4.2 Information service interface
Figures
Figure 1 \u2013 Overview of SECOM <\/td>\n<\/tr>\n
25<\/td>\n4.3 Information security
4.3.1 Measures
4.3.2 SECOM PKI <\/td>\n<\/tr>\n
26<\/td>\n4.3.3 Communication channel security
4.3.4 Data protection
Figure 2 \u2013 Secure communication channel <\/td>\n<\/tr>\n
27<\/td>\nFigure 3 \u2013 Illustration of what parts of the message are protected by the two signatures <\/td>\n<\/tr>\n
28<\/td>\n4.3.5 Certificate revocation status
4.4 Service discoverability
Figure 4 \u2013 Envelope and data validation <\/td>\n<\/tr>\n
29<\/td>\n4.5 Structure of this document
5 SECOM information service interface
5.1 General <\/td>\n<\/tr>\n
30<\/td>\n5.2 How to read descriptions of service interface definition
Figure 5 \u2013 Service definition model for the service interface definitions <\/td>\n<\/tr>\n
31<\/td>\n5.3 Service technology and service transportation protocol
Tables
Table 1 \u2013 Read instructions for tables in service interface definitions <\/td>\n<\/tr>\n
32<\/td>\n5.4 Service interface versioning
5.5 Pagination
5.6 Common information objects and data types
5.6.1 General
Table 2 \u2013 SECOM Service interface versioning <\/td>\n<\/tr>\n
33<\/td>\n5.6.2 Basic data types
5.6.3 SECOM_ExchangeMetadataObject
Table 3 \u2013 Basic data types <\/td>\n<\/tr>\n
34<\/td>\n5.6.4 Transfer of public key
Table 4 \u2013 SECOM_ExchangeMetadataObject
Table 5 \u2013 DigitalSignatureValueObject <\/td>\n<\/tr>\n
35<\/td>\nFigure 6 \u2013 Example in C# of conversion from PEM format to minified public key
Figure 7 \u2013 Example of a public key in PEM format converted to a single line string <\/td>\n<\/tr>\n
36<\/td>\n5.6.5 PaginationObject
Figure 8 \u2013 Example in C# of conversion from minified public key to PEM format
Figure 9 \u2013 Example of a minified public key string restored to the original PEM format <\/td>\n<\/tr>\n
37<\/td>\n5.6.6 ContainerTypeEnum
5.6.7 SECOM_DataProductType
Table 6 \u2013 PaginationObject
Table 7 \u2013 ContainerTypeEnum
Table 8 \u2013 SECOM_DataProductType <\/td>\n<\/tr>\n
38<\/td>\n5.6.8 SECOM_ResponseCodeEnum
5.6.9 AckRequest Enum
Table 9 \u2013 SECOM_ResponseCodeEnum
Table 10 \u2013 AckRequest Enum <\/td>\n<\/tr>\n
39<\/td>\n5.6.10 Common HTTP response codes
5.6.11 Well-known text \u2013 WKT
Table 11 \u2013 Common HTTP codes
Table 12 \u2013 Supported WKT geometric objects <\/td>\n<\/tr>\n
40<\/td>\n5.6.12 Universally Unique Identifier \u2013 UUID
Figure 10 \u2013 UUID version and variant
Table 13 \u2013 UUID variants <\/td>\n<\/tr>\n
41<\/td>\n5.6.13 UN\/LOCODE
5.7 Service interface definitions
5.7.1 General
Table 14 \u2013 UUID versions
Table 15 \u2013 Service interfaces overview <\/td>\n<\/tr>\n
42<\/td>\n5.7.2 Service interface \u2013 Upload <\/td>\n<\/tr>\n
43<\/td>\nFigure 11 \u2013 Upload interface UML diagram <\/td>\n<\/tr>\n
44<\/td>\nTable 16 \u2013 Information input for Upload interface <\/td>\n<\/tr>\n
45<\/td>\nTable 17 \u2013 Information output for Upload interface
Table 18 \u2013 REST implementation of Upload <\/td>\n<\/tr>\n
46<\/td>\nTable 19 \u2013 HTTP Response codes and message in response object <\/td>\n<\/tr>\n
47<\/td>\nFigure 12 \u2013 Sequence diagram for upload signedunclassified data with acknowledgement <\/td>\n<\/tr>\n
48<\/td>\n5.7.3 Service interface \u2013 Upload Link <\/td>\n<\/tr>\n
49<\/td>\nFigure 13 \u2013 Update link interface UML diagram <\/td>\n<\/tr>\n
50<\/td>\nTable 20 \u2013 Information input for Upload Link interface <\/td>\n<\/tr>\n
51<\/td>\nTable 21 \u2013 Information output for Upload Link interface
Table 22 \u2013 REST implementation of Upload Link
Table 23 \u2013 HTTP Response codes and message in response object <\/td>\n<\/tr>\n
53<\/td>\n5.7.4 Service interface \u2013 Acknowledgement
Figure 14 \u2013 Sequence diagram for Upload link to large data <\/td>\n<\/tr>\n
54<\/td>\nFigure 15 \u2013 Acknowledgement interface UML diagram <\/td>\n<\/tr>\n
55<\/td>\nTable 24 \u2013 Information input for Acknowledgement interface
Table 25 \u2013 Enumerations for not acknowledged
Table 26 \u2013 Information output for Acknowledgement interface <\/td>\n<\/tr>\n
56<\/td>\nTable 27 \u2013 Enumerations for Acknowledgement interface
Table 28 \u2013 REST implementation of acknowledgement <\/td>\n<\/tr>\n
57<\/td>\n5.7.5 Service interface \u2013 Get
Figure 16 \u2013 Sequence diagram for Acknowledgement interface
Table 29 \u2013 HTTP Response codes and response message <\/td>\n<\/tr>\n
58<\/td>\nFigure 17 \u2013 Get interface UML diagram <\/td>\n<\/tr>\n
59<\/td>\nTable 30 \u2013 Information input for Get interface
Table 31 \u2013 Information output for Get interface <\/td>\n<\/tr>\n
60<\/td>\nTable 32 \u2013 REST implementation of Get
Table 33 \u2013 HTTP Response code and message of Get <\/td>\n<\/tr>\n
61<\/td>\nFigure 18 \u2013 Sequence diagram for Get interface <\/td>\n<\/tr>\n
62<\/td>\n5.7.6 Service interface \u2013 Get Summary
Figure 19 \u2013 Sequence diagram for Get interface and classified data <\/td>\n<\/tr>\n
63<\/td>\nFigure 20 \u2013 Get Summary interface UML diagram
Table 34 \u2013 Information input for Get Summary interface <\/td>\n<\/tr>\n
64<\/td>\nTable 35 \u2013 Information output for Get Summary interface <\/td>\n<\/tr>\n
65<\/td>\nTable 36 \u2013 REST implementation of Get Summary
Table 37 \u2013 HTTP Response codes and messages of Get Summary <\/td>\n<\/tr>\n
66<\/td>\n5.7.7 Service interface \u2013 Get By Link
Figure 21 \u2013 Sequence diagram for Get Summary interface
Figure 22 \u2013 Get By Link interface in UML
Table 38 \u2013 Information input for Get By Link interface <\/td>\n<\/tr>\n
67<\/td>\nTable 39 \u2013 Information output for Get By Link interface
Table 40 \u2013 REST implementation of Get By Link
Table 41 \u2013 HTTP Response code and message of Get By Link <\/td>\n<\/tr>\n
68<\/td>\n5.7.8 Service interface \u2013 Access
Figure 23 \u2013 Sequence diagram for Get By Link interface <\/td>\n<\/tr>\n
69<\/td>\nFigure 24 \u2013 Access interface UML diagram
Table 42 \u2013 Information input for Access interface <\/td>\n<\/tr>\n
70<\/td>\nTable 43 \u2013 Information output for Access interface
Table 44 \u2013 Enumerations for Access interface
Table 45 \u2013 Parameter binding for the operation <\/td>\n<\/tr>\n
71<\/td>\n5.7.9 Service interface \u2013 Access Notification
Figure 25 \u2013 Sequence diagram for Request Access and Access Notification interface
Table 46 \u2013 HTTP Response codes <\/td>\n<\/tr>\n
72<\/td>\nFigure 26 \u2013 Access Notification interface UML diagram
Table 47 \u2013 Information input for Access Notification interface
Table 48 \u2013 Information output for Access Notification interface <\/td>\n<\/tr>\n
73<\/td>\n5.7.10 Service interface \u2013 Subscription
Table 49 \u2013 Parameter binding for the operation
Table 50 \u2013 HTTP response codes <\/td>\n<\/tr>\n
74<\/td>\nFigure 27 \u2013 Subscribe interface UML diagram <\/td>\n<\/tr>\n
75<\/td>\nTable 51 \u2013 Information input for Subscription interface
Table 52 \u2013 Information output for Subscription interface
Table 53 \u2013 REST implementation of Subscription <\/td>\n<\/tr>\n
76<\/td>\nFigure 28 \u2013 Sequence diagram for Subscribe interface
Table 54 \u2013 HTTP response codes and messages of Subscription <\/td>\n<\/tr>\n
77<\/td>\nFigure 29 \u2013 Operational sequence diagram for Subscription interfaces <\/td>\n<\/tr>\n
78<\/td>\n5.7.11 Service interface \u2013 Remove Subscription
Figure 30 \u2013 Sequence diagram for Subscription interfaceswith external subscription request <\/td>\n<\/tr>\n
79<\/td>\nFigure 31 \u2013 Remove Subscription interface UML diagram
Table 55 \u2013 Information input for Remove Subscription interface
Table 56 \u2013 Information output for Remove Subscription interface <\/td>\n<\/tr>\n
80<\/td>\nFigure 32 \u2013 Sequence diagram for Remove Subscription interface
Table 57 \u2013 REST implementation of Remove Subscription
Table 58 \u2013 HTTP Response codes and messages of Remove Subscription <\/td>\n<\/tr>\n
81<\/td>\n5.7.12 Service interface \u2013 Subscription Notification
Figure 33 \u2013 Subscription Notification interface UML diagram
Table 59 \u2013 Information input for Subscription Notification interface
Table 60 \u2013 Information output for Subscription Notification interface <\/td>\n<\/tr>\n
82<\/td>\nTable 61 \u2013 Enumerations for Subscription Notification interface
Table 62 \u2013 Information exchange for Subscription Notification
Table 63 \u2013 HTTP response codes for Subscription Notification <\/td>\n<\/tr>\n
83<\/td>\n5.7.13 Service interface \u2013 Capability
Figure 34 \u2013 Sequence diagram for Subscription Notification interface
Table 64 \u2013 Capability example <\/td>\n<\/tr>\n
84<\/td>\nFigure 35 \u2013 Capability interface UML diagram <\/td>\n<\/tr>\n
85<\/td>\nTable 65 \u2013 Information output for Capability interface <\/td>\n<\/tr>\n
86<\/td>\n5.7.14 Service interface \u2013 Ping
Figure 36 \u2013 Sequence diagram for Capability interface
Table 66 \u2013 REST implementation of Capability
Table 67 \u2013 HTTP response codes and messages of Capability <\/td>\n<\/tr>\n
87<\/td>\nFigure 37 \u2013 Ping interface UML diagram
Table 68 \u2013 Information output for Ping interface <\/td>\n<\/tr>\n
88<\/td>\n5.7.15 Service interface \u2013 EncryptionKey
Figure 38 \u2013 Check status on service
Table 69 \u2013 REST implementation of Ping
Table 70 \u2013 HTTP response codes of Ping <\/td>\n<\/tr>\n
89<\/td>\nFigure 39 \u2013 Encryption Key interface UML diagram <\/td>\n<\/tr>\n
90<\/td>\nTable 71 \u2013 Information input for Encryption Key interface
Table 72 \u2013 Information input for Encryption Key Notification interface <\/td>\n<\/tr>\n
91<\/td>\nTable 73 \u2013 Information output for Encryption Key interface
Table 74 \u2013 REST implementation of EncryptionKey upload
Table 75 \u2013 HTTP response codes of EncryptionKey upload <\/td>\n<\/tr>\n
92<\/td>\nTable 76 \u2013 REST implementation of EncryptionKey notification
Table 77 \u2013 HTTP response codes of EncryptionKey notification <\/td>\n<\/tr>\n
93<\/td>\nFigure 40 \u2013 Operational sequence diagram for EncryptionKey upload interface <\/td>\n<\/tr>\n
94<\/td>\n5.7.16 Service interface \u2013 PublicKey
Figure 41 \u2013 Operational sequence diagram for EncryptionKey notification interface <\/td>\n<\/tr>\n
95<\/td>\nFigure 42 \u2013 PublicKey interface UML diagram
Table 78 \u2013 Information input for PublicKey interface
Table 79 \u2013 Information output for PublicKey interface GETand information input for PublicKey interface POST <\/td>\n<\/tr>\n
96<\/td>\nTable 80 \u2013 REST implementation of PublicKey (GET)
Table 81 \u2013 HTTP response code and message of PublicKey (GET) <\/td>\n<\/tr>\n
97<\/td>\nFigure 43 \u2013 Operational sequence diagram for PublicKey interface
Table 82 \u2013 REST implementation of PublicKey (POST)
Table 83 \u2013 HTTP response code and message of PublicKey (POST) <\/td>\n<\/tr>\n
98<\/td>\n6 SECOM communication channel security
6.1 General
6.2 Secure transfer
6.2.1 Secure communication channel <\/td>\n<\/tr>\n
99<\/td>\n6.2.2 Authentication procedure
7 SECOM data protection
7.1 General
Figure 44 \u2013 Principle for service authentication <\/td>\n<\/tr>\n
100<\/td>\n7.2 Data compression and packaging
7.3 Data authentication and signing
7.3.1 General
7.3.2 Data formats and standards for digital signatures, keys and certificates <\/td>\n<\/tr>\n
101<\/td>\n7.3.3 Creation of digital signature <\/td>\n<\/tr>\n
102<\/td>\n7.3.4 Creation of envelope signature
Table 84 \u2013 Conversion rules <\/td>\n<\/tr>\n
103<\/td>\n7.3.5 Verification of digital signature
Table 85 \u2013 Interfaces with envelope signature <\/td>\n<\/tr>\n
104<\/td>\n7.3.6 Verification of envelope signature
7.3.7 Example of commands for data authentication
Table 86 \u2013 Command examples <\/td>\n<\/tr>\n
105<\/td>\n7.4 Data encryption
7.4.1 General
7.4.2 Encryption algorithm
7.5 Creation and transfer of encryption key
7.5.1 General <\/td>\n<\/tr>\n
106<\/td>\n7.5.2 SECOM encryption key management
Figure 45 \u2013 Sequence for SECOM encryption key management <\/td>\n<\/tr>\n
107<\/td>\n7.5.3 Generate encryption key
7.5.4 Sign the protected encryption key
7.5.5 Transfer of the encryption key
Figure 46 \u2013 Alternative sequence for SECOM encryption key management <\/td>\n<\/tr>\n
108<\/td>\n7.5.6 Example
8 SECOM PKI
8.1 General
Table 87 \u2013 Example of commands <\/td>\n<\/tr>\n
109<\/td>\n8.2 Scheme
8.2.1 General
8.2.2 Scheme administrator
8.2.3 Data servers
8.2.4 Data clients <\/td>\n<\/tr>\n
110<\/td>\n8.2.5 Procedure
8.3 Generation of public and private key <\/td>\n<\/tr>\n
111<\/td>\n8.4 Certificate signing request
8.5 Certificate revocation
8.5.1 General
8.5.2 CRL \u2013 Certificate revocation list
8.5.3 OCSP \u2013 Online certificate status protocol
Table 88 \u2013 Creation of public and private key pairs \u2013 Example of basic commands <\/td>\n<\/tr>\n
112<\/td>\n8.6 SECOM PKI service interface
8.6.1 General
8.6.2 Service interface \u2013 CSR
Table 89 \u2013 PKI interface overview <\/td>\n<\/tr>\n
113<\/td>\nFigure 47 \u2013 CSR interface UML diagram
Table 90 \u2013 Information input for CSR interface
Table 91 \u2013 Information output for CSR interface <\/td>\n<\/tr>\n
114<\/td>\nFigure 48 \u2013 Operational sequence diagram for CSR
Table 92 \u2013 REST implementation of CSR
Table 93 \u2013 HTTP response codes and message in response object <\/td>\n<\/tr>\n
115<\/td>\n8.6.3 Service interface \u2013 GetPublicKey
Figure 49 \u2013 GetPublicKey interface UML diagram
Table 94 \u2013 Information input for GetPublicKey interface
Table 95 \u2013 Information output for GetPublicKey interface <\/td>\n<\/tr>\n
116<\/td>\nTable 96 \u2013 REST implementation of GetPublicKey interface
Table 97 \u2013 HTTP Response codes and message in response object <\/td>\n<\/tr>\n
117<\/td>\n8.6.4 Service interface \u2013 CRL
Figure 50 \u2013 Operational sequence diagram for GetPublicKey
Figure 51 \u2013 GetCRL interface UML diagram <\/td>\n<\/tr>\n
118<\/td>\n8.6.5 Service interface \u2013 OCSP
Figure 52 \u2013 Operational sequence diagram for CRL
Table 98 \u2013 REST implementation of CRL
Table 99 \u2013 HTTP response codes and message in response object <\/td>\n<\/tr>\n
119<\/td>\nFigure 53 \u2013 GetOCSP interface UML diagram
Table 100 \u2013 REST implementation of OCSP <\/td>\n<\/tr>\n
120<\/td>\nTable 101 \u2013 HTTP response codes and message in response object
Table 102 \u2013 REST implementation of OCSP
Table 103 \u2013 HTTP response codes and message in response object <\/td>\n<\/tr>\n
121<\/td>\n8.6.6 Service interface \u2013 Revoke
Figure 54 \u2013 Operational sequence diagram for OCSP
Figure 55 \u2013 PostRevoke interface UML diagram
Table 104 \u2013 Information input for Revoke interface <\/td>\n<\/tr>\n
122<\/td>\nTable 105 \u2013 Enumerations for Revoke interface
Table 106 \u2013 Information output for Revoke interface
Table 107 \u2013 REST implementation of Revoke <\/td>\n<\/tr>\n
123<\/td>\n9 SECOM service discovery service interface
9.1 General
9.2 Service interface \u2013 Search service
9.2.1 Specification
Figure 56 \u2013 Operational sequence diagram for Revoke
Table 108 \u2013 HTTP response codes and message in response object <\/td>\n<\/tr>\n
124<\/td>\n9.2.2 Data exchange model
Figure 57 \u2013 Search service UML information diagram <\/td>\n<\/tr>\n
125<\/td>\nTable 109 \u2013 Information input for search service interface
Table 110 \u2013 Information input for search parameter object <\/td>\n<\/tr>\n
126<\/td>\n9.2.3 REST design
Table 111 \u2013 Information output for search service interface <\/td>\n<\/tr>\n
127<\/td>\n10 SECOM error cases
10.1 Error cases
Table 112 \u2013 REST implementation for Search Service
Table 113 \u2013 HTTP response codes <\/td>\n<\/tr>\n
128<\/td>\n10.2 General
10.3 Message integrity
10.4 Data integrity
10.5 Transport confidentiality <\/td>\n<\/tr>\n
129<\/td>\n10.6 Data protection
10.7 Service identity
10.8 Client identity <\/td>\n<\/tr>\n
130<\/td>\n10.9 Client authorization
10.10 Bandwidth optimization
10.11 Large message transfer <\/td>\n<\/tr>\n
131<\/td>\n10.12 Closed loop communication <\/td>\n<\/tr>\n
132<\/td>\n10.13 Service discoverability
10.14 Information push
10.15 Information pull <\/td>\n<\/tr>\n
133<\/td>\n10.16 Subscribe to data
10.17 Service information
10.18 Service condition <\/td>\n<\/tr>\n
134<\/td>\n11 Test methods and expected results
11.1 General
11.2 Communication channel security test <\/td>\n<\/tr>\n
135<\/td>\n11.3 Data protection test
11.3.1 Data Compression and packaging
11.3.2 Data authentication and signature
11.3.3 Encryption
11.3.4 Digital signature test
11.4 SECOM ship\/shore test
11.4.1 General <\/td>\n<\/tr>\n
136<\/td>\nTable 114 \u2013 Test data reference <\/td>\n<\/tr>\n
138<\/td>\n11.4.2 Prerequisites SECOM ship\/shore EUT
11.4.3 Upload data <\/td>\n<\/tr>\n
139<\/td>\n11.4.4 Download data
Table 115 \u2013 Upload test method steps <\/td>\n<\/tr>\n
140<\/td>\nTable 116 \u2013 Download test method steps <\/td>\n<\/tr>\n
141<\/td>\n11.5 SECOM Information Service test
11.5.1 General
Table 117 \u2013 Test data reference <\/td>\n<\/tr>\n
142<\/td>\n11.5.2 Prerequisites SECOM information service EUT
11.5.3 Access <\/td>\n<\/tr>\n
143<\/td>\n11.5.4 Access notification
11.5.5 Acknowledgement
Table 118 \u2013 Access test method steps
Table 119 \u2013 Access Notification test method steps <\/td>\n<\/tr>\n
144<\/td>\n11.5.6 Capability
Table 120 \u2013 Acknowledgement test method steps
Table 121 \u2013 Capability test method steps <\/td>\n<\/tr>\n
145<\/td>\n11.5.7 EncryptionKey
11.5.8 EncryptionKey Notification
Table 122 \u2013 EncryptionKey test method steps <\/td>\n<\/tr>\n
146<\/td>\n11.5.9 Get
Table 123 \u2013 EncryptionKey notification test method steps <\/td>\n<\/tr>\n
147<\/td>\n11.5.10 Get By Link
Table 124 \u2013 Get test method steps <\/td>\n<\/tr>\n
148<\/td>\n11.5.11 Get Summary
Table 125 \u2013 Get By Link test method steps <\/td>\n<\/tr>\n
149<\/td>\n11.5.12 Get Public Key
11.5.13 Upload Public Key
Table 126 \u2013 Get Summary test method steps
Table 127 \u2013 Get Public Key test method steps <\/td>\n<\/tr>\n
150<\/td>\n11.5.14 Ping
11.5.15 Subscription
Table 128 \u2013 Upload Public Key test method steps
Table 129 \u2013 Ping test method steps <\/td>\n<\/tr>\n
151<\/td>\n11.5.16 Subscription Notification
11.5.17 Remove Subscription
Table 130 \u2013 Subscription test method steps
Table 131 \u2013 Subscription Notification test method steps <\/td>\n<\/tr>\n
152<\/td>\n11.5.18 Upload
Table 132 \u2013 Remove Subscription test method steps <\/td>\n<\/tr>\n
153<\/td>\n11.5.19 Upload Link
Table 133 \u2013 Upload test method steps <\/td>\n<\/tr>\n
154<\/td>\n11.6 SECOM PKI Service test
11.6.1 Prerequisites PKI EUT
Table 134 \u2013 Upload Link test method steps <\/td>\n<\/tr>\n
155<\/td>\n11.6.2 CRL
11.6.3 OCSP
Table 135 \u2013 CRL test method steps
Table 136 \u2013 OCSP test method steps <\/td>\n<\/tr>\n
156<\/td>\n11.6.4 Revoke
11.6.5 CSR
11.6.6 GetPublicKey
Table 137 \u2013 Revoke test method steps
Table 138 \u2013 CSR test method steps <\/td>\n<\/tr>\n
157<\/td>\n11.7 SECOM Service Discovery test
11.7.1 General
11.7.2 Prerequisites Service Discovery EUT
11.7.3 Search service \u2013 By geometry
Table 139 \u2013 GetPublicKey test method steps <\/td>\n<\/tr>\n
158<\/td>\n11.7.4 Search service \u2013 Without specified search criteria
Table 140 \u2013 Search service by geometry test method steps
Table 141 \u2013 Search service empty query test method steps <\/td>\n<\/tr>\n
159<\/td>\nAnnex A (normative)REST service interface definitions
A.1 Purpose
A.2 SECOM information service REST interface definition
A.3 SECOM PKI service REST interface definition
A.4 SECOM discovery service REST interface definition <\/td>\n<\/tr>\n
160<\/td>\nAnnex B (informative)Operational use cases and profiles
B.1 Purpose
B.2 Use cases and service interface profiles
B.2.1 UC-1 Ship shares route plan with service providing enhanced monitoring <\/td>\n<\/tr>\n
161<\/td>\nB.2.2 UC-2 Pilot routes
Table B.1 \u2013 UC-1 Ship shares route plan with service providing enhanced monitoring <\/td>\n<\/tr>\n
162<\/td>\nB.2.3 UC-3 Route optimization
Table B.2 \u2013 Required service interfaces in UC-3 <\/td>\n<\/tr>\n
163<\/td>\nB.2.4 UC-4 Enhanced monitoring service requests route plan from\/for ship for monitoring
Table B.3 \u2013 Required service interfaces in UC-3 <\/td>\n<\/tr>\n
164<\/td>\nB.2.5 UC-5 Discover service instance to consume
Table B.4 \u2013 Required service interfaces in UC-4 <\/td>\n<\/tr>\n
165<\/td>\nB.2.6 UC-6 Chart (ENC) updates <\/td>\n<\/tr>\n
166<\/td>\nB.2.7 UC-7 navigational warning service
Table B.5 \u2013 Required service interfaces in UC-6 <\/td>\n<\/tr>\n
167<\/td>\nTable B.6 \u2013 Required service interfaces in UC-7 <\/td>\n<\/tr>\n
168<\/td>\nB.2.8 UC-8 Updates for detailed bathymetry and tidal and water level forecasts
Table B.7 \u2013 Required service interfaces in UC-8 <\/td>\n<\/tr>\n
169<\/td>\nAnnex C (informative)Message exchange patterns
C.1 Purpose
C.2 Message exchange pattern
C.2.1 Generic message exchange patterns
Figure C.1 \u2013 Message Exchange Pattern \u2013 ONE_WAY <\/td>\n<\/tr>\n
170<\/td>\nFigure C.2 \u2013 Message Exchange Pattern \u2013 REQUEST_CALLBACK
Figure C.3 \u2013 Message exchange pattern \u2013 REQUEST_RESPONSE <\/td>\n<\/tr>\n
171<\/td>\nFigure C.4 \u2013 Message exchange pattern \u2013 PUBLISH_SUBSCRIBE (Provider nominates)
Figure C.5 \u2013 Message exchange pattern \u2013 PUBLISH_SUBSCRIBE (Consumer request) <\/td>\n<\/tr>\n
172<\/td>\nC.2.2 Alternative and error sequences
Figure C.6 \u2013 Error sequence; Incorrect uploaded message
Figure C.7 \u2013 Error sequence; Unauthorized upload of message
Figure C.8 \u2013 Error sequence; Unauthorized subscription request <\/td>\n<\/tr>\n
173<\/td>\nAnnex D (informative)Guidance on implementation
D.1 Purpose
Figure D.1 \u2013 Overview of SECOM <\/td>\n<\/tr>\n
174<\/td>\nD.2 On ship
Figure D.2 \u2013 Overview of certificate usage <\/td>\n<\/tr>\n
175<\/td>\nD.3 On shore
Figure D.3 \u2013 Deployment example for SECOM on ship <\/td>\n<\/tr>\n
176<\/td>\nD.4 Service composition
Figure D.4 \u2013 Deployment example for SECOM on shore <\/td>\n<\/tr>\n
177<\/td>\nD.5 Private side security
Figure D.5 \u2013 Service composition <\/td>\n<\/tr>\n
178<\/td>\nD.6 SECOM PKI
D.6.1 General
D.6.2 Structure and Functionality
Figure D.6 \u2013 Structure of MIR within MCP <\/td>\n<\/tr>\n
179<\/td>\nD.6.3 Identity management <\/td>\n<\/tr>\n
182<\/td>\nD.6.4 Public Key Infrastructure <\/td>\n<\/tr>\n
183<\/td>\nFigure D.7 \u2013 Hierarchical X.509 PKI Structure <\/td>\n<\/tr>\n
185<\/td>\nTable D.1 \u2013 Domain parameters
Table D.2 \u2013 Subject distinguished name field items <\/td>\n<\/tr>\n
186<\/td>\nTable D.3 \u2013 Fields and object identifiers <\/td>\n<\/tr>\n
187<\/td>\nD.6.5 Authentication and authorization for web services <\/td>\n<\/tr>\n
188<\/td>\nD.6.6 Profile “Basic Requirements”
D.7 SECOM service discovery
D.7.1 Example 1: geometry combined with serviceType search
Table D.4 \u2013 MCP OpenID Connect token <\/td>\n<\/tr>\n
189<\/td>\nFigure D.8 \u2013 Request find service with geometry and query <\/td>\n<\/tr>\n
190<\/td>\nD.7.2 Example 2: Search with AND\/OR condition
Figure D.9 \u2013 Response from service registry <\/td>\n<\/tr>\n
191<\/td>\nFigure D.10 \u2013 Response from service registry <\/td>\n<\/tr>\n
192<\/td>\nAnnex E (informative)Use of white list
E.1 Purpose
E.2 Authorization to access data <\/td>\n<\/tr>\n
193<\/td>\nE.3 Access control list
E.4 Authorization based on predefined rules or list <\/td>\n<\/tr>\n
194<\/td>\nE.5 Manually updated list
E.6 Rule based handling on request to information (rule based authorization)
E.7 Rule based request for information
E.8 Procedure when receiving “Not authorized” <\/td>\n<\/tr>\n
195<\/td>\nAnnex F (informative)Test and simulators
F.1 Purpose
F.2 Manual testing
F.3 Ship and shore equipment
Figure F.1 \u2013 Manual testing <\/td>\n<\/tr>\n
196<\/td>\nF.4 SECOM information service equipment
F.5 SECOM PKI equipment
Figure F.2 \u2013 Overview of test equipment for ship and shore equipment
Figure F.3 \u2013 Overview of test equipment for SECOM information service equipment <\/td>\n<\/tr>\n
197<\/td>\nF.6 SECOM Service Discovery equipment
Figure F.4 \u2013 Overview of test equipment for SECOM PKI equipment
Figure F.5 \u2013 Overview of test equipment for SECOM service discovery equipment <\/td>\n<\/tr>\n
198<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Maritime navigation and radiocommunication equipment and systems \u2013 Data interface – Secure online transfer of S-100 based products applied on S-421 Route Plan<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2023<\/td>\n200<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":422762,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[792,2641],"product_tag":[],"class_list":{"0":"post-422753","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-47-020-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/422753","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/422762"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=422753"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=422753"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=422753"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}